Top Banner
Audio STEGANOGRAPHY
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 1. AudioSTEGANOGRAPHY

2. STEGANOGRAPHY No one apartfrom theArt andA form ofsender and science of security intendedwriting hiddenthroughrecipient, messagesobscurity suspects theexistence of the message www.company.com 3. STEGANOGRAPHY TECHNIQUEwww.company.com 4. EmbeddedDataHidden MESSAGEAudio FileMESSAGE 5. Audio 6. AUDIO TERMS Sampling is the process in whichthe analogue values are only captured at regulartime intervals. Quantization converts each input value into oneof a discrete value. Popular sampling rates for audio include 8 kHz,9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and44.1 kHz www.company.com 7. Audio File TypesFile Format Uncompressed CompressedLossy Loseless WAVAIEFALAC, FlAC, Mp3, AAC, WMA WavPackwww.company.com 8. WHY .WAV ?Most popular Audio formatDont lose any quality in recordingEasier format for DevelopmentNo Compression!!www.company.com 9. WAVE FILE FORMAT www.company.com 10. WAVE FILE FORMATHEX Values of WaveFile Size Chunk Length of Format Data Chunk Audio Attributeswww.company.com 11. SteganographyTechniques 12. TYPES OF STEGANOGRAPHYLSB CODINGPHASE CODING ECHO HIDING SPREADwww.company.comSPECTRUM 13. WHY LSB?Low computational complexityEasier ImplementationVariation in choosing LSBwww.company.com 14. LSB ALGORITHM Step 2Step 4 Receives the Check which LSB Replaces the LSBaudio file Each characterto Replace By bit from audioconvert it into bit in the message is RC4 Algorithm with LSB bit frompattern.converted intocharacter in thebit pattern.message.Step1Step 3 www.company.com 15. CONT. ALGORITHM : CHANGING BITS www.company.com 16. CONT. ALGORITHM : CHANGING BITSRC4 Algorithm www.company.com 17. RC4 ALGORITHMRC4 The pseudo-The key- random schedulinggenerationalgorithm (KSA)algorithm (PRGA)www.company.com 18. RC4 ALGORITHM The key-scheduling algorithm (KSA) initialize the permutation in the array "SArray "S" is initialized to the identity permutation Swap values of S[i] and S[j].www.company.com 19. RC4 ALGORITHM The pseudo-random generation algorithm (PRGA) Used as many iterations as are needed www.company.com 20. Live Demo 21. QUESTIONSwww.company.com 22. RESOURCES Source Code :http://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Files Other Online http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdf deepaldhariwal.weebly.com/uploads/4/9/0/9/4909109/report.docx http://en.wikipedia.org/wiki/RC4 www.company.com