Professional Documents
Culture Documents
Contents:
Introduction System flow diagram LSB coding E-Cipher E and D algorithm Algorithm for Transmission side Algorithm for Reception side Action plan References
Steganography
STEGANOS Covered GRAPHIE Writing Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows the existence of the message. This can be achieved by concealing the existence of information within seemingly harmless carriers or cover Carrier: text, image, video, audio, etc.
Introduction
The fast improvement of the Internet and the digital information revolution caused major changes in the overall culture. Flexible and simple-to-use software and decreasing prices of digital devices have made it feasible for consumers from all over the world to create, edit and exchange multimedia data. Broadband Internet connections almost an errorless transmission of data, helps people to distribute large multimedia files and make identical digital copies of them.
In modern communication system Data Hiding is most essential for Network Security issue. Sending sensitive messages and files over the Internet are transmitted in an unsecured form but everyone has got something to keep in secret. Audio data hiding method is one of the most effective ways to protect the privacy.
Flow Diagram
LSB Coding:
By substituting the least significant bit of each sampling point with a binary message, LSB coding allows for a large amount of data to be encoded. The following diagram illustrates how the message 'HEY' is encoded in a 16-bit audio sampled stream using the LSB method:
Enter the public key in any combination of numbers, symbol and characters. The key contains set of characters and all characters are converted to ASCII value Add all the ASCII value to get single number and that single number is converted to bit pattern and by simple logical operation , a single number less than 128 can be obtained. It is added to the characters one by one in the message, before encoding. For decryption , bits of consecutive eight bytes are taken and subtracted with the key to get the original character.
Step 2: Extract the hidden data and audio files bit patterns from mixed data // Reverse process of step 7 of algorithm at sender side.
Step 3: Input key for decryption (as used in encryption) Step 4: Combine the two halves of audio files bit patterns. Step 5: Combine the two halves of encrypted messages bit pattern.
Action plan
Sl. No 1 2 3 4 5 6 7 Details Introductory seminar Implementation of E-Cipher E & D Algorithm Code for Embeddor Progressive seminar Code for Extractor Report Final presentation Expected date of completion 07-03-2012 10-03-2012 14-03-2012 06-04-2012 11-03-2012 05-05-2012 07-05-2012
10
1. International Journal of Database Theory and Application Vol. 2, No. 2, June 2009 Data Hiding in Audio Signal: A Review Poulami Dutta1, Debnath Bhattacharyya1, and Tai-hoon Kim2
References
1Heritage Institute of Technology, Kolkata-700107, India 2Hannam University, Daejeon, Korea 2. Implementation of ISS - IHAS (Information Security System Information Hiding in Audio Signal) model with reference to proposed e-cipher Method Prof. R. Venkateswaran Department of CA, Nehru College of Management, Research Scholar-Ph.D, Karpagam University Coimbatore, TN, INDIA Dr. V. Sundaram, Director Department of CA, Karpagam College of Engineering Affiliated to Anna University of Technology, Coimbatore, TN, INDIA
11
12
13
14