Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Audio steganography - LSB

  • Be the first to comment

Audio steganography - LSB

  1. 1. AudioSTEGANOGRAPHY
  2. 2. STEGANOGRAPHY No one apart from the Art and A form of sender and science of security intendedwriting hidden through recipient, messages obscurity suspects the existence of the message www.company.com
  3. 3. STEGANOGRAPHY TECHNIQUE www.company.com
  4. 4. Embedded Data Hidden MESSAGEAudio File MESSAGE
  5. 5. Audio
  6. 6. AUDIO TERMS• Sampling is the process in whichthe analogue values are only captured at regulartime intervals.• Quantization converts each input value into one of a discrete value.• Popular sampling rates for audio include 8 kHz, 9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and 44.1 kHz www.company.com
  7. 7. Audio File Types File Format Uncompressed Compressed Lossy Loseless WAV AIEF ALAC, FlAC, Mp3, AAC, WMA WavPackwww.company.com
  8. 8. WHY .WAV ?Most popular Audio formatDon’t lose any quality in recordingEasier format for DevelopmentNo Compression!! www.company.com
  9. 9. WAVE FILE FORMAT www.company.com
  10. 10. WAVE FILE FORMATHEX Values of WaveFile Size Chunk Length of Format Data Chunk Audio Attributes www.company.com
  11. 11. Steganography Techniques
  12. 12. TYPES OF STEGANOGRAPHY LSB CODING PHASE CODING ECHO HIDING SPREAD www.company.com SPECTRUM
  13. 13. WHY LSB?Low computational complexityEasier ImplementationVariation in choosing LSB www.company.com
  14. 14. LSB ALGORITHM Step 2 Step 4• Receives the • Check which LSB • Replaces the LSB audio file • Each character to Replace By bit from audio convert it into bit in the message is RC4 Algorithm with LSB bit from pattern. converted into character in the bit pattern. message. Step1 Step 3 www.company.com
  15. 15. CONT. ALGORITHM : CHANGING BITS www.company.com
  16. 16. CONT. ALGORITHM : CHANGING BITS RC4 Algorithm www.company.com
  17. 17. RC4 ALGORITHM RC4 The pseudo- The key- random scheduling generation algorithm (KSA) algorithm (PRGA)www.company.com
  18. 18. RC4 ALGORITHM• The key-scheduling algorithm (KSA) • initialize the permutation in the array "S • Array "S" is initialized to the identity permutation • Swap values of S[i] and S[j]. www.company.com
  19. 19. RC4 ALGORITHM• The pseudo-random generation algorithm (PRGA) • Used as many iterations as are needed www.company.com
  20. 20. Live Demo
  21. 21. QUESTIONSwww.company.com
  22. 22. RESOURCES• Source Code : http://www.codeproject.com/Articles/6960/Steganography- VIII-Hiding-Data-in-Wave-Audio-Files• Other Online • http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413& rep=rep1&type=pdf • deepaldhariwal.weebly.com/uploads/4/9/0/9/4909109/report.docx • http://en.wikipedia.org/wiki/RC4 www.company.com

×