1 A Project Presentation on Secure Transmission of Information using Audio Steganography Submitted in partial fulfillment of award of BACHELOR OF TECHNOLOGY Degree In COMPUTER SCIENCE & ENGINEERING By KUMAR KARTIKEYA UPADHYAY KM. NEHA RANI MANVI GUPTA RAJU RAJPUT 2011-2015 GUIDE SURYA PRAKASH SHARMA ASSISTANT PROFFESOR NOIDA INSTITUTE OF ENGINEERING & TECHNOLOGY, GREATER NOIDA(U.P.)
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
A
Project Presentation on
Secure Transmission of Information using
Audio Steganography
Submitted in partial fulfillment of award of
BACHELOR OF TECHNOLOGY
Degree
InCOMPUTER SCIENCE & ENGINEERING
ByKUMAR KARTIKEYA UPADHYAY
KM. NEHA RANI
MANVI GUPTA
RAJU RAJPUT
2011-2015
GUIDESURYA PRAKASH SHARMA
ASSISTANT PROFFESOR
NOIDA INSTITUTE OF ENGINEERING &
TECHNOLOGY, GREATER NOIDA(U.P.)
Requirements
HARDWARE
Intel Core i3 CPU@
2.40 Ghz
RAM: 2 GB
SOFTWARE
Matlab 8.1.0.604
OS-Windows
Microsoft
2
Introduction
Secure Transmission
It refers to the transfer of data such as
confidential information.
TLS and SSL are cryptographic protocols that
provide secure communication on the internet.
3
Steganography
The process of hiding the messages so that the presence of
message itself is hidden , often by writing them in places
where they may not be found.
Select Host
audio
Secret bits
(message)
Secret
message
Preprocessin
g
System
Extract secret
bits from
coefficient
Embedding
bits by location
selection
Select
location in
each
coefficient
Network
4
EXAMPLE
Since everybody can read, encoding
text, in natural sentences in doubtfully
effective.
Since Everybody Can Read, Encoding
Text, In Natural Sentences In Doubtfully
Effective.
‘SECRET INSIDE’
5
Audio Steganography
Embedding secret message into
digital sound is called audio
steganography.
Audio Steganography is presented
where the bits of a secret message
are embedded into the coefficients of
a cover audio.
6
Modules
Take an audio input from the user.
Convert audio bits into binary format.
Embed the secret message with binary bits
using MSB.
Decode the message with the same
procedure as applied in embedding.
Now original message can be viewed by
the receiver.
7
8
SECRET
MESSAG
E
AUDIO
FILE
STEGANOGRAPHI
C SYSTEM
STEGNO
FILE:
SECRET
MESSAGE
+ AUDIO
FILE
0 LEVEL DFD
LEVEL 1 DFD
9
SECRET
MESSAGE
STEGANOGRAPHI
C
ENCRYPTION
PROCESS
STEGNO
FILE:
SECRET
MESSAGE +
CARRIER
FILE
CARRIER FILE
COMPRESSIO
N PROCESS
DECOMPRESSI
ON PROCESS
DECRYPTION
SECRET FILE
EMBEDDED
STEGO FILE
ENCRYPTED
SECRET MSG
10
Select cover audio file in
wav format
Select file to embed(text &
image )
Embedding starts
Stego audio
E
M
B
E
D
D
I
N
G
11
R
E
T
R
I
E
V
I
N
G
Select Stego Audio
Retrieve Secret
Message
Secret Message
GUI of Embedding Process
12
Select Cover Audio file
13
Histogram of Cover Audio
14
Select Secret message Browse file to embed
15
Embedding Starts….
16
Save Embedded Audio
17
Histogram of Stego Audio
18
GUI of Retrieving Process
19
Browse Stego file
20
Retrieving Starts…..
21
Save Retrieved Message
22
Advantages
Avoiding communication in well-known
forms greatly reduces the risk of
information being leaked in transit.
It can also enhance individual privacy.
23
Applications
Usage in modern printers
Defense Applications
Confidential communication and secret
data storing
Media Database systems
Protection of data alteration.
24
FUTURE SCOPE
25
CONCLUSION
Hiding information may introduce enough visible noise to raise suspicion. Therefore the carrier or cover audio must be carefully selected.
This proposed system is to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safe manner.
This proposed system will not change the size of the file even after encoding and also suitable for any type of audio file format.
Encryption and Decryption techniques have been used to make the security system robust. 26