SlideShare a Scribd company logo
1 of 27
1
A
Project Presentation on
Secure Transmission of Information using
Audio Steganography
Submitted in partial fulfillment of award of
BACHELOR OF TECHNOLOGY
Degree
In
COMPUTER SCIENCE & ENGINEERING
By
KUMAR KARTIKEYA UPADHYAY
KM. NEHA RANI
MANVI GUPTA
RAJU RAJPUT
2011-2015
GUIDE
SURYA PRAKASH SHARMA
ASSISTANT PROFFESOR
NOIDA INSTITUTE OF ENGINEERING &
TECHNOLOGY, GREATER NOIDA(U.P.)
Requirements
HARDWARE
 Intel Core i3 CPU@
2.40 Ghz
 RAM: 2 GB
SOFTWARE
 Matlab 8.1.0.604
 OS-Windows
Microsoft
2
Introduction
 Secure Transmission
 It refers to the transfer of data such as
confidential information.
 TLS and SSL are cryptographic protocols that
provide secure communication on the internet.
3
Steganography
The process of hiding the messages so that the presence of
message itself is hidden , often by writing them in places
where they may not be found.
Select Host
audio
Secret bits
(message)
Secret
message
Preprocessin
g
System
Extract secret
bits from
coefficient
Embedding
bits by location
selection
Select
location in
each
coefficient
Network
4
EXAMPLE
Since everybody can read, encoding
text, in natural sentences in doubtfully
effective.
Since Everybody Can Read, Encoding
Text, In Natural Sentences In Doubtfully
Effective.
‘SECRET INSIDE’
5
Audio Steganography
 Embedding secret message into
digital sound is called audio
steganography.
 Audio Steganography is presented
where the bits of a secret message
are embedded into the coefficients of
a cover audio.
6
Modules
 Take an audio input from the user.
 Convert audio bits into binary format.
 Embed the secret message with binary bits
using MSB.
 Decode the message with the same
procedure as applied in embedding.
 Now original message can be viewed by
the receiver.
7

8
SECRET
MESSAG
E
AUDIO
FILE
STEGANOGRAPHI
C SYSTEM
STEGNO
FILE:
SECRET
MESSAGE
+ AUDIO
FILE
0 LEVEL DFD
LEVEL 1 DFD

9
SECRET
MESSAGE
STEGANOGRAPHI
C
ENCRYPTION
PROCESS
STEGNO
FILE:
SECRET
MESSAGE +
CARRIER
FILE
CARRIER FILE
COMPRESSIO
N PROCESS
DECOMPRESSI
ON PROCESS
DECRYPTION
SECRET FILE
EMBEDDED
STEGO FILE
ENCRYPTED
SECRET MSG
10
Select cover audio file in
wav format
Select file to embed(text &
image )
Embedding starts
Stego audio
E
M
B
E
D
D
I
N
G
11
R
E
T
R
I
E
V
I
N
G
Select Stego Audio
Retrieve Secret
Message
Secret Message
GUI of Embedding Process
12
Select Cover Audio file
13
Histogram of Cover Audio
14
Select Secret message Browse file to embed
15
Embedding Starts….
16
Save Embedded Audio
17
Histogram of Stego Audio
18
GUI of Retrieving Process
19
Browse Stego file
20
Retrieving Starts…..
21
Save Retrieved Message
22
Advantages
 Avoiding communication in well-known
forms greatly reduces the risk of
information being leaked in transit.
 It can also enhance individual privacy.
23
Applications
 Usage in modern printers
 Defense Applications
 Confidential communication and secret
data storing
 Media Database systems
 Protection of data alteration.
24
FUTURE SCOPE
25
CONCLUSION
 Hiding information may introduce enough
visible noise to raise suspicion. Therefore the
carrier or cover audio must be carefully
selected.
 This proposed system is to provide a good,
efficient method for hiding the data from
hackers and sent to the destination in a safe
manner.
 This proposed system will not change the
size of the file even after encoding and also
suitable for any type of audio file format.
 Encryption and Decryption techniques have
been used to make the security system
robust. 26
27

More Related Content

What's hot

Steganography
Steganography Steganography
Steganography
Uttam Jain
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
steganography
steganographysteganography
steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 

Viewers also liked

Steganography basic
Steganography basicSteganography basic
Steganography basic
Sanoj Kumar
 
Anish Kumar (EEE)
Anish Kumar (EEE)Anish Kumar (EEE)
Anish Kumar (EEE)
Anish Kumar
 

Viewers also liked (19)

Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Steganography
SteganographySteganography
Steganography
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
bf32-Final_ (2)
bf32-Final_ (2)bf32-Final_ (2)
bf32-Final_ (2)
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
Steganography basic
Steganography basicSteganography basic
Steganography basic
 
Steganography
SteganographySteganography
Steganography
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
 
Managing Consulting Projects
Managing Consulting ProjectsManaging Consulting Projects
Managing Consulting Projects
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Anish Kumar (EEE)
Anish Kumar (EEE)Anish Kumar (EEE)
Anish Kumar (EEE)
 

Similar to Audio steganography project presentation

Similar to Audio steganography project presentation (20)

Fyp1 slide presentation 2.1
Fyp1 slide presentation 2.1Fyp1 slide presentation 2.1
Fyp1 slide presentation 2.1
 
Fyp1 slide presentation 2.1
Fyp1 slide presentation 2.1Fyp1 slide presentation 2.1
Fyp1 slide presentation 2.1
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Fyp1 slide presentation 2
Fyp1 slide presentation 2Fyp1 slide presentation 2
Fyp1 slide presentation 2
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
30808010 report(1)
30808010 report(1)30808010 report(1)
30808010 report(1)
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
 
HACKING
HACKINGHACKING
HACKING
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
 
F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
Optimization of video steganography with additional compression and encryption
Optimization of video steganography with additional compression and encryptionOptimization of video steganography with additional compression and encryption
Optimization of video steganography with additional compression and encryption
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 

Recently uploaded

Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Recently uploaded (20)

Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 

Audio steganography project presentation