SINCE 2004

  • 0

      0 Item in Bag


      Your Shopping bag is empty

      CHECKOUT
  • Notice

    • ALL COMPUTER, ELECTRONICS AND MECHANICAL COURSES AVAILABLE…. PROJECT GUIDANCE SINCE 2004. FOR FURTHER DETAILS CALL 9443117328

    Projects > COMPUTER > 2017 > NON IEEE > APPLICATION

    Steganography Using Audio And Video Data Hiding


    Abstract

    Steganography derived from the Greek words meaning “covered writing”, is the art of hiding in ways that prevent its detection. It is a method akin to covert channels, and invisible inks, which add another step in security. A message in cipher text may arouse suspicion while an invisible message will not. Digital steganography uses a host data or message, known as a “container” or “cover” to hide another data or message in it. The conventional way of protecting information was to use a standard symmetric or asymmetric key system in encryption. Steganography can also be used to place a hidden “trademark” in images, music, and software, a technique referred to as watermarking. Steganography, if however used along with cryptography, for example, if a message is encrypted using triple AES (Advanced Encryption Standard) which requires a 112 bit key then the message has become quite secure as far as cryptanalytic attack are concerned. Now, if this cipher text is embedded in an image, audio, video, etc., it is even more secure. If an encrypted message is intercepted, the interceptor knows the text is an encrypted message. With Steganography, the interceptor may not know the object contains a message. When performing data hiding on audio, one must exploit the weakness of the Human Auditory System (HAS), while at the same time being aware of the extreme sensitivity of the human auditory system.


    Existing System

    This paper presents the general principles of steganography, basic terminology, and an overview of applications and techniques. In particular we will consider data hiding within audio signals, the basic requirements and the state of the art techniques. We propose a novel technique, short-term autocorrelation modulation, with several variations. The proposed method is characterized by perfect transparency, robustness, high bit rate, low processing load, and, particularly, high security.


    Proposed System

    The “Data Hiding in Audio Files” mainly developed to embed or extract the messages into audio files. This project basically deals with two important network security concepts namely steganography and encryption. For encryption AES algorithm is used. The plaintext is given as input. The plaintext is encrypted using AES algorithm. The ciphertext is given as output. The output ciphertext is hidden into the audio files using Seganography. For steganography LSB algorithm is used. The audio file is in the wave format is the chosen medium to conceal and transmit the secret information. Since the audio file is in ASCII format, the contents of the text file are also converted to the bit stream. The encrypted file is now embedded behind the audio file by mixing the contents together using LSB algorithm. At the other end, the encrypted file is separated from audio file. The encrypted file is then decrypted and the original text file contents are then viewed.


    Architecture


    FOR MORE INFORMATION CLICK HERE