This document is a synopsis submitted for a degree in bachelor of technology. It describes a project on audio steganography, where a secret message is hidden in a digital audio file. The synopsis includes an introduction describing the objective, benefits and scope of the project. It also includes sections on the encoding and decoding algorithms, flow charts, use case and data flow diagrams, and references.
Software and Systems Engineering Standards: Verification and Validation of Sy...
Audio Steganography synopsis
1. A
SYNOPSIS
ON
“AUDIO STEGANOGRAPHY”
Submitted in partial fulfillment of the requirements
For the degree of
BACHELOR OF TECHNOLOGY
in
Computer Science & Engineering
Submitted by
KUMAR KARTIKEYA UPADHYAY
KM. NEHA RANI
MANVI GUPTA
RAJU RAJPUT
Under the Supervision of
Mr. SURYA PRAKASH SHARMA
Noida Institute of Engineering &Technology, Greater Noida (UP) -201306
Uttar Pradesh Technical University, Lucknow
2014 - 2015
2. DECLARATION
We hereby declare that this submission is our own work and that, to the best of my knowledge and belief, it contains
no material previously published or written by another person nor material which to a substantial extent has been
accepted for the award of any other degree of the university or other institute of higher learning, except where due
acknowledgement has been in the text.
Signature-
Name- Kumar Kartikeya Upadhyay
Roll No. - (1113310103)
Date- 19-11-2014
Signature-
Name- Km. Neha Rani
Roll No. - (1113310099)
Date- 19-11-2014
Signature-
Name- Manvi Gupta
Roll No. - (1113310112)
Date- 19-11-2014
Signature-
Name- Raju Rajput
Roll No. - (1113310163)
Date- 19-11-2014
3. CERTIFICATE
This is to certify that the synopsis entitled “AUDIO STEGANOGRAPHY” submitted by KUMAR
KARTIKEYA UPADHYAY (1113310103) , KM. NEHA RANI (1113310099) , MANVI GUPTA
(1113310112) & RAJU RAJPUT (1113310163) in the partial fulfillment of the requirements for
award of Bachelor of Technology in Computer Science and Engineering from Uttar Pradesh
Technical University, Lucknow under my supervision. The synopsis embodies result of original work
and studies carried out by the student’s their self and the contents of the synopsis do not form the
basis for the award of any other degree to the candidate or to anybody else from this or any other
University/Institution.
Mr. SURYA PRAKASH SHARMA
Assistant Professor (CSE)
NIET, Greater Noida
4. ABSTRACT
Embedding secret message into digital sound is called audio steganography. Audio Steganography is
presented where the bits of a secret message are embedded into the coefficients of a cover audio.
Steganography is the art and science of secret communication. In this project a new scheme for digital audio
steganography is presented where the bits of a secret message are embedded into the coefficients of a cover
audio. Each secret bit is embedded into the selected position of a cover coefficient. The position for insertion
of a secret bit is selected from the 0th (Least Significant Bit) to 8th LSB based on the upper three MSB
(Most Significant Bit). This scheme provides high audio quality, robustness and lossless recovery from the
cover Audio.
5. ACKNOWLEDGEMENT
This synopsis is by far the most significant accomplishment in our life and it would be impossible without people who
supported us and believed us. We would like to extend our gratitude and our sincere thanks to our honorable, esteemed
guide Mr. SURYA PRAKASH SHARMA(Assistant Professor (CSE), Department of Computer Science and
Engineering, NIET, Greater Noida for their immeasurable guidance and valuable time that he devoted for synopsis.
We sincerely thank for their exemplary guidance and encouragement. His trust and support inspired us in the most
important moments of making right decisions and we are glad to work with him.
We would also like to give very special thanks to Dr. RAJDEV TIWARI HOD (CSE). Also we would also like to
give thanks to our teachers for their support, help and encouragement during this work. We would like to thank all our
friends and for all the thoughtful and mind stimulating discussions we had, which prompted us to think beyond the
obvious.
We have enjoyed their companionship so much during us stay at NIET, Greater Noida. We would like to thank all
those who made my stay in NIET, Greater Noida an unforgettable and rewarding experience. We dedicate this work to
them.
6. TABLE OF CONTENTS
i. Declaration
ii. Certificate
iii. Abstract
iv. Acknowledgement
1. Introduction
1.1Project Objective
1.2Project Benefit
1.3Project Scope
2. Algorithm
2.1 Traditional LSB Technique
2.2 Proposed Scheme
2.2.1 Encoding Scheme
2.2.2 Decoding Scheme
3. Flow Chart
4. Use Case Diagram
5. Data Flow Diagram
5.1 0-level DFD
5.2 1-Level DFD
6. References
7. 1. Introduction
1.1 Project Objective
The objective of this project is to make software which can help to hide the secret message inside a audio file which
can help to provide security and safety to the secret and confidential information. In this project we’ll implement a
system which will embed a secret text message in a audio file we’ll use an algorithm (which is given in next chapter)
for implementing this.
1.2 Project Benefit
By hiding the secret message using a cover file like audio as a wrapper, the existence of the secret message is
concealed during transmission, which provides security when you want to send secret message over any network.
1.3 Project Scope
Finding a message will only be possible with knowledge of the key that is required to uncover it. The main advantage
of this proposed algorithm is that the insertion position is totally unknown to anyone who wants to hack the secret
message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can easily decode the
secret message. So this method is more secure than the traditional one as it do not use any traditional algorithm but a
new more secure algorithm.
So when this embedded audio will be sent over any network no hacker will ever come to know about the existence of
the secret message and in case this somehow they come to know about the existence this position of the bits of secret
message will remain unknown forever.
8. 2. Algorithm
2.1 Traditional LSB Coding Technique
A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in
some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective
technique where the LSB substitution doesn't cause significant quality degradation.
In computing, the least significant bit (LSB) is the bit position in a binary integer giving the units value, that is,
determining whether the number is even or odd. The LSB is sometimes referred to as the right-most bit, due to the
convention in positional notation of writing less significant digit further to the right. It is analogous to the least
significant digit of a decimal integer, which is the digit in the ones (right-most) position.
1
0
0
1
0
1
0
1
Figure 1: Binary representation of decimal 149
The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit binary number represents a
value of 128 decimal. The LSB represents a value of 1. For example, to hide the letter "a" (ASCII code 97, which is
01100001) inside eight bytes of a cover, you can set the LSB of each byte like this:
10010010
01010011
10011011
11010010
10001010
00000010
01110010
00101011
The application decoding the cover reads the eight Least Significant Bits of those bytes to recreate the hidden byte—
that is 0110001—the letter "a." As you may realize, using this technique let you hide a byte every eight bytes of the
cover. Note that there's a fifty percent chance that the bit you're replacing is the same as its replacement, in other
words, half the time, the bit doesn't change, which helps to minimize quality degradation.
Fig 2 illustrates how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. Here the
secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the
secret information ‘HEY’ and the audio file are converted into bit stream. The least significant column of the audio
file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information
‘HEY’ is called Stego-file.
9. Figure 2: LSB coding example
2.2 Proposed Scheme
In our proposed scheme we will use the traditional LSB algorithm as the base algorithm and will work by taking help
of the LSB algorithm but as the traditional scheme is old and outdated so, it is less secure and it will not be able to
give proper security as per today’s demand.
Here, we’ll try to develop a new algorithm using some new logics which will provide more security to our project and
the encoding and decoding techniques of the new proposed algorithm are given below.
2.2.1 Encoding Scheme
An audio (WAV) file contains number of carrier audio sample (as shown in fig.3).
Analog Signal Sampling Digital Signal
Figure 3: Digital sampling of analog signal
In traditional LSB algorithm, to hide the secrete message into the audio file, it requires to convert the secret message
in binary format and replace each bit in sequenced manner. But in proposed algorithm the secret bit value to be
inserted in a different manner unlike traditional way.
10. Initially the secrete message has to encrypted with some standard encryption algorithm with a key supplied by the
sender and shared with the receiver. Then the position for insertion inside the sample of the carrier audio file has to be
selected based on the decimal value of first 3 MSB bits.
Suppose, first 3 MSB bits’ of a sample are 100 (decimal value is 4), then one bit of the secrete message has to be
inserted at the 4th position of the corresponding sample of carrier audio file. After the decimal value for 3 MSB bits
are considered for the next sample and similarly the next secrete bit has to be put at the decimal valued position and
the process will be repeated for each bit in the secrete message till the full secrete message is hidden. The encoding
example is as shown in fig. 4.
Figure 4: Bits of a secret Message are embedded in a 16-bit CD quality sample using the proposed method
The main advantage of this proposed algorithm is that the insertion position is totally unknown to anyone who wants
to hack the secret message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can
easily decode the secret message. So this method is more secure than the traditional one. The algorithm and process
flow (fig 5) are as follows-
11. Algorithm for encoding
Input: Audio file in WAV format to use as carrier and the Secret Message to hide as text file, a key for encryption
Output: Stego Audio File containing hidden message
The steps are as follows:-
1. The secrete message has to be encrypted using a key supplied by the sender and shared with the receiver. Consider
the binary of the cipher text of the secrete message to be hidden. If the secret message is in text then convert it into the
respective ASCII value and after that it will be converted into binary pattern.
2. Read a secret bit from the sequence to hide.
3. Convert each audio sample into a 16 bit sequence.
4. For each audio sample value
Do ,
4.1 From the carrier sample first (MSB) 3 bits to be read and converted into decimal value. That
generated values is the insertion position of the secret bit inside that audio sample.
4.2 Insert a secret bit into a selected position which was determined by the previous step.
5. Repeat the steps until all the secret bit values are replaced.
6. Stop.
Figure 5: The process of encoding
2.2.2 Decoding Scheme
The same pattern, which was used to encode the audio, used to decode the modified wav file to get back the original
(secrete) message. The message is first decoded and then decrypted by the same encryption key to get the message in
its original form.
Decoded algorithm and process (fig 6) are as follows-
12. Algorithm for decoding
Input: Stego Audio File containing hidden message
Output: Secret message
The steps are as follows:-
1. First we have to select the random bits from the stego audio sample which was generated by the proposed way.
2. If the secret message is present into the audio file then recognize the random bit positions and Decrypt the values
using proposed algorithm.
3. Repeat the previous step until we will get the whole secret message.
4. Display the message to the end user after decrypting
5. Stop.
Figure 6: Process of decoding
The decoding example is as shown in fig. 7
Figure 7: Decoding Example
13. 3. Flow Chart
START
Enter The
Carrier Audio
Signal(A)
Enter The Secret Text
Message(T)
Is
A>8T
Display:
Message
is too
large
Enter The Secret Key
Sequence Generation
Encryption & Embedding
Stego File Ready
STOP