You are on page 1of 14

For more project topics and materials visit: http://www.classgist.

com
Enquiries: http://www.classgist.com/contactus.aspx

DESIGN AND IMPLEMENTATION OF AN AUDIO FILE


SECURITY USING STEGANOGRAPHY
(A CASE STUDY OF DEVELOPER’S DIGITAL STUDIO)

TABLE OF CONTENTS

Title page

Approval page

Dedication

Acknowledgment

Abstract

Table of contents

CHAPTER ONE

INTRODUCTION

1.1 Introduction

1.2 Background of the study

1.3 Statements of the problem

1.4 Objectives of the study

1.5 Significance of the study

1.6 Scope of study

1.7 Limitations of the study

1.8 Definition of terms


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

CHAPTER TWO

REVIEW OF RELATED LITERATURE

2.1 Introduction

2.2 Review of Context

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1 Introduction

3.2 Detailed analysis of the existing system

3.2.1 Problems of the existing system

3.3 Research Methodology

3.4 Objective of the new system

3.5 Feasibility study

3.6 New System Structure (Program Structure)

3.6.1 Context Diagram

3.6.2 Modularity

3.6.3 Program Flowchart

3.7 System Design and Menu Specification

3.7.1 Output design specification

3.7.2 Input Design Specification


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

3.7.3 File/Database Specification

3.7.4 Security Design Specification

CHAPTER FOUR

IMPLEMENTATION, RESULT AND DISCUSSION

4.1 Introduction

4.2 Software development tools and Justification

4.3 System Requirements

4.3.1 Software requirements

4.3.2 Hardware requirements

4.3.3 People requirements

4.4 Coding

4.5 Implementation Details

4.5.1 System testing

4.5.2 End-user training and manual

4.5.3 File conversion

4.5.4 Change over Procedure

4.5.5 Commissioning

4.5.6 Maintenance details

4.6 Results
For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

4.7. Discussion

CHAPTER FIVE - SUMMARY, CONCLUSION AND

RECOMMENDATION

5.1 Summary

5.2 Recommendation

5.3 Conclusion

REFERENCES

Appendix I

Appendix II
For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

CHAPTER ONE
INTRODUCTION
1.1 Introduction

Computer security, also known as cybersecurity or IT security,

is the protection of computer systems from the theft and

damage to their hardware, software or information, as well as

from disruption or misdirection of the services they provide.

One of the aspects of computer security that forms the subject

of discussion in the research project is audio file security. Audio

file security is the process and activities involved in keeping

audio data secured. This includes making regular backups of

files (backup copies should be stored in fireproof safes or in

another building) protecting the file against viruses by running

anti-virus software, Using a system of passwords so that

access to data is restricted.

There has been continuous quest among computer users to

secure and improve the security of the computer and its

resources. Tools upon tools have been fashioned and designed

by man to help him conquer problems and challenges of file

insecurity and theft. This prompted the researcher to embark

on a project to develop software that will protect the computer


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

system and secure the resource of the computer from the

attacks by hackers. To this end, firewall software is designed

by the researcher to manage and secure your operations of the

computer system from being attacked by hackers.

This research focuses on the security of a particular computer

information resource known as an audio file. Digital multimedia

data precisely audio file provides a robust and easy editing and

modification of data. The data can be delivered over computer

networks with to no and often without interference and can be

copied without any loss in quality and content. Unfortunately,

this makes digital media distribution insecure and raises

concern for digital content owners. This poses a big problem for

the protection of intellectual information.

1.2 Background of the study

There are many computerized techniques for achieving this.

The earliest method of audio file security is the use of an

authentication technique. Authentication which is the act of

confirming the truth of an attribute of a single piece of data (a

datum) claimed true by an entity was adopted initially for file


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

security. The main problem with this technique is that most

times authorized users are denied access to the audio file when

they forget the audio file password.

Along the line, cryptography emerged which entails formatting

information in a form that is not understandable to an intruding

third party. However, cryptography poses some inefficiency in

the sense that the intruding third party can discover the

exchange of information and can either destroy the encrypted

message or used sophisticated cryptanalysis tools to decrypt

the message.

It is upon this background that this research work was initiated

to demonstrate how steganographic technique can be adopted

as a solution to the problem of audio file insecurity.

Steganography is the practice of concealing a file, message,

image, or video within another file, message, image, or video.

The word steganography combines the Greek words steganos

meaning "covered, concealed, or protected," and graphein

meaning "writing". The first recorded use of the term was in

1499 by Johannes Trithemius in his Steganographia, a treatise

on cryptography and steganography, disguised as a book on


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

magic. Generally, the hidden messages appear to be (or be

part of) something else: images, articles, shopping lists, or

some other cover text. For example, the hidden message may

be in invisible ink between the visible lines of a private letter.

Some implementations of steganography that lack a shared

secret are forms of security through obscurity, and key-

dependent steganographic schemes adhere to Kerckhoffs's

principle.

The advantage of steganography over cryptography alone is

that the intended secret message does not attract attention to

itself as an object of scrutiny. Plainly visible encrypted

messages, no matter how unbreakable they are, arouse

interest and may in themselves be incriminating in countries in

which encryption is illegal.

Whereas cryptography is the practice of protecting the contents

of a message alone, steganography is concerned with

concealing the fact that a secret message is being sent as well

as concealing the contents of the message. Steganography

includes the concealment of information within computer files.


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

In digital steganography, electronic communications may

include steganographic coding inside of a transport layer, such

as a document file, image file, program or protocol. Media files

are ideal for steganographic transmission because of their large

size. For example, a sender might start with an innocuous

image file and adjust the color of every hundredth pixel to

correspond to a letter in the alphabet. The change is so subtle

that someone who is not specifically looking for it is unlikely to

notice the change.

1.3 Statement of The Problem

With the arrival of the internet a few years ago, there was a

wide increase in data communication and sharing of

information over networks. With time the security of this

information, especially the audio file became an issue. Some

of the problems associated with the existing methods of

securing audio file while on transit are as followed:

1. Poor level of data protection using authentication with

username and password.


2. Insecurity of audio file as third parties can have access to

information during the communication process.


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

3. Cryptography and other data hiding methods have security

lapses in the sense that the intruding third party can

discover the exchange of information.


4. Third party can discover secret information and destroy it
5. Cryptanalysis tools can decrypt encrypted messages

1.4 Aim and objectives of the Study

The aim of this project is to develop an automated audio file

hiding system that can encode secret messages-p into an audio

file using a steganographic technique.

1. To block intruding third party from noticing an exchange of

information, hence keeping them from having access to

information during the communication process.


2. To develop a system for converting an audio file to other

form as well to encode text data into files with a key.


3. The develop techniques for encoding and decoding the

message using a key and save the audio file.


4. To develop ensure cryptanalysis tools can not decrypt the

encrypted messages using steganography.

1.5 Significance of the Study

Former methods consist of linguistic or language forms of

hidden writing. The later, such as invisible ink, try to hiding

message physically. One disadvantage of linguistic


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

steganography are that users must equip themselves to

have a good knowledge of linguistics. In recent years,

everything is trending toward digitization. And with the

development of internet technology, digital media can be

transmitted conveniently over the network. Therefore,

messages can be Secretly carried by digital media by using

the steganography techniques and then be transmitted

through the internet rapidly.

1.6 Scope of the Study

This project is developed for hiding information in any file. The

scope of the project is the implementation of steganography

tools for hiding only audio information. A project of this

magnitude is supposed to cover all forms of audio file security

but due to time and financial constraints, it was limited to. The

work encompasses the uploading of an existing audio file and

converting it into a form such as text or file format. It covers

the hiding data in Audio file. Hide information using pure

Steganography. It also covers formulation of an algorithm


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

based on data hidden technique in the audio and the develop a

system based on the algorithm established above.

1.7 LIMITATION OF THE STUDY

A lot of factors tried to hinder the completion of this project.

Some of the factors that fought against the successful

completion of this work are discussed below:

1. Limited information and knowledge: Most people are

unaware of computer security issues and this lead to limited

knowledge and information. During the literature review,

there were limited books and professional journals on this

topic. The staff in current environment of this research

refused to release information about the reservation

database to the researcher, due to some organization

policies.
2. Limited Financial resource: For projects to be executed

properly it needs funding. The researcher could have

implemented the design using better security gadgets and

reviewed so many more security related technologies but

due to a limited fund, the research was limited.


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

3. Insufficient Power Supply: Another factor the militated

the success of this work is the insufficient power supply. The

desktop computer used for typing this project as well as for

writing the computer needs constant power supply.

Incessant power outage affected the speed with which could

have completed the work and the scope covered during the

coding of the software.

1.7 Definition of Terms

Steganography: is the study of detecting message hidden

using steganography this is analogous to cryptanalysis applied

to cryptography

Watermarking: is the process of hiding digital information in a

carrier signal, the hidden information should, but does not

need to, contain a relation to the carrier signal. Digital

watermarking may be used to verify the authenticity or

integrity of the carrier signal or to show the identity of its

owners.

Bit: it is the basic unit of information in computing and digital

communications A bit can have only one or two values, and


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

may, therefore, be physically implemented with a two-state

device. These values are most commonly represented as either

a 0 or 1. The term bit is a portmanteau of binary digit.

Secret message: refers to the part of the message which is

intended to be hidden.

Cover Data: refers to the container in which the secret

message is hidden. This cover data component can be anything

like digital photos, digital videos, audio files and text files.

Stego Message: refers to the final product.

Steganogram: A secret data

You might also like