0% found this document useful (0 votes)
15 views

United Institute of Engineering &technology, ALLAHABAD (UP)

This document provides an abstract for a project on "Audio Steganography with Cryptography". It discusses embedding a secret message into digital audio by inserting the bits of the secret message into the coefficients of a cover audio. A new scheme is proposed where each secret bit is embedded into a selected position of a cover coefficient based on the value of the upper three most significant bits. This approach aims to provide high audio quality, robustness, and lossless recovery of the secret message from the cover audio. The abstract concludes by stating that the contents of the document do not form the basis for any other academic award.

Uploaded by

Anuj Tripathi
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

United Institute of Engineering &technology, ALLAHABAD (UP)

This document provides an abstract for a project on "Audio Steganography with Cryptography". It discusses embedding a secret message into digital audio by inserting the bits of the secret message into the coefficients of a cover audio. A new scheme is proposed where each secret bit is embedded into a selected position of a cover coefficient based on the value of the upper three most significant bits. This approach aims to provide high audio quality, robustness, and lossless recovery of the secret message from the cover audio. The abstract concludes by stating that the contents of the document do not form the basis for any other academic award.

Uploaded by

Anuj Tripathi
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

A

SYNOPSIS
ON

“AUDIO STEGANOGRAPHY
WITH CRYPTOGRAPHY”

Submitted in partial fulfillment of the requirements


For the degree of
BACHELOR OF TECHNOLOGY
in
Computer Science & Engineering
Submitted by
NAME
NAME
NAME
NAME

Under the Supervision of

NAME

United Institute of Engineering &Technology, ALLAHABAD (UP)

Uttar Pradesh Technical University, Lucknow


2017 - 2018
DECLARATION

We hereby declare that this submission is our own work and that, to the best of my knowledge and belief, it contains
no material previously published or written by another person nor material which to a substantial extent has been
accepted for the award of any other degree of the university or other institute of higher learning, except where due
acknowledgement has been in the text.

Signature-
Name-
Roll No. -
Date-
CERTIFICATE
This is to certify that the synopsis entitled “AUDIO STEGANOGRAPHY WITH CRYPTOGRAPHY”
submitted STUDENTS NAME in the partial fulfillment of the requirements for award of Bachelor of
Technology in Computer Science and Engineering from Uttar Pradesh Technical University, Lucknow
under my supervision. The synopsis embodies result of original work and studies carried out by the
student’s their self and the contents of the synopsis do not form the basis for the award of any other
degree to the candidate or to anybody else from this or any other University/Institution.

PROFF. NAME
Assistant Professor (CSE)
UIT , ALLAHABAD
ABSTRACT

Embedding secret message into digital sound is called audio steganography. Audio Steganography is
presented where the bits of a secret message are embedded into the coefficients of a cover audio.
Steganography is the art and science of secret communication. In this project a new scheme for digital audio
steganography is presented where the bits of a secret message are embedded into the coefficients of a cover
audio. Each secret bit is embedded into the selected position of a cover coefficient. The position for insertion
of a secret bit is selected from the 0th (Least Significant Bit) to 8th LSB based on the upper three MSB
(Most Significant Bit). This scheme provides high audio quality, robustness and lossless recovery from the
cover Audio.
ACKNOWLEDGEMENT

This synopsis is by far the most significant accomplishment in our life and it would be impossible without people who
supported us and believed us. We would like to extend our gratitude and our sincere thanks to our honorable, esteemed
guide TEACHER NAME(Assistant Professor (CSE), Department of Computer Science and Engineering, UIT, Greater
Noida for their immeasurable guidance and valuable time that he devoted for synopsis. We sincerely thank for their
exemplary guidance and encouragement. His trust and support inspired us in the most important moments of making
right decisions and we are glad to work with him.
We would also like to give very special thanks to HOD (CSE). Also we would also like to give thanks to our teachers
for their support, help and encouragement during this work. We would like to thank all our friends and for all the
thoughtful and mind stimulating discussions we had, which prompted us to think beyond the obvious.
We have enjoyed their companionship so much during us stay at UIT. We would like to thank all those who made
my stay in UIT, an unforgettable and rewarding experience. We dedicate this work to them.
TABLE OF CONTENTS
i. Declaration
ii. Certificate
iii. Abstract
iv. Acknowledgement

1. Introduction
1.1Project Objective
1.2Project Benefit
1.3Project Scope
2. Algorithm
2.1 Traditional LSB Technique
2.2 Proposed Scheme
2.2.1 Encoding Scheme
2.2.2 Decoding Scheme
3. Flow Chart
4. Use Case Diagram
5. Data Flow Diagram
5.1 0-level DFD
5.2 1-Level DFD
6. References
1. Introduction

1.1 Project Objective

The objective of this project is to make software which can help to hide the secret message inside a audio file which
can help to provide security and safety to the secret and confidential information. In this project we’ll implement a
system which will embed a secret text message in a audio file we’ll use an algorithm (which is given in next chapter)
for implementing this.

1.2 Project Benefit

By hiding the secret message using a cover file like audio as a wrapper, the existence of the secret message is
concealed during transmission, which provides security when you want to send secret message over any network.

1.3 Project Scope

Finding a message will only be possible with knowledge of the key that is required to uncover it. The main advantage
of this proposed algorithm is that the insertion position is totally unknown to anyone who wants to hack the secret
message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can easily decode the
secret message. So this method is more secure than the traditional one as it do not use any traditional algorithm but a
new more secure algorithm.
So when this embedded audio will be sent over any network no hacker will ever come to know about the existence of
the secret message and in case this somehow they come to know about the existence this position of the bits of secret
message will remain unknown forever.
2. Algorithm

2.1 Traditional LSB Coding Technique

A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in
some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective
technique where the LSB substitution doesn't cause significant quality degradation.
In computing, the least significant bit (LSB) is the bit position in a binary integer giving the units value, that is,
determining whether the number is even or odd. The LSB is sometimes referred to as the right-most bit, due to the
convention in positional notation of writing less significant digit further to the right. It is analogous to the least
significant digit of a decimal integer, which is the digit in the ones (right-most) position.

1 0 0 1 0 1 0 1

Figure 1: Binary representation of decimal 149

The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit binary number represents a
value of 128 decimal. The LSB represents a value of 1. For example, to hide the letter "a" (ASCII code 97, which is
01100001) inside eight bytes of a cover, you can set the LSB of each byte like this:

10010010
01010011
10011011
11010010
10001010
00000010
01110010
00101011

The application decoding the cover reads the eight Least Significant Bits of those bytes to recreate the hidden byte—
that is 0110001—the letter "a." As you may realize, using this technique let you hide a byte every eight bytes of the
cover. Note that there's a fifty percent chance that the bit you're replacing is the same as its replacement, in other
words, half the time, the bit doesn't change, which helps to minimize quality degradation.

Fig 2 illustrates how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. Here the
secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the
secret information ‘HEY’ and the audio file are converted into bit stream. The least significant column of the audio
file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information
‘HEY’ is called Stego-file.
Figure 2: LSB coding example

2.2 Proposed Scheme

In our proposed scheme we will use the traditional LSB algorithm as the base algorithm and will work by taking help
of the LSB algorithm but as the traditional scheme is old and outdated so, it is less secure and it will not be able to
give proper security as per today’s demand.
Here, we’ll try to develop a new algorithm using some new logics which will provide more security to our project and
the encoding and decoding techniques of the new proposed algorithm are given below.

2.2.1 Encoding Scheme

An audio (WAV) file contains number of carrier audio sample (as shown in fig.3).

Analog Signal Sampling Digital Signal

Figure 3: Digital sampling of analog signal

In traditional LSB algorithm, to hide the secrete message into the audio file, it requires to convert the secret message
in binary format and replace each bit in sequenced manner. But in proposed algorithm the secret bit value to be
inserted in a different manner unlike traditional way.
Initially the secrete message has to encrypted with some standard encryption algorithm with a key supplied by the
sender and shared with the receiver. Then the position for insertion inside the sample of the carrier audio file has to be
selected based on the decimal value of first 3 MSB bits.
Suppose, first 3 MSB bits’ of a sample are 100 (decimal value is 4), then one bit of the secrete message has to be
inserted at the 4th position of the corresponding sample of carrier audio file. After the decimal value for 3 MSB bits
are considered for the next sample and similarly the next secrete bit has to be put at the decimal valued position and
the process will be repeated for each bit in the secrete message till the full secrete message is hidden. The encoding
example is as shown in fig. 4.

Figure 4: Bits of a secret Message are embedded in a 16-bit CD quality sample using the proposed method

The main advantage of this proposed algorithm is that the insertion position is totally unknown to anyone who wants
to hack the secret message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can
easily decode the secret message. So this method is more secure than the traditional one. The algorithm and process
flow (fig 5) are as follows-
Algorithm for encoding

Input: Audio file in WAV format to use as carrier and the Secret Message to hide as text file, a key for encryption
Output: Stego Audio File containing hidden message

The steps are as follows:-


1. The secrete message has to be encrypted using a key supplied by the sender and shared with the receiver. Consider
the binary of the cipher text of the secrete message to be hidden. If the secret message is in text then convert it into the
respective ASCII value and after that it will be converted into binary pattern.
2. Read a secret bit from the sequence to hide.
3. Convert each audio sample into a 16 bit sequence.
4. For each audio sample value
Do ,
4.1 From the carrier sample first (MSB) 3 bits to be read and converted into decimal value. That
generated values is the insertion position of the secret bit inside that audio sample.
4.2 Insert a secret bit into a selected position which was determined by the previous step.
5. Repeat the steps until all the secret bit values are replaced.
6. Stop.

Figure 5: The process of encoding

2.2.2 Decoding Scheme


The same pattern, which was used to encode the audio, used to decode the modified wav file to get back the original
(secrete) message. The message is first decoded and then decrypted by the same encryption key to get the message in
its original form.
Decoded algorithm and process (fig 6) are as follows-
Algorithm for decoding
Input: Stego Audio File containing hidden message
Output: Secret message

The steps are as follows:-


1. First we have to select the random bits from the stego audio sample which was generated by the proposed way.
2. If the secret message is present into the audio file then recognize the random bit positions and Decrypt the values
using proposed algorithm.
3. Repeat the previous step until we will get the whole secret message.
4. Display the message to the end user after decrypting
5. Stop.

Figure 6: Process of decoding

The decoding example is as shown in fig. 7

Figure 7: Decoding Example


3. Flow Chart

START

Enter The
Carrier Audio
Signal(A)

Enter The Secret Text


Message(T)

Display:
Message Is
is too A>8T
large

Enter The Secret Key

Sequence Generation

Encryption & Embedding

Stego File Ready

STOP
4. Use Case Diagram
5.Data Flow Diagram

5.1 0- Level DFD

Secret
Message

STEGNO FILE:
Steganographic Secret msg. +
system audio File

Audio File

5.2 Level 1 DFD

SECRET CARRIER FILE


MESSAGE

COMPRESSION
PROCESS

Embedded stego file


STEGANOGRAPHIC
ENCRYPTION PROCESS
DECOMPRESSION
PROCESS

Encrypted secret msg

STEGO FILE:
SECRET MSG
+ DECRYPTION
CARRIER
FILE

SECRET
MESSAGE
6. References

You might also like