23-01-2013, 11:39 AM
Secret Communication through Audio for Defense Application
Secret Communication.ppt (Size: 707 KB / Downloads: 44)
Introduction to stegnography
Hiding a Secret data in Digital Images without affecting the quality of Medium.
This image is called as StegoImage.
Cryptography:
The sender uses the key (or some set of rules) to encrypt the plaintext and sends the cipher text to the receiver. The receiver applies the same key (or rule set) to decrypt the message and recover the plaintext.
With the sheer volume of sensitive Internet transactions that occur daily, the benefit of securing information using cryptographic processes becomes a major goal for many organizations.
Drawbacks of existing method
Transmission time for documents encrypted using public key cryptography is significantly slower. In fact, transmission of very large documents is prohibitive.
The key sizes must be significantly larger to achieve the high level of protection.
Proposed method
In this method, an audio file with “.wav” extension has been selected as host file. It is assumed that the Significant bits of that file should be modified without degrading the sound quality.
Embedding textual information in an audio file at sender side.
The embedded message is recovered correctly at the receiver.
Conclusion
A method of embedding text-based data into a host audio file using the method of bit modification has been presented.
The two primary criteria for successful steganography are that the stego signal resulting from embedding is perceptually indistinguishable from the host audio signal, and the embedded message is recovered correctly at the receiver.