07-05-2014, 10:29 AM
Cryptography with Audio
Cryptography with Audio.doc (Size: 865.5 KB / Downloads: 11)
Abstract
Security often requires that data be kept safe from unauthorized access. And the best line of defense is physical security (placing the machine to be protected behind physical walls). However, physical security is not always an option (due to cost and/or efficiency considerations). Instead, most computers are interconnected with each other openly, thereby exposing them and the communication channels that they use.
Cryptography secures information by protecting its confidentiality. It can also be used to protect information about the integrity and authenticity of data. Stronger cryptographic techniques are needed to ensure the integrity of data stored on a machine that may be infected or under attack.
So far Cryptography is used in many forms but using it with Audio files is another Stronger Techniques. The process of Cryptography happens with Audio File for transferring more secure sensitive data. The Sensitive Data is Encoded with an Audio File and Passed over Insecure Channels to other end of Systems. Here we are using .wav file Format for Encryption and Decryption of Message.
Purpose
Cryptography with Audio is a desktop application. The purpose of this application is to provide the security for the confidential information. This application doest allow the hackers to view the data, can view only audio file when it is being passed over the internet. Then at the recipient side the original information i.e., plain text will be extracted from the audio by performing decryption operations.
1.2 Scope
The scope of the project is very vast, as it targets large no of people residing over the world. It gained maximum users over the world.
PROJECT OVERVIEW
This application uses java and swings to develop GUI and perform encryption and decryption operations. In the encryption process each first the data will be encrypted by the key which was given by the source and then this encrypted data will be embed into the audio file and generate the new audio file which contains the plain text. At the recipient side this data will be extracted and decrypted then gives plain text.
Existing System
If a person sends sensitive information over the insecure channels of the system then there may be a chance of hacking it, they can alter the information and sends it over the net. (Example is military persons sending sensitive information over the net.)
This problem has been solved by the proposed system.
Proposed System
In the proposed system the above problem has been solved by embedding the data into the audio file. Before embedding it into the file, encryption operation will be performed by using the encryption key which is provided by the source. Then this audio file will be passed over the net, even if hacker hacks it, can be able to see only an audio file. At the destination side this data will be encrypted from audio file and performs decryption to get original message.
Encryption and Decryption Module:
During encryption, audio file will be created and in this audio file. In this audio file LSB of the each byte will be replaced by the encrypted data which is generated by the combination of the encryption key and the plain text i.e., the original message. Then this audio file will be sent to the recipient. At recipient side this encrypted data will be extracted from each LSB and performs decryption operation on it and gives original information.
FEASIBILITY STUDY:
The next step in analysis is to verify the feasibility of the proposed system. “All projects are feasible given unlimited resources and infinite time“. But in reality both resources and time are scarce. Project should confirm to time bounce and should be optimal in there consumption of resources. This place a constant is approval of any project.
OPERATIONAL FEASIBILITY:
To determine the operational feasibility of the system we should take into consideration the awareness level of the users. This system is operational feasible since the users are familiar with the technologies and hence there is no need to gear up the personnel to use system. Also the system is very friendly and to use.
SYSTEM DESIGN
System design is transition from a user oriented document to programmers or data base personnel. The design is a solution, how to approach to the creation of a new system. This is composed of several steps. It provides the understanding and procedural details necessary for implementing the system recommended in the feasibility study. Designing goes through logical and physical stages of development, logical design reviews the present physical system, prepare input and output specification, details of implementation plan and prepare a logical design walkthrough.
The database tables are designed by analyzing functions involved in the system and format of the fields is also designed. The fields in the database tables should define their role in the system. The unnecessary fields should be avoided because it affects the storage areas of the system. Then in the input and output screen design, the design should be made user friendly. The menu should be precise and compact.
JAVA OVERVIEW
Java is a powerful but lean object-oriented programming language. It has generated a lot of excitement because it makes it possible to program for Internet by creating Applets. Programs that can be embedded in web page. The context of an applet can be an animation with sound, an interactive game or a ticker tape. With constantly updated stock prices. Applets can be just little decorations to liven up web page, or they can be serious applications like Word processor or Spreadsheet.
JAVA IS PORTABLE:
One of the biggest advantages Java offers is that it is portable. An application written in Java will run on all the major platforms. Any computer with a Java-based browser can run the applications or Applets written in the Java-Programming-Language. A programmer no longer has to write one program to run on a Macintosh, another program to run on a Windows-machine still another to run on a UNIX-machine and so on. In other words, with Java developers write their programs only once.
White box testing
White box testing is a testing case design method that uses the control structure of the procedure design to derive test cases. All independents path in a module are exercised at least once, all logical decisions are exercised at once, execute all loops at boundaries and within their operational bounds exercise internal data structure to ensure their validity. Here the customer is given three chances to enter a valid choice out of the given menu. After which the control exits the current menu.
Black Box Testing
Black Box Testing attempts to find errors in following areas or categories, incorrect or missing functions, interface error, errors in data structures, performance error and initialization and termination error. Here all the input data must match the data type to become a valid entry.
The following are the different tests at various levels:
Unit Testing:
Unit testing is essentially for the verification of the code produced during the coding phase and the goal is test the internal logic of the module/program. In the Generic code project, the unit testing is done during coding phase of data entry forms whether the functions are working properly or not. In this phase all the drivers are tested they are rightly connected or not.
CONCLUSION
Cryptography with Audio is a desktop application. The purpose of this application is to provide the security for the confidential information. This application doest allow the hackers to view the data, can view only audio file when it is being passed over the internet. Then at the recipient side the original information i.e., plain text will be extracted from the audio by performing decryption operations. This Project has been developed successfully.