SlideShare a Scribd company logo
1 of 16
A 
SYNOPSIS 
ON 
“AUDIO STEGANOGRAPHY” 
Submitted in partial fulfillment of the requirements 
For the degree of 
BACHELOR OF TECHNOLOGY 
in 
Computer Science & Engineering 
Submitted by 
KUMAR KARTIKEYA UPADHYAY 
KM. NEHA RANI 
MANVI GUPTA 
RAJU RAJPUT 
Under the Supervision of 
Mr. SURYA PRAKASH SHARMA 
Noida Institute of Engineering &Technology, Greater Noida (UP) -201306 
Uttar Pradesh Technical University, Lucknow 
2014 - 2015
DECLARATION 
We hereby declare that this submission is our own work and that, to the best of my knowledge and belief, it contains 
no material previously published or written by another person nor material which to a substantial extent has been 
accepted for the award of any other degree of the university or other institute of higher learning, except where due 
acknowledgement has been in the text. 
Signature- 
Name- Kumar Kartikeya Upadhyay 
Roll No. - (1113310103) 
Date- 19-11-2014 
Signature- 
Name- Km. Neha Rani 
Roll No. - (1113310099) 
Date- 19-11-2014 
Signature- 
Name- Manvi Gupta 
Roll No. - (1113310112) 
Date- 19-11-2014 
Signature- 
Name- Raju Rajput 
Roll No. - (1113310163) 
Date- 19-11-2014
CERTIFICATE 
This is to certify that the synopsis entitled “AUDIO STEGANOGRAPHY” submitted by KUMAR 
KARTIKEYA UPADHYAY (1113310103) , KM. NEHA RANI (1113310099) , MANVI GUPTA 
(1113310112) & RAJU RAJPUT (1113310163) in the partial fulfillment of the requirements for 
award of Bachelor of Technology in Computer Science and Engineering from Uttar Pradesh 
Technical University, Lucknow under my supervision. The synopsis embodies result of original work 
and studies carried out by the student’s their self and the contents of the synopsis do not form the 
basis for the award of any other degree to the candidate or to anybody else from this or any other 
University/Institution. 
Mr. SURYA PRAKASH SHARMA 
Assistant Professor (CSE) 
NIET, Greater Noida
ABSTRACT 
Embedding secret message into digital sound is called audio steganography. Audio Steganography is 
presented where the bits of a secret message are embedded into the coefficients of a cover audio. 
Steganography is the art and science of secret communication. In this project a new scheme for digital audio 
steganography is presented where the bits of a secret message are embedded into the coefficients of a cover 
audio. Each secret bit is embedded into the selected position of a cover coefficient. The position for insertion 
of a secret bit is selected from the 0th (Least Significant Bit) to 8th LSB based on the upper three MSB 
(Most Significant Bit). This scheme provides high audio quality, robustness and lossless recovery from the 
cover Audio.
ACKNOWLEDGEMENT 
This synopsis is by far the most significant accomplishment in our life and it would be impossible without people who 
supported us and believed us. We would like to extend our gratitude and our sincere thanks to our honorable, esteemed 
guide Mr. SURYA PRAKASH SHARMA(Assistant Professor (CSE), Department of Computer Science and 
Engineering, NIET, Greater Noida for their immeasurable guidance and valuable time that he devoted for synopsis. 
We sincerely thank for their exemplary guidance and encouragement. His trust and support inspired us in the most 
important moments of making right decisions and we are glad to work with him. 
We would also like to give very special thanks to Dr. RAJDEV TIWARI HOD (CSE). Also we would also like to 
give thanks to our teachers for their support, help and encouragement during this work. We would like to thank all our 
friends and for all the thoughtful and mind stimulating discussions we had, which prompted us to think beyond the 
obvious. 
We have enjoyed their companionship so much during us stay at NIET, Greater Noida. We would like to thank all 
those who made my stay in NIET, Greater Noida an unforgettable and rewarding experience. We dedicate this work to 
them.
TABLE OF CONTENTS 
i. Declaration 
ii. Certificate 
iii. Abstract 
iv. Acknowledgement 
1. Introduction 
1.1Project Objective 
1.2Project Benefit 
1.3Project Scope 
2. Algorithm 
2.1 Traditional LSB Technique 
2.2 Proposed Scheme 
2.2.1 Encoding Scheme 
2.2.2 Decoding Scheme 
3. Flow Chart 
4. Use Case Diagram 
5. Data Flow Diagram 
5.1 0-level DFD 
5.2 1-Level DFD 
6. References
1. Introduction 
1.1 Project Objective 
The objective of this project is to make software which can help to hide the secret message inside a audio file which 
can help to provide security and safety to the secret and confidential information. In this project we’ll implement a 
system which will embed a secret text message in a audio file we’ll use an algorithm (which is given in next chapter) 
for implementing this. 
1.2 Project Benefit 
By hiding the secret message using a cover file like audio as a wrapper, the existence of the secret message is 
concealed during transmission, which provides security when you want to send secret message over any network. 
1.3 Project Scope 
Finding a message will only be possible with knowledge of the key that is required to uncover it. The main advantage 
of this proposed algorithm is that the insertion position is totally unknown to anyone who wants to hack the secret 
message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can easily decode the 
secret message. So this method is more secure than the traditional one as it do not use any traditional algorithm but a 
new more secure algorithm. 
So when this embedded audio will be sent over any network no hacker will ever come to know about the existence of 
the secret message and in case this somehow they come to know about the existence this position of the bits of secret 
message will remain unknown forever.
2. Algorithm 
2.1 Traditional LSB Coding Technique 
A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in 
some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective 
technique where the LSB substitution doesn't cause significant quality degradation. 
In computing, the least significant bit (LSB) is the bit position in a binary integer giving the units value, that is, 
determining whether the number is even or odd. The LSB is sometimes referred to as the right-most bit, due to the 
convention in positional notation of writing less significant digit further to the right. It is analogous to the least 
significant digit of a decimal integer, which is the digit in the ones (right-most) position. 
1 
0 
0 
1 
0 
1 
0 
1 
Figure 1: Binary representation of decimal 149 
The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit binary number represents a 
value of 128 decimal. The LSB represents a value of 1. For example, to hide the letter "a" (ASCII code 97, which is 
01100001) inside eight bytes of a cover, you can set the LSB of each byte like this: 
10010010 
01010011 
10011011 
11010010 
10001010 
00000010 
01110010 
00101011 
The application decoding the cover reads the eight Least Significant Bits of those bytes to recreate the hidden byte— 
that is 0110001—the letter "a." As you may realize, using this technique let you hide a byte every eight bytes of the 
cover. Note that there's a fifty percent chance that the bit you're replacing is the same as its replacement, in other 
words, half the time, the bit doesn't change, which helps to minimize quality degradation. 
Fig 2 illustrates how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. Here the 
secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the 
secret information ‘HEY’ and the audio file are converted into bit stream. The least significant column of the audio 
file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information 
‘HEY’ is called Stego-file.
Figure 2: LSB coding example 
2.2 Proposed Scheme 
In our proposed scheme we will use the traditional LSB algorithm as the base algorithm and will work by taking help 
of the LSB algorithm but as the traditional scheme is old and outdated so, it is less secure and it will not be able to 
give proper security as per today’s demand. 
Here, we’ll try to develop a new algorithm using some new logics which will provide more security to our project and 
the encoding and decoding techniques of the new proposed algorithm are given below. 
2.2.1 Encoding Scheme 
An audio (WAV) file contains number of carrier audio sample (as shown in fig.3). 
Analog Signal Sampling Digital Signal 
Figure 3: Digital sampling of analog signal 
In traditional LSB algorithm, to hide the secrete message into the audio file, it requires to convert the secret message 
in binary format and replace each bit in sequenced manner. But in proposed algorithm the secret bit value to be 
inserted in a different manner unlike traditional way.
Initially the secrete message has to encrypted with some standard encryption algorithm with a key supplied by the 
sender and shared with the receiver. Then the position for insertion inside the sample of the carrier audio file has to be 
selected based on the decimal value of first 3 MSB bits. 
Suppose, first 3 MSB bits’ of a sample are 100 (decimal value is 4), then one bit of the secrete message has to be 
inserted at the 4th position of the corresponding sample of carrier audio file. After the decimal value for 3 MSB bits 
are considered for the next sample and similarly the next secrete bit has to be put at the decimal valued position and 
the process will be repeated for each bit in the secrete message till the full secrete message is hidden. The encoding 
example is as shown in fig. 4. 
Figure 4: Bits of a secret Message are embedded in a 16-bit CD quality sample using the proposed method 
The main advantage of this proposed algorithm is that the insertion position is totally unknown to anyone who wants 
to hack the secret message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can 
easily decode the secret message. So this method is more secure than the traditional one. The algorithm and process 
flow (fig 5) are as follows-
Algorithm for encoding 
Input: Audio file in WAV format to use as carrier and the Secret Message to hide as text file, a key for encryption 
Output: Stego Audio File containing hidden message 
The steps are as follows:- 
1. The secrete message has to be encrypted using a key supplied by the sender and shared with the receiver. Consider 
the binary of the cipher text of the secrete message to be hidden. If the secret message is in text then convert it into the 
respective ASCII value and after that it will be converted into binary pattern. 
2. Read a secret bit from the sequence to hide. 
3. Convert each audio sample into a 16 bit sequence. 
4. For each audio sample value 
Do , 
4.1 From the carrier sample first (MSB) 3 bits to be read and converted into decimal value. That 
generated values is the insertion position of the secret bit inside that audio sample. 
4.2 Insert a secret bit into a selected position which was determined by the previous step. 
5. Repeat the steps until all the secret bit values are replaced. 
6. Stop. 
Figure 5: The process of encoding 
2.2.2 Decoding Scheme 
The same pattern, which was used to encode the audio, used to decode the modified wav file to get back the original 
(secrete) message. The message is first decoded and then decrypted by the same encryption key to get the message in 
its original form. 
Decoded algorithm and process (fig 6) are as follows-
Algorithm for decoding 
Input: Stego Audio File containing hidden message 
Output: Secret message 
The steps are as follows:- 
1. First we have to select the random bits from the stego audio sample which was generated by the proposed way. 
2. If the secret message is present into the audio file then recognize the random bit positions and Decrypt the values 
using proposed algorithm. 
3. Repeat the previous step until we will get the whole secret message. 
4. Display the message to the end user after decrypting 
5. Stop. 
Figure 6: Process of decoding 
The decoding example is as shown in fig. 7 
Figure 7: Decoding Example
3. Flow Chart 
START 
Enter The 
Carrier Audio 
Signal(A) 
Enter The Secret Text 
Message(T) 
Is 
A>8T 
Display: 
Message 
is too 
large 
Enter The Secret Key 
Sequence Generation 
Encryption & Embedding 
Stego File Ready 
STOP
4. Use Case Diagram
5.Data Flow Diagram 
5.1 0- Level DFD 
5.2 Level 1 DFD 
Embedded stego file 
Encrypted secret msg 
Secret 
Message 
Audio File 
Steganographic 
system 
STEGNO FILE: 
Secret msg. + 
audio File 
SECRET 
MESSAGE 
STEGANOGRAPHIC 
ENCRYPTION PROCESS 
STEGO FILE: 
SECRET MSG 
+ 
CARRIER 
FILE 
CARRIER FILE 
COMPRESSION 
PROCESS 
DECOMPRESSION 
PROCESS 
DECRYPTION 
SECRET 
MESSAGE
6. References

More Related Content

What's hot

Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- Nikhil Praharshi
 
Steganography final report
Steganography final reportSteganography final report
Steganography final reportABHIJEET KHIRE
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganographyMahmut Yildiz
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
project-report-steganography.docx
project-report-steganography.docxproject-report-steganography.docx
project-report-steganography.docxssusere02009
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 

What's hot (20)

Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography-
 
Steganography
SteganographySteganography
Steganography
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
project-report-steganography.docx
project-report-steganography.docxproject-report-steganography.docx
project-report-steganography.docx
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Steganography
Steganography Steganography
Steganography
 

Similar to Audio Steganography synopsis

Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451IJRAT
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHYADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHYcsandit
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx9905234521
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 

Similar to Audio Steganography synopsis (20)

Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
 
C3 s
C3 sC3 s
C3 s
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
H42054550
H42054550H42054550
H42054550
 
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHYADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 

Recently uploaded

Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

Audio Steganography synopsis

  • 1. A SYNOPSIS ON “AUDIO STEGANOGRAPHY” Submitted in partial fulfillment of the requirements For the degree of BACHELOR OF TECHNOLOGY in Computer Science & Engineering Submitted by KUMAR KARTIKEYA UPADHYAY KM. NEHA RANI MANVI GUPTA RAJU RAJPUT Under the Supervision of Mr. SURYA PRAKASH SHARMA Noida Institute of Engineering &Technology, Greater Noida (UP) -201306 Uttar Pradesh Technical University, Lucknow 2014 - 2015
  • 2. DECLARATION We hereby declare that this submission is our own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree of the university or other institute of higher learning, except where due acknowledgement has been in the text. Signature- Name- Kumar Kartikeya Upadhyay Roll No. - (1113310103) Date- 19-11-2014 Signature- Name- Km. Neha Rani Roll No. - (1113310099) Date- 19-11-2014 Signature- Name- Manvi Gupta Roll No. - (1113310112) Date- 19-11-2014 Signature- Name- Raju Rajput Roll No. - (1113310163) Date- 19-11-2014
  • 3. CERTIFICATE This is to certify that the synopsis entitled “AUDIO STEGANOGRAPHY” submitted by KUMAR KARTIKEYA UPADHYAY (1113310103) , KM. NEHA RANI (1113310099) , MANVI GUPTA (1113310112) & RAJU RAJPUT (1113310163) in the partial fulfillment of the requirements for award of Bachelor of Technology in Computer Science and Engineering from Uttar Pradesh Technical University, Lucknow under my supervision. The synopsis embodies result of original work and studies carried out by the student’s their self and the contents of the synopsis do not form the basis for the award of any other degree to the candidate or to anybody else from this or any other University/Institution. Mr. SURYA PRAKASH SHARMA Assistant Professor (CSE) NIET, Greater Noida
  • 4. ABSTRACT Embedding secret message into digital sound is called audio steganography. Audio Steganography is presented where the bits of a secret message are embedded into the coefficients of a cover audio. Steganography is the art and science of secret communication. In this project a new scheme for digital audio steganography is presented where the bits of a secret message are embedded into the coefficients of a cover audio. Each secret bit is embedded into the selected position of a cover coefficient. The position for insertion of a secret bit is selected from the 0th (Least Significant Bit) to 8th LSB based on the upper three MSB (Most Significant Bit). This scheme provides high audio quality, robustness and lossless recovery from the cover Audio.
  • 5. ACKNOWLEDGEMENT This synopsis is by far the most significant accomplishment in our life and it would be impossible without people who supported us and believed us. We would like to extend our gratitude and our sincere thanks to our honorable, esteemed guide Mr. SURYA PRAKASH SHARMA(Assistant Professor (CSE), Department of Computer Science and Engineering, NIET, Greater Noida for their immeasurable guidance and valuable time that he devoted for synopsis. We sincerely thank for their exemplary guidance and encouragement. His trust and support inspired us in the most important moments of making right decisions and we are glad to work with him. We would also like to give very special thanks to Dr. RAJDEV TIWARI HOD (CSE). Also we would also like to give thanks to our teachers for their support, help and encouragement during this work. We would like to thank all our friends and for all the thoughtful and mind stimulating discussions we had, which prompted us to think beyond the obvious. We have enjoyed their companionship so much during us stay at NIET, Greater Noida. We would like to thank all those who made my stay in NIET, Greater Noida an unforgettable and rewarding experience. We dedicate this work to them.
  • 6. TABLE OF CONTENTS i. Declaration ii. Certificate iii. Abstract iv. Acknowledgement 1. Introduction 1.1Project Objective 1.2Project Benefit 1.3Project Scope 2. Algorithm 2.1 Traditional LSB Technique 2.2 Proposed Scheme 2.2.1 Encoding Scheme 2.2.2 Decoding Scheme 3. Flow Chart 4. Use Case Diagram 5. Data Flow Diagram 5.1 0-level DFD 5.2 1-Level DFD 6. References
  • 7. 1. Introduction 1.1 Project Objective The objective of this project is to make software which can help to hide the secret message inside a audio file which can help to provide security and safety to the secret and confidential information. In this project we’ll implement a system which will embed a secret text message in a audio file we’ll use an algorithm (which is given in next chapter) for implementing this. 1.2 Project Benefit By hiding the secret message using a cover file like audio as a wrapper, the existence of the secret message is concealed during transmission, which provides security when you want to send secret message over any network. 1.3 Project Scope Finding a message will only be possible with knowledge of the key that is required to uncover it. The main advantage of this proposed algorithm is that the insertion position is totally unknown to anyone who wants to hack the secret message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can easily decode the secret message. So this method is more secure than the traditional one as it do not use any traditional algorithm but a new more secure algorithm. So when this embedded audio will be sent over any network no hacker will ever come to know about the existence of the secret message and in case this somehow they come to know about the existence this position of the bits of secret message will remain unknown forever.
  • 8. 2. Algorithm 2.1 Traditional LSB Coding Technique A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective technique where the LSB substitution doesn't cause significant quality degradation. In computing, the least significant bit (LSB) is the bit position in a binary integer giving the units value, that is, determining whether the number is even or odd. The LSB is sometimes referred to as the right-most bit, due to the convention in positional notation of writing less significant digit further to the right. It is analogous to the least significant digit of a decimal integer, which is the digit in the ones (right-most) position. 1 0 0 1 0 1 0 1 Figure 1: Binary representation of decimal 149 The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit binary number represents a value of 128 decimal. The LSB represents a value of 1. For example, to hide the letter "a" (ASCII code 97, which is 01100001) inside eight bytes of a cover, you can set the LSB of each byte like this: 10010010 01010011 10011011 11010010 10001010 00000010 01110010 00101011 The application decoding the cover reads the eight Least Significant Bits of those bytes to recreate the hidden byte— that is 0110001—the letter "a." As you may realize, using this technique let you hide a byte every eight bytes of the cover. Note that there's a fifty percent chance that the bit you're replacing is the same as its replacement, in other words, half the time, the bit doesn't change, which helps to minimize quality degradation. Fig 2 illustrates how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. Here the secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information ‘HEY’ and the audio file are converted into bit stream. The least significant column of the audio file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is called Stego-file.
  • 9. Figure 2: LSB coding example 2.2 Proposed Scheme In our proposed scheme we will use the traditional LSB algorithm as the base algorithm and will work by taking help of the LSB algorithm but as the traditional scheme is old and outdated so, it is less secure and it will not be able to give proper security as per today’s demand. Here, we’ll try to develop a new algorithm using some new logics which will provide more security to our project and the encoding and decoding techniques of the new proposed algorithm are given below. 2.2.1 Encoding Scheme An audio (WAV) file contains number of carrier audio sample (as shown in fig.3). Analog Signal Sampling Digital Signal Figure 3: Digital sampling of analog signal In traditional LSB algorithm, to hide the secrete message into the audio file, it requires to convert the secret message in binary format and replace each bit in sequenced manner. But in proposed algorithm the secret bit value to be inserted in a different manner unlike traditional way.
  • 10. Initially the secrete message has to encrypted with some standard encryption algorithm with a key supplied by the sender and shared with the receiver. Then the position for insertion inside the sample of the carrier audio file has to be selected based on the decimal value of first 3 MSB bits. Suppose, first 3 MSB bits’ of a sample are 100 (decimal value is 4), then one bit of the secrete message has to be inserted at the 4th position of the corresponding sample of carrier audio file. After the decimal value for 3 MSB bits are considered for the next sample and similarly the next secrete bit has to be put at the decimal valued position and the process will be repeated for each bit in the secrete message till the full secrete message is hidden. The encoding example is as shown in fig. 4. Figure 4: Bits of a secret Message are embedded in a 16-bit CD quality sample using the proposed method The main advantage of this proposed algorithm is that the insertion position is totally unknown to anyone who wants to hack the secret message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can easily decode the secret message. So this method is more secure than the traditional one. The algorithm and process flow (fig 5) are as follows-
  • 11. Algorithm for encoding Input: Audio file in WAV format to use as carrier and the Secret Message to hide as text file, a key for encryption Output: Stego Audio File containing hidden message The steps are as follows:- 1. The secrete message has to be encrypted using a key supplied by the sender and shared with the receiver. Consider the binary of the cipher text of the secrete message to be hidden. If the secret message is in text then convert it into the respective ASCII value and after that it will be converted into binary pattern. 2. Read a secret bit from the sequence to hide. 3. Convert each audio sample into a 16 bit sequence. 4. For each audio sample value Do , 4.1 From the carrier sample first (MSB) 3 bits to be read and converted into decimal value. That generated values is the insertion position of the secret bit inside that audio sample. 4.2 Insert a secret bit into a selected position which was determined by the previous step. 5. Repeat the steps until all the secret bit values are replaced. 6. Stop. Figure 5: The process of encoding 2.2.2 Decoding Scheme The same pattern, which was used to encode the audio, used to decode the modified wav file to get back the original (secrete) message. The message is first decoded and then decrypted by the same encryption key to get the message in its original form. Decoded algorithm and process (fig 6) are as follows-
  • 12. Algorithm for decoding Input: Stego Audio File containing hidden message Output: Secret message The steps are as follows:- 1. First we have to select the random bits from the stego audio sample which was generated by the proposed way. 2. If the secret message is present into the audio file then recognize the random bit positions and Decrypt the values using proposed algorithm. 3. Repeat the previous step until we will get the whole secret message. 4. Display the message to the end user after decrypting 5. Stop. Figure 6: Process of decoding The decoding example is as shown in fig. 7 Figure 7: Decoding Example
  • 13. 3. Flow Chart START Enter The Carrier Audio Signal(A) Enter The Secret Text Message(T) Is A>8T Display: Message is too large Enter The Secret Key Sequence Generation Encryption & Embedding Stego File Ready STOP
  • 14. 4. Use Case Diagram
  • 15. 5.Data Flow Diagram 5.1 0- Level DFD 5.2 Level 1 DFD Embedded stego file Encrypted secret msg Secret Message Audio File Steganographic system STEGNO FILE: Secret msg. + audio File SECRET MESSAGE STEGANOGRAPHIC ENCRYPTION PROCESS STEGO FILE: SECRET MSG + CARRIER FILE CARRIER FILE COMPRESSION PROCESS DECOMPRESSION PROCESS DECRYPTION SECRET MESSAGE