Audio steganography project presentation
-
Upload
kartikeya-upadhyay -
Category
Software
-
view
125 -
download
4
Transcript of Audio steganography project presentation
![Page 1: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/1.jpg)
1
A
Project Presentation on
Secure Transmission of Information using
Audio Steganography
Submitted in partial fulfillment of award of
BACHELOR OF TECHNOLOGY
Degree
InCOMPUTER SCIENCE & ENGINEERING
ByKUMAR KARTIKEYA UPADHYAY
KM. NEHA RANI
MANVI GUPTA
RAJU RAJPUT
2011-2015
GUIDESURYA PRAKASH SHARMA
ASSISTANT PROFFESOR
NOIDA INSTITUTE OF ENGINEERING &
TECHNOLOGY, GREATER NOIDA(U.P.)
![Page 2: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/2.jpg)
Requirements
HARDWARE
Intel Core i3 CPU@
2.40 Ghz
RAM: 2 GB
SOFTWARE
Matlab 8.1.0.604
OS-Windows
Microsoft
2
![Page 3: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/3.jpg)
Introduction
Secure Transmission
It refers to the transfer of data such as
confidential information.
TLS and SSL are cryptographic protocols that
provide secure communication on the internet.
3
![Page 4: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/4.jpg)
Steganography
The process of hiding the messages so that the presence of
message itself is hidden , often by writing them in places
where they may not be found.
Select Host
audio
Secret bits
(message)
Secret
message
Preprocessin
g
System
Extract secret
bits from
coefficient
Embedding
bits by location
selection
Select
location in
each
coefficient
Network
4
![Page 5: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/5.jpg)
EXAMPLE
Since everybody can read, encoding
text, in natural sentences in doubtfully
effective.
Since Everybody Can Read, Encoding
Text, In Natural Sentences In Doubtfully
Effective.
‘SECRET INSIDE’
5
![Page 6: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/6.jpg)
Audio Steganography
Embedding secret message into
digital sound is called audio
steganography.
Audio Steganography is presented
where the bits of a secret message
are embedded into the coefficients of
a cover audio.
6
![Page 7: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/7.jpg)
Modules
Take an audio input from the user.
Convert audio bits into binary format.
Embed the secret message with binary bits
using MSB.
Decode the message with the same
procedure as applied in embedding.
Now original message can be viewed by
the receiver.
7
![Page 8: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/8.jpg)
8
SECRET
MESSAG
E
AUDIO
FILE
STEGANOGRAPHI
C SYSTEM
STEGNO
FILE:
SECRET
MESSAGE
+ AUDIO
FILE
0 LEVEL DFD
![Page 9: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/9.jpg)
LEVEL 1 DFD
9
SECRET
MESSAGE
STEGANOGRAPHI
C
ENCRYPTION
PROCESS
STEGNO
FILE:
SECRET
MESSAGE +
CARRIER
FILE
CARRIER FILE
COMPRESSIO
N PROCESS
DECOMPRESSI
ON PROCESS
DECRYPTION
SECRET FILE
EMBEDDED
STEGO FILE
ENCRYPTED
SECRET MSG
![Page 10: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/10.jpg)
10
Select cover audio file in
wav format
Select file to embed(text &
image )
Embedding starts
Stego audio
E
M
B
E
D
D
I
N
G
![Page 11: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/11.jpg)
11
R
E
T
R
I
E
V
I
N
G
Select Stego Audio
Retrieve Secret
Message
Secret Message
![Page 12: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/12.jpg)
GUI of Embedding Process
12
![Page 13: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/13.jpg)
Select Cover Audio file
13
![Page 14: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/14.jpg)
Histogram of Cover Audio
14
![Page 15: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/15.jpg)
Select Secret message Browse file to embed
15
![Page 16: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/16.jpg)
Embedding Starts….
16
![Page 17: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/17.jpg)
Save Embedded Audio
17
![Page 18: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/18.jpg)
Histogram of Stego Audio
18
![Page 19: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/19.jpg)
GUI of Retrieving Process
19
![Page 20: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/20.jpg)
Browse Stego file
20
![Page 21: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/21.jpg)
Retrieving Starts…..
21
![Page 22: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/22.jpg)
Save Retrieved Message
22
![Page 23: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/23.jpg)
Advantages
Avoiding communication in well-known
forms greatly reduces the risk of
information being leaked in transit.
It can also enhance individual privacy.
23
![Page 24: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/24.jpg)
Applications
Usage in modern printers
Defense Applications
Confidential communication and secret
data storing
Media Database systems
Protection of data alteration.
24
![Page 25: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/25.jpg)
FUTURE SCOPE
25
![Page 26: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/26.jpg)
CONCLUSION
Hiding information may introduce enough visible noise to raise suspicion. Therefore the carrier or cover audio must be carefully selected.
This proposed system is to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safe manner.
This proposed system will not change the size of the file even after encoding and also suitable for any type of audio file format.
Encryption and Decryption techniques have been used to make the security system robust. 26
![Page 27: Audio steganography project presentation](https://reader034.fdocuments.us/reader034/viewer/2022042501/55a6986a1a28ab662d8b4834/html5/thumbnails/27.jpg)
27