22-02-2013, 11:34 AM
Audio Steganography
Audio Steganography.doc (Size: 33.5 KB / Downloads: 29)
ABSTRACT
Steganography is a method of hiding the message into some thing. This method is used in the time of highly confidential data transfer. It prevents from being hacked by the unauthorized users. In the current internet community secured data transfer is limited due to its attack made on data communication. So more robust method is chosen so that it ensures secured data transfer is made.
Cryptography is a field of data security .It changes the data from one form to another form and sent to the destination. It provides good secured means of transformation but still the hacker can able to hack down the message that is being passed.
There are different common types of Steganography
1) Picture Steganography
2) Video Steganography
3) Audio Steganography
Picture Steganography is a method of hiding the message in the picture or images.
Video Steganography is a method of hiding the message in the video.
Audio Steganography is a method of hiding the message in the audio file of any formats.
Audio Steganography provides a easy way of implementation of mechanisms when compared with picture or video.
There are two methods in Audio Steganography
1) Encoding
2) Decoding
Encoding is a process of hiding the message in the audio.
Decoding is a process of retrieving the message from the audio.
LSB(Least Significant Bit) Algorithm is used to encode the message into audio. It performs bit level manipulation to encode the message. The following steps are
a. Receives the audio file in the form of bytes and converted in to bit pattern.
b. Each character in the message is converted in bit pattern.
c. Replaces the LSB bit from audio with LSB bit from character in the message.
The main two features of this software are -
1) Size of file is not changed after encoding.
2) Since it is bit level manipulation the sound variations cannot be determined by any current software .
The proposed system over comes all the restrictions made on the existing systems. It provides good looking environment to user .It also provide the user to give private key for encryption. The length of message is 650 characters and provides frequency chart to see the variations after encoding. The quality of the audio doesn’t change variably. It cannot detect the lack in quality of sound. The encryption key can be any combination of characters, symbols, numbers. The key which is used for encoding is also used for decoding .This is a private key where the both user have to agree upon a single common key.