SlideShare a Scribd company logo
1 of 34
AUDIO STEGANOGRAPHY
Prepared by
Manush Desai
110770107030
Silver Oak College of Engineering and Technology
Ahmedabad – 382481
WHAT IS STEGANOGRAPHY?
 Steganography is to hide message in such a way that no one apart
from the intended recipient even knows that message has been sent.
 Steganography includes the concealment of information within
computer files. In digital steganography, electronic communications
may include steganography coding inside of a transport layer, such as
a document file, image file, program or protocol.
 Steganography is the art and science of writing hidden messages in
such a way that no one, apart from the sender and intended recipient,
suspects the existence of the message.
BLOCK DIAGRAM OF STEGANOGRAPHY
INTRODUCTION TO AUDIO STEGANOGRAPHY
 Audio Steganography is the scheme of hiding the existence of secret
information by concealing it into another medium such as audio file.
 Audio Steganography is a technique used to transmit hidden information by
modifying an audio signal in an imperceptible manner. It is the science of
hiding some secret text or audio information in a host message. The host
message before Steganography and Stego message after Steganography
have the same characteristics.
 Embedding secret messages in digital sound is a more difficult process.
Varieties of techniques for embedding information in digital audio have
been established.
BASIC FLOW CHART OF AUDIO STEGANOGRAPHY
METHODS OF AUDIO DATA HIDING
 Least Significant Bit
 Spread Spectrum
 Discrete Wavelets Transform
 Low-Bit Encoding
 Phase Coding
 Echo Data Hiding
LEAST SIGNIFICANT BIT
 Least significant bit (LSB) coding is the simplest way to embed
information in a digital audio file.
 By substituting the least significant bit of each sampling point with a
binary message.
 In implementations of LSB coding, the least significant bits of a
sample are replaced with message bits.
 To extract a secret message from an LSB encoded sound file, the
receiver needs access to the sequence of sample indices used in the
embedding process.
SPREAD SPECTRUM TECHNIQUE
 Spread Spectrum steganography on audio data will be implemented
with the following scheme:
 Transform the audio cover object in time-domain into frequency-
domain using Fast Fourier Transform.
 Adding the information signal by using spread-spectrum to the cover
object in frequency-domain.
 Transform back the audio cover object from frequency –domain into
time –domain using inverse fast Fourier Transform
DISCRETE WAVELETS TRANSFORM
 Wavelet transform is used to convert a spatial domain into frequency
domain. The use of wavelet in audio stenographic model lies in the
fact that the wavelet transform clearly separates the high frequency
and low frequency information.
ADVANTAGES OF AUDIO STEGANOGRAPHY
 Audio based Steganography has the potential to conceal more
information.
 The flexibility of audio steganography is makes it very potentially
powerful.
 Many attacks that are malicious against image Steganography
algorithms (e.g. geometrical distortions, spatial scaling, etc.) cannot
be implemented against audio Steganography schemes.
Consequently, embedding information into audio seems more secure
due to less steganalysis techniques for attacking to audio.
PROJECT PLAN
1. Roles And Responsibilities:-
 User must have to select audio file of type .au format.
 User have to write text message or secret message for embedding it in
audio file.
 User must have to select a audio file for encoding message.
 User must have to select a stego-audio file for decoding message.
 User must have to give key for encryption and for decryption.
SOFTWARE MODEL
 Here we use Iterative model.
 Iterative process starts with a
simple implementation of a subset
of the software requirements and
iteratively enhances the evolving
versions until the full system is
implemented.
 At each iteration, design
modifications are made and new
functional capabilities are added.
The basic idea behind this method
is to develop a system through
repeated cycles (iterative) and in
smaller portions at a time
(incremental).
SCHEDULE REPRESENTATION
RISK IDENTIFICATION & ANALYSIS
1. Technical Risk:
o The device failure problem, software failure problem.
2. Non-technical risk:
o Users may not be aware of how to use the software.
COST ANALYSIS
By COCOMO Model :-
Assuming KLOC = 3500
Effort(E) = 2.4*(3500^1.05) = 8.94 person/month
Time(T) = 2.5*(8.94^0.38) = 5.74 months ~ 6.0 months
Person = E/T
= 8.94/5.74 = 1.55 ~ 2.0 persons
Total Cost = 2*6*15,000(rs)
= Rs. 1,80,000
TOOLS AND TECHNOLOGY
 Programming Language: Java
 Front end : Swing, Java
 Tools :Net beans IDE 8.1 or Eclipse
UML DIAGRAMS
 Use Case diagram
 Sequence diagram
 Activity diagram
 Class diagram
 State transition diagram
USE CASE DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
CLASS DIAGRAM
STATE DIAGRAM
SAMPLE FORM
SELECT AUDIO FILE(.AU)
ENTER MESSAGE
SELECTING TEXT FILE FOR ENCRYPTION
ENTER ENCRYPTION KEY
EMBEDDING DONE
SELECT STEGO-AUDIO FILE
ENTER DECRYPTION KEY
DISPLAYS MESSAGE
EXTRACTION DONE
WRONG DECRYPTION KEY(DISPLAYS NOTHING)
AUDIO STEGANOGRAPHY PRESENTATION

More Related Content

What's hot (20)

About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
steganography
steganographysteganography
steganography
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 

Viewers also liked

Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals pptjackkhush
 
Psychoacoustic Approaches to Audio Steganography
Psychoacoustic Approaches to Audio SteganographyPsychoacoustic Approaches to Audio Steganography
Psychoacoustic Approaches to Audio SteganographyCody Ray
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganographyMahmut Yildiz
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganographyARYA TM
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenographyricharia
 
Psychoacoustic Approaches to Audio Steganography Report
Psychoacoustic Approaches to Audio Steganography Report Psychoacoustic Approaches to Audio Steganography Report
Psychoacoustic Approaches to Audio Steganography Report Cody Ray
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...IOSR Journals
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...Journal For Research
 

Viewers also liked (15)

Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
Psychoacoustic Approaches to Audio Steganography
Psychoacoustic Approaches to Audio SteganographyPsychoacoustic Approaches to Audio Steganography
Psychoacoustic Approaches to Audio Steganography
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
 
Psychoacoustic Approaches to Audio Steganography Report
Psychoacoustic Approaches to Audio Steganography Report Psychoacoustic Approaches to Audio Steganography Report
Psychoacoustic Approaches to Audio Steganography Report
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 

Similar to AUDIO STEGANOGRAPHY PRESENTATION

Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcscpconf
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarkingSaurabh Kaushik
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcsandit
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingTELKOMNIKA JOURNAL
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 

Similar to AUDIO STEGANOGRAPHY PRESENTATION (20)

Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
P0460594100
P0460594100P0460594100
P0460594100
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
F017253244
F017253244F017253244
F017253244
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
HACKING
HACKINGHACKING
HACKING
 

AUDIO STEGANOGRAPHY PRESENTATION

  • 1. AUDIO STEGANOGRAPHY Prepared by Manush Desai 110770107030 Silver Oak College of Engineering and Technology Ahmedabad – 382481
  • 2. WHAT IS STEGANOGRAPHY?  Steganography is to hide message in such a way that no one apart from the intended recipient even knows that message has been sent.  Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganography coding inside of a transport layer, such as a document file, image file, program or protocol.  Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
  • 3. BLOCK DIAGRAM OF STEGANOGRAPHY
  • 4. INTRODUCTION TO AUDIO STEGANOGRAPHY  Audio Steganography is the scheme of hiding the existence of secret information by concealing it into another medium such as audio file.  Audio Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is the science of hiding some secret text or audio information in a host message. The host message before Steganography and Stego message after Steganography have the same characteristics.  Embedding secret messages in digital sound is a more difficult process. Varieties of techniques for embedding information in digital audio have been established.
  • 5. BASIC FLOW CHART OF AUDIO STEGANOGRAPHY
  • 6. METHODS OF AUDIO DATA HIDING  Least Significant Bit  Spread Spectrum  Discrete Wavelets Transform  Low-Bit Encoding  Phase Coding  Echo Data Hiding
  • 7. LEAST SIGNIFICANT BIT  Least significant bit (LSB) coding is the simplest way to embed information in a digital audio file.  By substituting the least significant bit of each sampling point with a binary message.  In implementations of LSB coding, the least significant bits of a sample are replaced with message bits.  To extract a secret message from an LSB encoded sound file, the receiver needs access to the sequence of sample indices used in the embedding process.
  • 8. SPREAD SPECTRUM TECHNIQUE  Spread Spectrum steganography on audio data will be implemented with the following scheme:  Transform the audio cover object in time-domain into frequency- domain using Fast Fourier Transform.  Adding the information signal by using spread-spectrum to the cover object in frequency-domain.  Transform back the audio cover object from frequency –domain into time –domain using inverse fast Fourier Transform
  • 9. DISCRETE WAVELETS TRANSFORM  Wavelet transform is used to convert a spatial domain into frequency domain. The use of wavelet in audio stenographic model lies in the fact that the wavelet transform clearly separates the high frequency and low frequency information.
  • 10. ADVANTAGES OF AUDIO STEGANOGRAPHY  Audio based Steganography has the potential to conceal more information.  The flexibility of audio steganography is makes it very potentially powerful.  Many attacks that are malicious against image Steganography algorithms (e.g. geometrical distortions, spatial scaling, etc.) cannot be implemented against audio Steganography schemes. Consequently, embedding information into audio seems more secure due to less steganalysis techniques for attacking to audio.
  • 11. PROJECT PLAN 1. Roles And Responsibilities:-  User must have to select audio file of type .au format.  User have to write text message or secret message for embedding it in audio file.  User must have to select a audio file for encoding message.  User must have to select a stego-audio file for decoding message.  User must have to give key for encryption and for decryption.
  • 12. SOFTWARE MODEL  Here we use Iterative model.  Iterative process starts with a simple implementation of a subset of the software requirements and iteratively enhances the evolving versions until the full system is implemented.  At each iteration, design modifications are made and new functional capabilities are added. The basic idea behind this method is to develop a system through repeated cycles (iterative) and in smaller portions at a time (incremental).
  • 14. RISK IDENTIFICATION & ANALYSIS 1. Technical Risk: o The device failure problem, software failure problem. 2. Non-technical risk: o Users may not be aware of how to use the software.
  • 15. COST ANALYSIS By COCOMO Model :- Assuming KLOC = 3500 Effort(E) = 2.4*(3500^1.05) = 8.94 person/month Time(T) = 2.5*(8.94^0.38) = 5.74 months ~ 6.0 months Person = E/T = 8.94/5.74 = 1.55 ~ 2.0 persons Total Cost = 2*6*15,000(rs) = Rs. 1,80,000
  • 16. TOOLS AND TECHNOLOGY  Programming Language: Java  Front end : Swing, Java  Tools :Net beans IDE 8.1 or Eclipse
  • 17. UML DIAGRAMS  Use Case diagram  Sequence diagram  Activity diagram  Class diagram  State transition diagram
  • 26. SELECTING TEXT FILE FOR ENCRYPTION