Data Hiding in Audio Files Abstract
Data Hiding in Audio Files Abstract
Data Hiding in Audio Files Abstract
It is a method akin to covert channels, and invisible links, which add another step in security. A
message in cipher text may arouse suspicion while an invisible message is not.
Digital stenography uses a host data or message known as a Container or Cover to hide
another data or message in it. The conventional way of protecting information was to use a standard
symmetric or asymmetric key system in encryption. Steganography can also be used to place a hidden
trademark in images, music, and software, a technique referred to as watermarking.
Steganography, if however used along with cryptography ,for example, if a message is encrypted
using triple DES(EDE) which requires a 112 bit key then the message has become quite secure as far as
cryptanalytic attack are concerned. Now, if this cipher text is embedded in an image, video, voice, etc., it
is even more secure. If an encrypted message is intercepted, the interceptor knows the text is an
encrypted message. With Steganography, the interceptor may know the object contains a message.
When performing data hiding on audio, one must exploit the weakness of the Human Auditory
System (HAS), while at the same time being aware of the extreme sensitivity of the human auditory
system.
As we were growing up, we have occasionally heard the very popular phrase that the world is
becoming smaller with each passing day. Looking at it from a geographical viewpoint, it seems to appear
utterly nonsensical. However, that is not what it means. It basically symbolizes that with improving
technology, it is becoming increasingly easier and faster to communicate. It is a widespread belief that
telecommunications holds the key to the future.
CreativeSoft (Corporate Office)
# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
However along with good, there is always the bad (hackers). The bad in this case being the case
of misuse of the technology to further ones own personal needs at the expense of others.
Communication holds the key to business, personal life, etc. As people tend to rely on these new means
of communication, more and more important information is being conveyed along these new lines.
In order to ensure the privacy of the communication between two parties, various new methods
are being developed. Cryptography being the mother to all those projects. However, cryptography is like
a tool, it can do as well as it is programmed to do. Also, there are various different techniques that can
be implemented to attain a certain level of security.
Here we implement a technique for data hiding in audio images, known as Audio file
Steganography. However, Steganography alone is not able to provide a sufficiently high enough level of
security. In order to improve the security of our technique, we will also be incorporating encryption of
data to be hidden.
Existing System
Nowadays, several methods are used for communicating secret messages for defense purposes
or in order to ensure the privacy of communication between two parties. So we go for hiding
information in ways that prevent its detection.
Some of methods used for privacy communication are the use of invisible inks, covert channels
are some of existing systems that are used to convey the messages.
Proposed System
The proposed system uses Audio file as a carrier medium which add another step in security.
The objective of the newly proposed system is to create a system that makes it very difficult for an
opponent to detect the existence of a secret message by encoding it in the carrier medium as a function
of some secret key and that remains as the advantage of this system.
CreativeSoft (Corporate Office)
# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
Hardware Requirements
Software Requirements
Java tool is used to perform Data hiding in an Audio file and the Operating System used is
Windows 9x, 2000, XP. There are many algorithms available to achieve this. The need of algorithm is to
develop concepts and a practical embedding method for Audio files that would provide high
steganographic capacity without sacrificing security.
The algorithm used in our project is PBE (MD5) algorithm. This algorithm is chosen because it
provides more security.