audio steganography - lsb
DESCRIPTION
TRANSCRIPT
![Page 1: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/1.jpg)
Audio
STEGANOGRAPHY
![Page 2: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/2.jpg)
www.company.com
STEGANOGRAPHY
Art and science of
writing hidden messages
No one apart from the
sender and intended recipient,
suspects the existence of the message
A form of security through
obscurity
![Page 3: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/3.jpg)
www.company.com
STEGANOGRAPHY TECHNIQUE
![Page 4: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/4.jpg)
MESSAGE
Embedded Data
Audio File
Hidden MESSAGE
![Page 5: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/5.jpg)
Audio
![Page 6: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/6.jpg)
www.company.com
AUDIO TERMS
• Sampling is the process in whichthe analogue values are only captured at regular time intervals.
• Quantization converts each input value into one of a discrete value.
• Popular sampling rates for audio include 8 kHz, 9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and 44.1 kHz
![Page 7: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/7.jpg)
www.company.com
Audio File Types
File Format
Uncompressed
WAV AIEF
Compressed
Lossy
Mp3, AAC, WMA
Loseless
ALAC, FlAC, WavPack
![Page 8: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/8.jpg)
www.company.com
WHY .WAV ?Most popular Audio format
Don’t lose any quality in recording
Easier format for Development
No Compression!!
![Page 9: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/9.jpg)
www.company.com
WAVE FILE FORMAT
![Page 10: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/10.jpg)
www.company.com
WAVE FILE FORMATHEX Values of Wave
File Size Chunk Length of Format
Audio AttributesData Chunk
![Page 11: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/11.jpg)
Steganography Techniques
![Page 12: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/12.jpg)
www.company.com
TYPES OF STEGANOGRAPHY
LSB CODING
PHASE CODING
ECHO HIDING
SPREAD SPECTRUM
![Page 13: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/13.jpg)
www.company.com
WHY LSB?
Low computational complexity
Easier Implementation
Variation in choosing LSB
![Page 14: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/14.jpg)
www.company.com
LSB ALGORITHM
• Receives the audio file convert it into bit pattern.
Step1
• Each character in the message is converted into bit pattern.
Step 2• Check which LSB
to Replace By RC4 Algorithm
Step 3
• Replaces the LSB bit from audio with LSB bit from character in the message.
Step 4
![Page 15: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/15.jpg)
www.company.com
CONT. ALGORITHM : CHANGING BITS
![Page 16: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/16.jpg)
www.company.com
CONT. ALGORITHM : CHANGING BITS
RC4 Algorithm
![Page 17: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/17.jpg)
www.company.com
RC4 ALGORITHM
RC4
The key-scheduling
algorithm (KSA)
The pseudo-random
generation algorithm (PRGA)
![Page 18: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/18.jpg)
www.company.com
• The key-scheduling algorithm (KSA)• initialize the permutation in the array "S• Array "S" is initialized to the identity permutation• Swap values of S[i] and S[j].
RC4 ALGORITHM
![Page 19: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/19.jpg)
www.company.com
• The pseudo-random generation algorithm (PRGA)• Used as many iterations as are needed
RC4 ALGORITHM
![Page 20: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/20.jpg)
Live Demo
![Page 21: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/21.jpg)
www.company.com
QUESTIONS
?
![Page 22: Audio steganography - LSB](https://reader031.vdocuments.us/reader031/viewer/2022020711/5478514bb4af9fb0708b4715/html5/thumbnails/22.jpg)
www.company.com
• Source Code : http://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Files
• Other Online • http://
citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdf
• deepaldhariwal.weebly.com/uploads/4/9/0/9/4909109/report.docx• http://en.wikipedia.org/wiki/RC4
RESOURCES