Software and Hardware Specifications: 2.1 Problem Analysis
Software and Hardware Specifications: 2.1 Problem Analysis
Domain analysis deals with the objective of gathering information about Steganography.
Domain analysis is to collect the information regarding the thing to done in the system.
This will help the developers to generate the system in an efficient way.
LSB:- (Least Significant Bytes) When files are created there are usually some
bytes in the file that aren't really needed, or at least aren't that important.
DES:- Data Encryption Standard is an algorithm to Encrypt the plain text and
to Decrypt the cipher text.
AU Format:- AU is one of the most common audio formats used on the Web.
It was created by Sun Microsystems and is sometimes referred to as
"audio/basic" format. Most browsers support the au format with their internal
sound players. An au-formatted file has this extension: sound.au
3. General knowledge about the Domain:
If one were able to hide the message in the audio file in such a way, that there
would be no perceivable changes in the audio file after the message insertion. At the same
time, if the message that is to be hidden were encrypted, the level of security would be
raised to quite a satisfactory level.
Cover c
Encoder
(Hiding Mechanism)
Message m
Key k
Stego- object
s
Insecure
Channel
Stego- object
s
Decoder
(Extraction Mechanism)
Key k
Message m
Here the cover is an AU formatted audio file. The hiding mechanism used is Low bit
encoding. The message and the key is used to generate the cipher text using DES
algorithm.
No. of channels.
Sample rate
Frame rate.
Byte order
In java sound API a file format is represented by an audio file format object which contains
File type
Audio format object that specifies the data format of the audio
data contained in the file.
Encryption method:
We use password based encryption method. a general approach to PBE for the
protection of the password tables is to combine a password with a salt to produce a key.
SALT
Salt can be viewed as an index into a large set of keys derived form
the password and need not be kept secret.
Although it may be possible for a component too create table of possible
passwords it is extremely difficult to construct table of possible keys as there will
be many possible keys for each password.
ITERATION COUNT
It indicates how many times to iterate some underlying function by which
keys are derived. Modest number of iteration is more than 1000.
KEY DERIVATION
It is given as
DK = KDF(P,S)
DK - derived key
P
- password
- salt
PBKDF1 (P,S,C,DKlen)
Input:
P password
S - salt
C iteration count
DKlen length of derived key.
Output:
DK derived key.
Steps:
1. if DKlen > 16 for MD5 output derived key too long and stop.
2. apply hash function c times to P an S
T1 = Hash ( P | | S )
T2 = Hash ( T1)
...
T3 = Hash ( Tc 1 )
DK = Tc < 0 . . dkLen 1 >
Message m
Key k
Encrypt
Cipher Text
Encryption:
Plaintext
Encryption algorithm
Secret Key
Cipher text
Decryption algorithm
Security depends on the secrecy of the key, not the secrecy of the algorithm.
Cryptography:
Encryption Algorithm:
Li = Ri-1
Ri = Li-1
F(Ri-1, Ki)
Concerns about:
Embedding:
Now the cipher text is placed in the audio file in such a way that there would be no
change in the audio. Using the Low Bit Encoding method the message is inserted in the
audio. By replacing the least significant bit of each sampling point by a coded binary string,
we can encode a large amount of data in an audio signal.
Major disadvantage of this method is its poor immunity to manipulation. Encoded
information can be destroyed by channel noise, re sampling unless it is encoded using
redundancy techniques. This method is useful only in closed, digital to digital
environments.
5. Environment:
The proposed system should work under the fallowing environment
Operating system
: Windows XP / 2000
Main memory
: 128 MB
Secondary memory
: 8 MB for program
Software
: JDK 1.6
1. Technical feasibility:
The package JAVA which is being used to develop this software is technically a
reliable package to develop any system. It is capable of handling audio files, playing
audio clips and to create a most user friendly GUI.
2. Development risk:
There is no risk in developing the software using packages JAVA since it is
widely used package and also more reliable to develop systems.
3. Resources availability:
The system does not require any additional resources to perform its operations,
but to read the audio format is the only task performed by the user manually.
4. Functional feasibility:
Functionally the system has no drawbacks since it is designed under desired
conditions.
5. Economic feasibility:
Economically the system has no troubles.
2.5 Features of the proposed system:
: Windows XP / 2000
Main memory
: 512 MB
Secondary memory
: 25 MB for program
Software
: JDK 1.6
2. Glossary:
Various terms used in the system are
Carrier File: A file which has hidden information inside of it.
Steganalysis: The process of detecting hidden information inside of a file.
Stego-Medium: The medium in which the information is hidden.
Redundant Bits: Pieces of information inside a file which can be
overwritten or altered with out damaging the file.
LSB:- (Least Significant Bytes) When files are created there are usually some
bytes in the file that aren't really needed, or at least aren't that important.
Embed:- The process of hiding text in Audio file.
DES:- Data Encryption Standard is an algorithm to Encrypt the plain text and
to Decrypt the cipher text.
AU Format:- AU is one of the most common audio formats used on the Web.
It was created by Sun Microsystems and is sometimes referred to as
"audio/basic" format. Most browsers support the au format with their internal
sound players. An au-formatted file has this extension:
sound.au
3. General knowledge about the Domain:
If one were able to hide the message in the audio file in such a way, that there
would be no perceivable changes in the audio file after the message insertion. At the same
time, if the message that is to be hidden were encrypted, the level of security would be
raised to quite a satisfactory level.
Cover c
Encoder
(Hiding Mechanism)
Message m
Stego- object
s
Key k
Insecure
Channel
Stego- object
s
Decoder
(Extraction Mechanism)
Key k
Message m
Here the cover is an AU formatted audio file. The hiding mechanism used is
Low bit encoding. The message and the key is used to generate the cipher text using
DES algorithm.
Encryption method:
We use password based encryption method. a general approach to PBE for the
protection of the password tables is to combine a password with a salt to produce a key.
SALT
Salt can be viewed as an index into a large set of keys derived form the password
and need not be kept secret.
Although it may be possible for a component too create table of possible passwords it is
extremely difficult to construct table of possible keys as there will be many possible keys
for each password.
ITERATION COUNT
It indicates how many times to iterate some underlying function by which keys are
derived. Modest number of iteration is more than 1000.
Encryption:
Plaintext
Encryption algorithm
Secret Key
Cipher text
Decryption algorithm
Security depends on the secrecy of the key, not the secrecy of the algorithm
Cryptography:
Encryption Algorithm:
Li = Ri-1
Ri = Li-1
F(Ri-1, Ki)
Concerns about:
Embedding:
Now the cipher text is placed in the audio file in such a way that there would be no
change in the audio. Using the Low Bit Encoding method the message is inserted in the
audio. By replacing the least significant bit of each sampling point by a coded binary string,
we can encode a large amount of data in an audio signal.
Major disadvantage of this method is its poor immunity to manipulation. Encoded
information can be destroyed by channel noise, re sampling unless it is encoded using
redundancy techniques. This method is useful only in closed, digital to digital
environments.
: Windows XP / 2000
Main memory
: 128 MB
Secondary memory
: 8 MB for program
Software
: JDK 1.6