Top Banner

Click here to load reader

Data Security Using Audio Steganography

Aug 18, 2015

ReportDownload

  1. 1. 1 Data Security using Steganography (Audio Steganography) Enrollment. No. - 9911103519 Name of Student - Rajan Yadav Name of supervisor(s) - Mr. Himanshu Agrawal June - 2015 Submitted in partial fulfillment of the Degree of Bachelor of Technology In Computer Science Engineering DEPARTMENT OF COMPUTER SCIENCE ENGINEERING & INFORMATION TECHNOLOGY JAYPEE INSTITUTE OF INFORMATION TECHNOLOGY, NOIDA
  2. 2. 2 (I) TABLE OF CONTENTS Chapter No. Topics Page No. Student Declaration 4 Certificate from the Supervisor 5 Acknowledgement 6 Summary 7 List of Figures 8 List of Tables 9 List of Symbols and Acronyms 10 Chapter-1 Introduction 11-13 1.1 General Introduction 1.2 General problem with Steganography 1.3 Problem Statement 1.4 Benefits of proposed Solution Chapter-2 Background Study 14-20 2.1 Literature Survey 2.1.1 Summary of papers 2.1.2 Integrated summary of the literature studied Chapter 3: Analysis, Design and Modeling 21-28 3.1 Requirements Specifications 3.2 Functional and Non Functional requirements 3.3 Design Documentation 3.3.1 Use Case diagrams 3.3.2 Control Flow Diagrams 3.3.3 Activity diagrams 3.4 Risk Analysis and Mitigation Plan
  3. 3. 3 Chapter-4 Implementation and Testing 29-34 4.1 Implementation details and issues 4.2 Testing 4.2.1 Testing Plan 4.2.2 Component decomposition and type of testing required 4.2.3 List all test cases in prescribed format 4.2.4 Limitations of the solution Chapter-5 Findings & Conclusion 35 5.1 Findings 5.2 Conclusion 5.3 Future Work Appendices Gantt Chart 36 References 37 Bio-data (Resume) of Student 38-39
  4. 4. 4 (II) DECLARATION I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which has been accepted for the award of any other degree or diploma of the university or other institute of higher learning, except where due acknowledgment has been made in the text. Place: . Signature: Date: . Name: Rajan Yadav Enrollment No: 9911103519
  5. 5. 5 (III) CERTIFICATE This is to certify that the work titled Data Security using Steganography submitted by Rajan Yadav in partial fulfillment for the award of degree of B.Tech of Jaypee Institute of Information Technology University, Noida has been carried out under my supervision. This work has not been submitted partially or wholly to any other University or Institute for the award of this or any other degree or diploma. Signature of Supervisor . Name of Supervisor: Mr. Himanshu Agrawal Designation: Assistant Professor, Department CSE/IT, JIIT, Noida Date: .
  6. 6. 6 (IV) ACKNOWLEDGEMENT This project is done for the fulfilment of the Degree of Bachelor of Technology in Computer Science and Engineering, as a part of Major Project II. I would like to thank Mr. Himanshu Agrawal, my Project Mentor and Assistant Professor (Dept. of CSE/IT) for guiding me in this project. His valuable advice, suggestions and motivation to help me work in my area of interest have always been very encouraging. I am also thankful to Dr. Charu (Assistant Professor) and Ms. Anuradha Gupta (Assistant Professor), External Evaluators for Major Project who believed in my capabilities and giving me the right direction by letting me know my drawbacks and gave the opportunity to rectify my mistakes. I owe my gratitude to Dr. Shelly Sachdeva (Major Coordinator-Assistant Professor) for giving this opportunity to explore into the real world and realize the interrelation of theoretical Concepts and its practical application of my own interest. Signature of the Student Name of Student Rajan Yadav Enrollment Number 9911103519 Date
  7. 7. 7 (V) SUMMARY Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. In a computer-based audio Steganography system, secret messages are embedded in digital sound. The secret message is embedded by slightly altering the binary sequence of a sound file. Existing audio Steganography software can embed messages in WAV, AU, and even MP3 sound files. Embedding secret messages in digital sound is usually a more difficult process than embedding messages in other media, such as digital images. These methods range from rather simple algorithms that insert information in the form of signal noise to more powerful methods that exploit sophisticated signal processing techniques to hide information. Thereby I have chosen C# based windows application to serve the purpose. C# is worlds most widely used window user based application platform. I have decided to make application to serve the application of Audio Steganography.
  8. 8. 8 (VI) LIST OF FIGURES S. No Figure Details Page No Figure 1 LSB encoding 18 Figure 2 Phase coding 19 Figure 3 Class Diagrams 23 Figure 4 DFD 0 Level 24 Figure 5 Activity Diagram(Embed) 25 Figure 6 Activity Diagram(Extract) 26 Figure 7 Risk Relation 38 Figure 8 Steganography module 30
  9. 9. 9 (VII) LIST OF TABLES S. No Table Description Page number Table 1 Risk Analysis 30 Table 2 Mitigation Plan 30 Table 3 Testing Plan 35 Table 4 Component Decomposition 35 Table 5 List of all test cases 36
  10. 10. 10 (VIII) LIST OF SYMBOLS & ACRONYMS Abbreviation Full Form WAV Window Audio Video IJACSA International Journal of Advance Computer Science Application IEEE Institute of Electrical and Electronic Engineers IJARCSM International Journal of Advance Research in Computer Science and Management Studies
  11. 11. 11 1. INTRODUCTION 1.1 General Introduction Steganography derived from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data. In modern digital steganography, data is first encrypted by the usual means and then inserted, using a special algorithm into redundant (that is, provided but unneeded) data that is part of a particular file format such as a JPEG image, text file, music file. Think of all the bits that represent the different data repeated in a row. By applying the encrypted data to this redundant data in some random or non-conspicuous way, the result will be data that appears to have the "noise" patterns of regular, non-encrypted data. A trademark or other identifying symbol hidden in software code is sometimes known as a watermark .Steganography is mainly oriented around the undetectable transmission of one of information within another. In order for a data hiding technique to be successful it must adhere to two rules: The embedded data must be undetectable within its carrier medium (the audio or image file used). The carrier should display no properties that flag it as suspicious, whether it is to the human visual/auditory system or in increased file size for the carrier file. The embedded data must maintain its integrity within the carrier and should be easily removable, under the right circumstances, by the receiving party.
  12. 12. 12 1.2 General problem with Steganography The biggest problem steganography faces is that of size. There is limit to the size of message which you can embed into. For instance if we take a message of n length then the no of samples in the audio has to be greater than the length in order to encode the bits in audio file. As a result audio steganography is able to embed a large length file as a particular wav file has large no of samples. 1.3 Problem Definition: We are of the belief that the easiest way to keep something from interfering eyes is to place it right in front of the person looking for it and make it look as innocuous as possible. The primary goal of this project is to provide end users the ability to apply steganography on wave audio files and secretly convey messages to the other end users. This project mainly concentrates on applying steganography to audio files. As discussed earlier, steganography can also be applied to video, image and text files. The main emphasis of this project is on developing a tool for use in audio steganography. The main purpose of tool is to transfer encrypted messages between two different parties. Also emphasis is based on preventing the intruders from detecting the encrypted or secret message. Software is developed in such a way that it takes a wave file and the message to be encrypted as inputs and create a new stego wave file. The encrypt method that will be used encrypts the file to be hidden first and later embeds into the wave file. The existing system of Audio Steganography poses more restrictions on the choosing of audio files. User can select only wav files to encode. Further embedding information into sound files is generally considered more difficult than images; according to the human ear is extremely sensitive to perturbations in sound and can in fact detect such turbulence as low as one part in 10 million. The four methods discussed further provide users with a large amount of choice and makes the technology more accessible to everyone.
  13. 13. 13 1.4 Overview and Benefits of Proposed solution Audio based Steganography has the potential to conceal more information: Audio files are generally larger than images. Our hearing can be easily fooled. Slight changes in amplitude can store vast amounts of information. The flexibility of audio Steganography make
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.