Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Audio steganography project presentation

This is the final presentation for project named "Audio Steganography" for btech final year computer science students, and without the screenshots of the progress this can b used as a synopsis presentation.

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to comment

Audio steganography project presentation

  1. 1. 1 A Project Presentation on Secure Transmission of Information using Audio Steganography Submitted in partial fulfillment of award of BACHELOR OF TECHNOLOGY Degree In COMPUTER SCIENCE & ENGINEERING By KUMAR KARTIKEYA UPADHYAY KM. NEHA RANI MANVI GUPTA RAJU RAJPUT 2011-2015 GUIDE SURYA PRAKASH SHARMA ASSISTANT PROFFESOR NOIDA INSTITUTE OF ENGINEERING & TECHNOLOGY, GREATER NOIDA(U.P.)
  2. 2. Requirements HARDWARE  Intel Core i3 CPU@ 2.40 Ghz  RAM: 2 GB SOFTWARE  Matlab 8.1.0.604  OS-Windows Microsoft 2
  3. 3. Introduction  Secure Transmission  It refers to the transfer of data such as confidential information.  TLS and SSL are cryptographic protocols that provide secure communication on the internet. 3
  4. 4. Steganography The process of hiding the messages so that the presence of message itself is hidden , often by writing them in places where they may not be found. Select Host audio Secret bits (message) Secret message Preprocessin g System Extract secret bits from coefficient Embedding bits by location selection Select location in each coefficient Network 4
  5. 5. EXAMPLE Since everybody can read, encoding text, in natural sentences in doubtfully effective. Since Everybody Can Read, Encoding Text, In Natural Sentences In Doubtfully Effective. ‘SECRET INSIDE’ 5
  6. 6. Audio Steganography  Embedding secret message into digital sound is called audio steganography.  Audio Steganography is presented where the bits of a secret message are embedded into the coefficients of a cover audio. 6
  7. 7. Modules  Take an audio input from the user.  Convert audio bits into binary format.  Embed the secret message with binary bits using MSB.  Decode the message with the same procedure as applied in embedding.  Now original message can be viewed by the receiver. 7
  8. 8.  8 SECRET MESSAG E AUDIO FILE STEGANOGRAPHI C SYSTEM STEGNO FILE: SECRET MESSAGE + AUDIO FILE 0 LEVEL DFD
  9. 9. LEVEL 1 DFD  9 SECRET MESSAGE STEGANOGRAPHI C ENCRYPTION PROCESS STEGNO FILE: SECRET MESSAGE + CARRIER FILE CARRIER FILE COMPRESSIO N PROCESS DECOMPRESSI ON PROCESS DECRYPTION SECRET FILE EMBEDDED STEGO FILE ENCRYPTED SECRET MSG
  10. 10. 10 Select cover audio file in wav format Select file to embed(text & image ) Embedding starts Stego audio E M B E D D I N G
  11. 11. 11 R E T R I E V I N G Select Stego Audio Retrieve Secret Message Secret Message
  12. 12. GUI of Embedding Process 12
  13. 13. Select Cover Audio file 13
  14. 14. Histogram of Cover Audio 14
  15. 15. Select Secret message Browse file to embed 15
  16. 16. Embedding Starts…. 16
  17. 17. Save Embedded Audio 17
  18. 18. Histogram of Stego Audio 18
  19. 19. GUI of Retrieving Process 19
  20. 20. Browse Stego file 20
  21. 21. Retrieving Starts….. 21
  22. 22. Save Retrieved Message 22
  23. 23. Advantages  Avoiding communication in well-known forms greatly reduces the risk of information being leaked in transit.  It can also enhance individual privacy. 23
  24. 24. Applications  Usage in modern printers  Defense Applications  Confidential communication and secret data storing  Media Database systems  Protection of data alteration. 24
  25. 25. FUTURE SCOPE 25
  26. 26. CONCLUSION  Hiding information may introduce enough visible noise to raise suspicion. Therefore the carrier or cover audio must be carefully selected.  This proposed system is to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safe manner.  This proposed system will not change the size of the file even after encoding and also suitable for any type of audio file format.  Encryption and Decryption techniques have been used to make the security system robust. 26
  27. 27. 27

×