Professional Documents
Culture Documents
6) Select the authentication image at receiver side compare AES operates on a 4×4 column-major order matrix of
recovered authenticated image with the selected image. bytes, termed the state, although some versions of
7) If both the images matched, then only user can recover Rijndael have a larger block size and have additional
the text behind audio else process is terminated. columns in the state. Most AES
calculations are done in a special finite field. We use
VII. AUDIO RECOVERY 128-bit key for an AES cipher which specifies the
1) Read audio file. number of repetitions should be 10 cycles’
2) Open this stego audio file in read mode. transformation rounds that convert the input, called the
3) Read wave file’s first 40 bytes of header. plaintext, into the final output, called the cipher text.
4) Then read all its data after 40th byte and close file. Each round consists of several processing steps, each
5) Recover the size of identity key from LSB of .wav file. containing four similar but different stages, including
Recover identity key from further LSB bits of .WAV file. one that depends on the encryption key itself. A set of
6) Accept identity key from user and compare entered reverse rounds are applied to transform cipher text back
identity key with recover identity key. If both the keys into the original plaintext using the same encryption key.
matched then only user can recover the hidden text else
processes will be aborted. IX. ALGORITHM FOR HIDING DATA IN VIDEO
7) As identity key is matched recover the size of message Least Significant Bit (LSB) based steganography
from further LSB bits of .wav file. Recover the message. The simplest and most common type of
8) Secrete text is recovered. steganography is LSB (least significant bit). The
one’s bit of a byte is used to encode the hidden
VIII. ALGORITHM FOR HIDING DATA IN AUDIO information.
A. AES Encryption Algorithm: Suppose we want to encode the letter A (ASCII 65
or binary 01000001) in the following 8 bytes of a carrier
AES is based on a design principle known as a file.
substitution-permutation network.It is fast in both
software and hardware. X. ARCHITECTURE
Fig. 1:
estimate of a unit of delivered functionality of a software
XI. FUNCTIONAL REQUIREMENTS project. Function points (FP) measure size in terms of the
A. Functional Requirements: amount of functionality in a system. Function points are
computed by first calculating an unadjusted function point
1) Functional Requirements:
count (UFC).
User should knowledge about the computer
Counts are made for the following categories
Also User should be able to do perform task. 1) Number of user inputs
Client should be able recognized these request from 2) Each user input that provides distinct application
server very efficiently. oriented data to the software is counted. Number of user
Response speed should be good enough. outputs
B. Cost and Schedule: 3) Each user output that provides application oriented
information to the user is counted. In this context
Use Function point calculation method to calculate the size of
"output" refers to reports, screens, error messages, etc.
the project. The function point method was originally
developed by Bij Albrecht. A function point is a rough
XIV. CONCLUSION
Data hiding using Audio video steganography with the help
of computer forensic tech provide better hiding capacity and
security.