United Institute of Engineering &technology, ALLAHABAD (UP)
United Institute of Engineering &technology, ALLAHABAD (UP)
SYNOPSIS
ON
“AUDIO STEGANOGRAPHY
WITH CRYPTOGRAPHY”
NAME
We hereby declare that this submission is our own work and that, to the best of my knowledge and belief, it contains
no material previously published or written by another person nor material which to a substantial extent has been
accepted for the award of any other degree of the university or other institute of higher learning, except where due
acknowledgement has been in the text.
Signature-
Name-
Roll No. -
Date-
CERTIFICATE
This is to certify that the synopsis entitled “AUDIO STEGANOGRAPHY WITH CRYPTOGRAPHY”
submitted STUDENTS NAME in the partial fulfillment of the requirements for award of Bachelor of
Technology in Computer Science and Engineering from Uttar Pradesh Technical University, Lucknow
under my supervision. The synopsis embodies result of original work and studies carried out by the
student’s their self and the contents of the synopsis do not form the basis for the award of any other
degree to the candidate or to anybody else from this or any other University/Institution.
PROFF. NAME
Assistant Professor (CSE)
UIT , ALLAHABAD
ABSTRACT
Embedding secret message into digital sound is called audio steganography. Audio Steganography is
presented where the bits of a secret message are embedded into the coefficients of a cover audio.
Steganography is the art and science of secret communication. In this project a new scheme for digital audio
steganography is presented where the bits of a secret message are embedded into the coefficients of a cover
audio. Each secret bit is embedded into the selected position of a cover coefficient. The position for insertion
of a secret bit is selected from the 0th (Least Significant Bit) to 8th LSB based on the upper three MSB
(Most Significant Bit). This scheme provides high audio quality, robustness and lossless recovery from the
cover Audio.
ACKNOWLEDGEMENT
This synopsis is by far the most significant accomplishment in our life and it would be impossible without people who
supported us and believed us. We would like to extend our gratitude and our sincere thanks to our honorable, esteemed
guide TEACHER NAME(Assistant Professor (CSE), Department of Computer Science and Engineering, UIT, Greater
Noida for their immeasurable guidance and valuable time that he devoted for synopsis. We sincerely thank for their
exemplary guidance and encouragement. His trust and support inspired us in the most important moments of making
right decisions and we are glad to work with him.
We would also like to give very special thanks to HOD (CSE). Also we would also like to give thanks to our teachers
for their support, help and encouragement during this work. We would like to thank all our friends and for all the
thoughtful and mind stimulating discussions we had, which prompted us to think beyond the obvious.
We have enjoyed their companionship so much during us stay at UIT. We would like to thank all those who made
my stay in UIT, an unforgettable and rewarding experience. We dedicate this work to them.
TABLE OF CONTENTS
i. Declaration
ii. Certificate
iii. Abstract
iv. Acknowledgement
1. Introduction
1.1Project Objective
1.2Project Benefit
1.3Project Scope
2. Algorithm
2.1 Traditional LSB Technique
2.2 Proposed Scheme
2.2.1 Encoding Scheme
2.2.2 Decoding Scheme
3. Flow Chart
4. Use Case Diagram
5. Data Flow Diagram
5.1 0-level DFD
5.2 1-Level DFD
6. References
1. Introduction
The objective of this project is to make software which can help to hide the secret message inside a audio file which
can help to provide security and safety to the secret and confidential information. In this project we’ll implement a
system which will embed a secret text message in a audio file we’ll use an algorithm (which is given in next chapter)
for implementing this.
By hiding the secret message using a cover file like audio as a wrapper, the existence of the secret message is
concealed during transmission, which provides security when you want to send secret message over any network.
Finding a message will only be possible with knowledge of the key that is required to uncover it. The main advantage
of this proposed algorithm is that the insertion position is totally unknown to anyone who wants to hack the secret
message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can easily decode the
secret message. So this method is more secure than the traditional one as it do not use any traditional algorithm but a
new more secure algorithm.
So when this embedded audio will be sent over any network no hacker will ever come to know about the existence of
the secret message and in case this somehow they come to know about the existence this position of the bits of secret
message will remain unknown forever.
2. Algorithm
A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in
some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective
technique where the LSB substitution doesn't cause significant quality degradation.
In computing, the least significant bit (LSB) is the bit position in a binary integer giving the units value, that is,
determining whether the number is even or odd. The LSB is sometimes referred to as the right-most bit, due to the
convention in positional notation of writing less significant digit further to the right. It is analogous to the least
significant digit of a decimal integer, which is the digit in the ones (right-most) position.
1 0 0 1 0 1 0 1
The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit binary number represents a
value of 128 decimal. The LSB represents a value of 1. For example, to hide the letter "a" (ASCII code 97, which is
01100001) inside eight bytes of a cover, you can set the LSB of each byte like this:
10010010
01010011
10011011
11010010
10001010
00000010
01110010
00101011
The application decoding the cover reads the eight Least Significant Bits of those bytes to recreate the hidden byte—
that is 0110001—the letter "a." As you may realize, using this technique let you hide a byte every eight bytes of the
cover. Note that there's a fifty percent chance that the bit you're replacing is the same as its replacement, in other
words, half the time, the bit doesn't change, which helps to minimize quality degradation.
Fig 2 illustrates how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. Here the
secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the
secret information ‘HEY’ and the audio file are converted into bit stream. The least significant column of the audio
file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information
‘HEY’ is called Stego-file.
Figure 2: LSB coding example
In our proposed scheme we will use the traditional LSB algorithm as the base algorithm and will work by taking help
of the LSB algorithm but as the traditional scheme is old and outdated so, it is less secure and it will not be able to
give proper security as per today’s demand.
Here, we’ll try to develop a new algorithm using some new logics which will provide more security to our project and
the encoding and decoding techniques of the new proposed algorithm are given below.
An audio (WAV) file contains number of carrier audio sample (as shown in fig.3).
In traditional LSB algorithm, to hide the secrete message into the audio file, it requires to convert the secret message
in binary format and replace each bit in sequenced manner. But in proposed algorithm the secret bit value to be
inserted in a different manner unlike traditional way.
Initially the secrete message has to encrypted with some standard encryption algorithm with a key supplied by the
sender and shared with the receiver. Then the position for insertion inside the sample of the carrier audio file has to be
selected based on the decimal value of first 3 MSB bits.
Suppose, first 3 MSB bits’ of a sample are 100 (decimal value is 4), then one bit of the secrete message has to be
inserted at the 4th position of the corresponding sample of carrier audio file. After the decimal value for 3 MSB bits
are considered for the next sample and similarly the next secrete bit has to be put at the decimal valued position and
the process will be repeated for each bit in the secrete message till the full secrete message is hidden. The encoding
example is as shown in fig. 4.
Figure 4: Bits of a secret Message are embedded in a 16-bit CD quality sample using the proposed method
The main advantage of this proposed algorithm is that the insertion position is totally unknown to anyone who wants
to hack the secret message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can
easily decode the secret message. So this method is more secure than the traditional one. The algorithm and process
flow (fig 5) are as follows-
Algorithm for encoding
Input: Audio file in WAV format to use as carrier and the Secret Message to hide as text file, a key for encryption
Output: Stego Audio File containing hidden message
START
Enter The
Carrier Audio
Signal(A)
Display:
Message Is
is too A>8T
large
Sequence Generation
STOP
4. Use Case Diagram
5.Data Flow Diagram
Secret
Message
STEGNO FILE:
Steganographic Secret msg. +
system audio File
Audio File
COMPRESSION
PROCESS
STEGO FILE:
SECRET MSG
+ DECRYPTION
CARRIER
FILE
SECRET
MESSAGE
6. References