audio stenography
TRANSCRIPT
-
7/22/2019 Audio stenography
1/22
Audio
STEGANOGRAPHY
-
7/22/2019 Audio stenography
2/22
www.company.com
STEGANOGRAPHY
Art andscience of
writing hiddenmessages
No one apart
from thesender andintendedrecipient,
suspects theexistence ofthe message
A form ofsecuritythrough
obscurity
-
7/22/2019 Audio stenography
3/22
www.company.com
STEGANOGRAPHY TECHNIQUE
-
7/22/2019 Audio stenography
4/22
MESSAGE
EmbeddedData
Audio File
Hidden
MESSAGE
-
7/22/2019 Audio stenography
5/22
Audio
-
7/22/2019 Audio stenography
6/22
www.company.com
AUDIO TERMS
Samplingis the process in which
the analogue values are only captured at regular
time intervals.
Quantizationconverts each input value into one
of a discrete value.
Popularsampling rates for audio include 8 kHz,
9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and
44.1 kHz
-
7/22/2019 Audio stenography
7/22
www.company.com
Audio File Types
File Format
Uncompressed
WAV AIEF
Compressed
Lossy
Mp3, AAC, WMA
Loseless
ALAC, FlAC,WavPack
-
7/22/2019 Audio stenography
8/22
www.company.com
WHY .WAV ?
Most popular Audio format
Dont lose any quality in recording
Easier format for Development
No Compression!!
-
7/22/2019 Audio stenography
9/22
www.company.com
WAVE FILE FORMAT
-
7/22/2019 Audio stenography
10/22
www.company.com
WAVE FILE FORMATHEX Values of Wave
File Size Chunk Length of Format
Audio AttributesData Chunk
-
7/22/2019 Audio stenography
11/22
SteganographyTechniques
-
7/22/2019 Audio stenography
12/22
www.company.com
TYPES OF STEGANOGRAPHY
LSB CODING
PHASE CODING
ECHO HIDING
SPREAD
SPECTRUM
-
7/22/2019 Audio stenography
13/22
www.company.com
WHY LSB?
Low computational complexity
Easier Implementation
Variation in choosing LSB
-
7/22/2019 Audio stenography
14/22
www.company.com
LSB ALGORITHM
Receives theaudio fileconvert it into bitpattern.
Step1
Each characterin the message isconverted into
bit pattern.
Step 2 Check which LSB
to Replace ByRC4 Algorithm
Step 3
Replaces the LSBbit from audiowith LSB bit fromcharacter in the
message.
Step 4
-
7/22/2019 Audio stenography
15/22
www.company.com
CONT. ALGORITHM : CHANGING BITS
-
7/22/2019 Audio stenography
16/22
www.company.com
CONT. ALGORITHM : CHANGING BITS
RC4 Algorithm
-
7/22/2019 Audio stenography
17/22
www.company.com
RC4 ALGORITHM
RC4
The key-scheduling
algorithm (KSA)
The pseudo-randomgeneration
algorithm (PRGA)
-
7/22/2019 Audio stenography
18/22
www.company.com
The key-scheduling algorithm (KSA)
initialize the permutation in the array "S
Array "S" is initialized to the identity permutation
Swap values of S[i] and S[j].
RC4 ALGORITHM
-
7/22/2019 Audio stenography
19/22
www.company.com
The pseudo-random generation algorithm (PRGA)
Used as many iterations as are needed
RC4 ALGORITHM
-
7/22/2019 Audio stenography
20/22
Live Demo
-
7/22/2019 Audio stenography
21/22
www.company.com
QUESTIONS
-
7/22/2019 Audio stenography
22/22
www.company.com
Source Code :
http://www.codeproject.com/Articles/6960/Steganography-
VIII-Hiding-Data-in-Wave-Audio-Files
Other Online
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdf
deepaldhariwal.weebly.com/uploads/4/9/0/9/4909109/report.docx
http://en.wikipedia.org/wiki/RC4
RESOURCES
http://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdfhttp://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdfhttp://en.wikipedia.org/wiki/RC4http://en.wikipedia.org/wiki/RC4http://en.wikipedia.org/wiki/RC4http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdfhttp://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdfhttp://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdfhttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Fileshttp://www.codeproject.com/Articles/6960/Steganography-VIII-Hiding-Data-in-Wave-Audio-Files