A

MINI PROJECT REPORT ON

HIDING TEXTUAL DATA IN CIPHER CRYPTO SYSTEMS BY USING AUDIOS
P.SRAVANI [08R61A0592] G.PRAVALIKA [08R61A0566] UNDER THE ESTEEMED GUIDANCE OF G.PRAHITHA [08R61A0562] P.PRIYANKA [08R61A0569]

Mr. P.L.K.KUMAR REDDY
Head of the department, CSE

Department of Computer Science and Engineering

PRIYADARSHINI COLLEGE OF ENGINEERING AND TECHNOLOGY
(Approved by AICTE,Affiliated to JNTU,Anantapur) Nellore-524004.

1

HIDING TEXTUAL DATA IN CIPHER CRYPTO SYSTEMS BY USING AUDIOS
Mini Project report submitted in partial fulfillment of the requirement for the award of degree of

BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING By
P.SRAVANI [08R61A0592] G.PRAVALIKA [08R61A0566] G.PRAHITHA [08R61A0562] P.PRIYANKA [08R61A0569]

Department of Computer Science and Engineering

PRIYADARSHINI COLLEGE OF ENGINEERING & TECHNOLOGY
(Approved by AICTE, Affiliated to JNTU, Anantapur) Nellore-524004

2

PRIYADARSHINI COLLEGE OF ENGINEERING AND TECHNOLOGY
(Approved by AICTE,Affiliated to JNTU,Anantapur) Nellore-524004

CERTIFICATE
This is to certify that the project report entitled “HIDING TEXTUAL DATA IN CIPHER CRYPTO SYSTEMS BY USING AUDIOS” being submitted by P.SRAVANI (08R61A0592) G.PRAHITHA (08R61A0562) G.PRAVALIKA (08R61A0566) P.PRIYANKA (08R61A0569) in partial fulfillment for the award of the Degree of Bachelor of Technology in CSE to the Jawaharlal Nehru Technological University Anantapur is a record of bonafied work carried out by him under my guidance and supervision. The results embodied in this project report have not been submitted to any other University or Institute for the award of any Degree of Diploma. Mr. P.L.K. KUMAR REDDY (Head of the Department) COMPUTER SCIENCE ENGINEERING Mr. P.L.K. KUMAR REDDY (Project Guide) Assistant Professor CSE Dept.

EXAMINER

ACKNOWLEDGEMENT
1

All endeavors a long period can be successful only with the advice and support of many well wishers. We take this opportunity to express our gratitude and appreciation to all of them. We are grateful to thank Dr. I. GOPAL REDDY, the Director of Priyadarshini College of Engineering & Technology, Nellore for his inspiring environment and providing us necessary infrastructure required for doing the project work. We are immensely grateful to Dr. VIJAY BASKAR REDDY, Principal, Priyadarshini College of Engineering & Technology, Nellore for his encouragement and inspiration throughout the process. At the outset, we sincerely acknowledge our deep sense of gratitude to our Head of the CSE Department Mr. P.L.K.K. REDDY for his encouragement and help throughout the project work. We would like to express our sincere gratitude to internal guide of our project Mr. P.L.K.KUMAR REDDY, for her support and conscientious guidance throughout the project work. We extend our sincere thanks to our parents and friends for their continuous support and encouragement without which this project would not have been a success. Thanking you all, Project Associates, P.SRAVANI G.PRAHITHA G.PRAVALIKA P.PRIYANKA

ABSTRACT

2

spread spectrum. In this paper we will attend the general principles of hiding secret information using audio technology. Varieties of techniques for embedding information in digital audio have been established. Keywords: Audio data hiding.Information hiding technique is a new kind of secret communication technology. phase coding. LSB 1 . The majority of today’s information hiding systems uses multimedia objects like audio. parity coding. echo hiding. and an overview of functions and techniques. Embedding secret messages in digital sound is usually a more difficult process.

1 hardware requirements 2.2 feasibility report 1 .1 Introduction 4.3 Applications CHAPTER 4 SYSTEM ANALYSIS 4.1.2 Proposed Work 3.1 Previous Works 3.2 software requirements CHAPTER 3 LITERTURE SURVEY REVIEW OF LITERATURE 3.1 Project Overview CHAPTER 2 SOFTWARE AND HARDWARE REQUIREMENTS 2.1 procedure 4.CONTENTS LIST OF ABBREVATIONS LIST OF FIGURES ABSTRACT CHAPTER 1 INTRODUCTION 1.1.

3.1.CHAPTER 5 DESIGN 5.1.3Test Plan 7.1.1 Test Case Specification 7.1 UML Diagrams introduction 5.1 Levels Of Testing 7.1.1.2 Testing Process 7.2 TestCaseExecution Analysis CHAPTER 8 SCREEN SHOTS CHAPTER 9 CONCLUSION 2 .1 Algorithm CHAPTER 7 TESTING 7.1 Introduction 7.3.1Static uml diagrams 5.1.1.2 Dynamic uml diagrams CHAPTER 6 CODE 6.

CHAPTER 10 REFERENCES LIST OF FIGURES Fig 1: Block diagram of data hiding and retrieval Fig 2.Class Diagram 2 .

Sequence Diagram For Reciever Fig 7.Use Case Diagram For Sender Fig 4.13 Master File Information Fig.11 Opening the output file Fig.enciphering computation Fig.9 Selecting Output File Fig.16 Alert Message Fig.8 Audio Crypto Page Fig.19 Final output Alert message for retrieving file Successfully CHAPTER 1 INTRODUCTION 2 .12 Embedding file Fig.15 Selecting Data File Fig.Sequence Diagram For Sender Fig 6.Use Case Diagram For Receiver Fig 5.14 Encryption Zone Fig.17 Retrieving File Fig.Fig 3. 18 Entering Password Fig.10 Embedding Message Fig.

U.g. Broadband Internet connections almost an errorless transmission of data helps people to distribute large multimedia files and make identical digital copies of them. PDAS) have made it feasible for consumers from all over the world to create. as well as terminology adopted at the First International Workshop on Information Hiding. Flexible and simple-to-use software and decreasing prices of digital devices (e. Audio data hiding method is one of the most effective ways to protect your privacy. 1. After transmission.The fast improvement of the Internet and the digital information revolution caused major changes in the overall culture. Cambridge. A data message is hidden within a cover signal (object) in the block called embedded using a stego key. which is a secret set of parameters of a known hiding algorithm. Sending sensitive messages and files over the Internet are transmitted in an unsecured form but everyone has got something to keep in secret. In modern communication system Data Hiding is most essential for Network Security issue. edit and exchange multimedia data. laptops. the embedded message is retrieved using the appropriate stego key in the block called extractor. are illustrated in Fig1. DVD players. CD and DVD recorders.1 Project overview General principles of data hiding technology. and other signal processing which may contaminate and bend the stego signal. The output of the embedded is called stego signal (object). recording. portable CD and mp3 players. 2 .K.

depending on spectral and temporal characteristics of both masked signal and masker [3] Masking models are extensively studied for perceptual compression of audio signals [2] In the case of perceptual compression the quantization noise is hidden below the masking threshold. Finally. As a result. there are some “holes” available. In presence of a loud signal (masker). The human auditory system perceives over a range of power greater than one billion to one and a range of frequencies greater than one thousand to one. another weaker signal may be in audible.However. it has a fairly small differential range.Fig 1: Block diagram of data hiding and retrieval. the human auditory system is unable to perceive absolute phase. because the human auditory system operates over a wide dynamic range. A number of different cover objects (signals) can be used to carry hidden messages. Additionally. The perturbations in a sound file can be detected as low as one part in ten million (80 dB below ambient level). Data hiding in audio signals exploits imperfection of human auditory system known as audio masking. only relative phase. Data hiding in audio signals is especially challenging. 1 . Sensitivity to additive random noise is also acute. While the human auditory system has a large dynamic range. while in a data hiding application the embedded signal is hidden there. there are some environmental distortions so common as to be ignored by the listener in most cases [4]. Now we will discuss many of these methods of audio data hiding technology. loud sounds tend to mask out quiet sounds.

DE-EMBED At the receiving end the module identify the location of the data picks up the size of the file.EMBED The compressed data & CRC file is appended (embed) to the end of the image file without affecting the image data or the header information of that image.1 Hard Ware Requirements 2 . filename and reads the data to the length of the data file and regenerate the text file that was embedded with in the image file. The software stores the data in a format that is not recognizable even when viewed from a text or document editor. CHAPTER 2 Software and hardware Requirements 2.

2 Software Requirements ➢ ➢ Tools Operating System :: :: Java Swings Windows XP CHAPTER 3 Literature survey review of literature 3.➢ ➢ ➢ ➢ Processor Ram Cache Hard disk :: :: :: :: Pentium(or) Higher 64MB (or) Higher 512MB 10GB (or) Above 2.1 Previous Works 1 .

3. the storage environment. an inaudible coding can be achieved. Phase coding. and second the transmission pathway the signal might travel. First. one of the first considerations is the likely environments the sound signal will travel between encoding and decoding. or digital representation of the signal that will be used. Instead of breaking a signal down into individual samples. When developing a datahiding method for audio. Some of the latter methods require previous knowledge of signal processing techniques.This section presents some common methods used for hiding secret information in audio.2Proposed Work 2 . Parity coding One of the prior works in audio data hiding technique is parity coding technique. Phase Coding The phase coding method works by substituting the phase of an initial audio segment with a reference phase that represents the data. Many software implementations of these methods are available on the Web and are listed in the relatives section. is one of the most effective coding methods in terms of the signal-to perceived noise ratio. when it can be used. When the phase relation between each frequency component is dramatically changed. However. Fourier analysis. professionals in broadcast radio can detect modifications that are imperceivable to an average observer). There are two main areas of modification which we will consider. The phase of subsequent segments is adjusted in order to preserve the relative phase between segments. and other areas of high level mathematics. the parity coding method breaks a signal down into separate regions of samples and encodes each bit from the secret message in a sample region's parity bit. noticeable phase dispersion will occur. as long as the modification of the phase is sufficiently small (sufficiently small depends on the observer.

Each character in the message is converted in bit pattern. Encryption and Decryption techniques have been used to make the security system robust. LSB coding allows for a large amount of data to be encoded. Another problem is robustness. efficient method for hiding the data from hackers and sent to the destination in a safe manner. Among many different data hiding techniques proposed to embed secret message within audio file.low-bit encoding embeds secret data into the least 3 . b. which merely embeds secret messagebits in a subset of the LSB planes of the audio stream. This proposed system is to provide a good. This proposed system will not change the size of the file even after encoding and also suitable for any type of audio file format. The human ear is very sensitive and can often detect even the slightest bit of noise introduced into a sound file. Least significant bit (LSB) coding is the simplest way to embed information in a digital audio file. The following steps are: a. Receives the audio file in the form of bytes and converted in to bit pattern.Here we will discuss the disadvantages of the previous procedure and how those are different with present method. although the parity coding method does International Journal of Database Theory and Application come much closer to making the introduced noise inaudible. the LSB data hiding technique is one of the simplest methods for inserting data into digital signals in noise free environments. c. By substituting the least significant bit of each sampling point with a binary message. Replaces the LSB bit from audio with LSB bit from character in the message. There are two main disadvantages associated with the use of methods like parity coding.

is of interest for the protection of copyrighted digital media. In the project ARTUS1 which aims to embed animation parameters into audio and video contents. CHAPTER 4 SYSTEM ANALYSIS 4.3 Applications Audio data hiding can be used anytime you want to hide data. and to the government for information systems security and for covert communications. This method is easy to incorporate. 3.significant bit (LSB) of the audio file. Audio data hiding can also be used incorporate world. Audio data hiding can also be used in the noncommercial sector to hide information that some one wants to keep private. Terrorists can also use Audio data hiding to keep their communications secret and to coordinate attacks. In the business world Audio data hiding can be used to hide a secret chemical formula or plans for a new invention. There are many reasons to hide data but most important is to prevent unauthorized persons from becoming aware of the existence of a message.1 Introduction 4 .the channel capacity is 1KB per second per kilohertz (44 kbps for a 44 KHz sampled sequence). Data hiding in video an audio.

improper understanding of present system can lead diversion from solution. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system.After analyzing the requirements of the task to be performed. Both the activities are equally important. Encryption and Decryption Module During encryption. then in internally the particular programs Module Description ➢ Graphical User Interface(GUI) ➢ Encryption. In this audio file LSB of the each byte will be replaced by the encrypted data which is generated by the combination of the encryption key and the plain text i. 4. ➢ Whenever we selected the embedding data. audio file will be created and in this audio file. This GUI contains different fields such as text area for entering message and buttons for encryption and decryption.1 Procedure ➢ The data is to be embedded in an selected audio file. but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. the next step is to analyze the problem and understand its context.. Understanding the properties and requirements of a new system is more difficult and requires creative thinking and understanding of existing running system is also difficult. Decryption with Audio File GUI Module This module generates the user interface through which a user browses the audio file and can play and stop the audio file.1. 5 .e. the original message. ➢ The embedding process is done internally because of the GUI.

The DES algorithm. There are aspects in the feasibility study portion of the preliminary investigation: ➢ ➢ ➢ Technical Feasibility Operational Feasibility Economical Feasibility Technical Feasibility The technical issue usually raised during the feasibility stage of the investigation includes the following: ➢ Does the necessary technology exist to do what is suggested? ➢ Do the proposed equipments have the technical capacity to hold the data required to use the new system? ➢ Will the proposed system provide adequate response to inquiries. All system is feasible if they are unlimited resources and infinite time. The main objective of the feasibility study is to test the Technical.2 Feasibility Report Preliminary investigation examine project feasibility. Operational and Economical feasibility for adding new modules and debugging old running system. the likelihood the system will be useful to the organization.Then this audio file will be sent to the recipient.1. At recipient side this encrypted data will be extracted from each LSB and performs decryption operation on it and gives original information The encryption and decryption process are done by using the algorithm DES. regardless of the number or location of users? ➢ Can the system be upgraded if developed? 2 . 4.

It is a web based user interface for audit workflow at NICCSD. establish and maintain a workflow among various entities in order to facilitate all concerned users in their various capacities or roles. The database’s purpose is to create. That will meet the organization’s operating requirements. the management issues and user requirements have been taken into consideration. Operational Feasibility Proposed projects are beneficial only if they can be turned out into information system. The operational feasibility of a project includes the following: ➢ Is there sufficient support for the management from the users? ➢ Will the system be used and work properly if it is being developed and implemented? ➢ Will there be any resistance from the user that will undermine the possible application benefits? ➢ This system is targeted to be in accordance with the above-mentioned issues. 1 . Operational feasibility aspects of the project are to be taken as an important part of the project implementation. Some of the important issues raised are to test. Beforehand. So there is no question of resistance from the users that can undermine the possible application benefits.➢ Are there technical guarantees of accuracy. Thus it provides an easy access to the users. ease of access and data security? ➢ Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation System’. The current system developed is technically feasible. reliability.

➢ The well-planned design would ensure the optimal utilization of the computer resources and would help in the improvement of performance status. Financial benefits must equal or exceed the costs. There is nominal expenditure and economical feasibility for certain. It does not require any addition hardware or software. Software design is a process through which the requirements are translated into a representation of the software. CHAPTER 5 DESIGN Introduction Design is a meaningful engineering representation of something that is to be built. the development cost in creating the system is evaluated against the ultimate benefit derived from the new systems. The system is economically feasible. Since the interface for this system is developed using the existing resources and technologies available at NIC. Design is the perfect way to accurately translate a customer’s requirement in to a finished software product. Design 1 . Design is the place where quality is fostered in software engineering. In the economical feasibility. Economical Feasibility A system can be developed technically and that will be used if installed must still be a good investment for the organization.

➢ Sequence diagram. ➢ Collaboration diagram.1 Static UML diagrams ➢ Class Diagram ➢ Component Diagram ➢ Deployment Diagram 5. The UML has nine diagrams.creates a representation or model. Constructing and documenting the software system and its components. 5.1. It is a graphical language which provides a vocabulary and set of semantics and rules. Visualizing. It captures the decisions and understandings about systems that must be constructed. interfaces and components that are necessary to implement a system. provides detail about software data structure. Static or structural diagrams Class diagram 2 . ➢ State chart diagram.1. The UML focuses on the conceptual and physical representation of the system.It systems. information about the 5. ➢ Activity diagram.1 UML DIAGRAMS INTRODUCTION The unified modeling language is a standard language for specifying. architecture. these diagrams can be classified into the following groups.2 Dynamic UML diagrams ➢ Use case diagram.

Sequence diagram Sequence diagram is an interaction diagram which focuses on the time ordering of messages it shows a set of objects and 2 . These diagrams illustrate the static use case view of a system and are important in organizing and modeling the behaviors of a system.e. interfaces. Dynamic or behavioral diagrams Use Case diagram Set of use cases and actors and their relationships have shown here. Both form the. They are related to the component diagrams where a node encloses one or more components.This shows a set of classes. Interaction diagram. Sequence diagram & collaboration diagram These two diagrams are semantically same i. collaborations and their relationships. There are the most common diagrams in modeling the object oriented systems and are used to give the static view of a system. Deployment diagram Set of nodes and their relationships have shown here. They are used to show the static deployment view of the architecture of a system. the dynamics of a system can be modeled using one diagram and transform it to the other kind of diagram without loss of information. Component diagram This shows a set of components and their relationships and used to illustrate the static implementation view of a system interfaces of collaborations.

Class diagram 3 . This diagram illustrates the dynamic view of a system Collaboration diagram This diagram is an interaction diagram that stresses or emphasizes the structural organization of the objects that send and receive messages.messages exchange between these objects.objects and messages send and received.

Class Diagram 2 .Fig 2.

Use Case Diagram For Sender 3 .Use case Diagram Fig 3.

Use Case Diagram For Receiver 2 .Use case Diagram Fig 4.

Sequence Diagram For Sender 1 .Sequence diagram Fig 5.

Sequence Diagram For Reciever 2 .Sequence diagram Fig 6.

The DES algorithm description is as follows: 6. a definition of the cipher function f is given in terms of primitive functions which are called the selection functions Si and the permutation function P. 2 . but with the schedule of addressing the key bits altered so that the deciphering process is the reverse of the enciphering process. and a function KS. Then this audio file will be sent to the recipient. P and KS of the algorithm are contained in the Appendix. A block to be enciphered is subjected to an initial permutation IP. the use of the algorithm for decipherment is described. the original message.CHAPTER 6 CODE Encryption and Decryption Module During encryption. called the key schedule.e. then to a complex key-dependent computation and finally to a permutation which is the inverse of the initial permutation IP-1 The key-dependent computation can be simply defined in terms of a function f. audio file will be created and in this audio file. A description of the computation is given first.. Si.1 ALGORITHM DATA ENCRYPTION STANDARD (DES) The algorithm is designed to encipher and decipher blocks of data consisting of 64 bits under control of a 64-bit key. Deciphering must be accomplished by using the same key as for enciphering. Finally. In this audio file LSB of the each byte will be replaced by the encrypted data which is generated by the combination of the encryption key and the plain text i. At recipient side this encrypted data will be extracted from each LSB and performs decryption operation on it and gives original information The encryption and decryption process are done by using the algorithm DES. Next. along with details as to how the algorithm is used for encipher ment. called the cipher function.

LR denotes the block consisting of the bits of L followed by the bits of R. Figure 7: Enciphering computation. Since concatenation is associative. Blocks are composed of bits numbered from left to right. 2 . for example..e..The following notation is convenient: Given two blocks L and R of bits.. B1B2. the left most bit of a block is bit one.B8.. denotes the block consisting of the bits of B1 followed by the bits of B2. i.followed by the bits of B8..

for testing any software we need to have a description of the expected behavior of the system and method of determining whether the observed behavior confirmed to the expected behavior. They are 2 . The success of the testing process in determining the errors is mostly depends upon the test criteria. Integration.CHAPTER 7 TESTING 7.1Introduction Testing is one of the most important phases in the software development activity. The Unit Testing is carried out on coding. In case of integration testing different tested modules are combined into subsystems and tested in case of the system testing the full software is tested and in the next level of testing the system is tested with user requirement document prepared during SRS. the testing process the software is worked with some particular test cases and the output 7. Here different modules are tested against the specifications produced during design for the modules.1 Levels Of Testing Since the errors in the software can be injured at any stage we have to carry out the testing process at different levels during the development. the developed software is tested against attaining the required functionality and performance during of the test cases are analyzed. System and Acceptance testing.the main aim of testing process is the quality.1. The basic levels of testing are Unit. There are 2 basic approaches for testing. In software development life cycle(SDLC).

7. The plan also specifies the levels of testing that need to be done.1. approach to be taken and the personal responsible for different activities of testing. This is also called as White Box Testing. which defines the scope. The inputs for forming test plan are: 1.1 Test case specification Although there is one test plan for entire project test cases have to be specified separately for each test case.1.1.Project plan 2. Test plan identifies all testing related activities that need to be performed along with the schedule and guidelines for testing.System design 7. Test case 3 .2 Testing Process A number of activities must be performed for testing software. by identifying the different testing units.3 Test Plan Test Plan is a general document for entire project. Testing starts with test plan.Functional Testing In Functional Testing test cases are decided solely on the basis of requirements of the program or module and the internals of the program or modules are not considered for selection of test cases.Requirements document 3. This is also called Black Box Testing. These reports are analyzed. For each unit specified in the plan first the test cases and reports are produced.3. Structural Testing In Structural Testing test case are generated on actual code of the program or module to be tested. 7.

But for the purpose of testing. White Box Testing This type of testing ensures that ➢ All independent paths have been exercised at least once. Each module was tested against required functionality and test cases were developed to test the boundary values. 4 . This document specifies any specified requirements that exist for setting the test environment and describes the methods and formats for reporting the results of testing. that tests modules by developed or used. Unit Testing Unit testing mainly focused first in the smallest and low level modules. ➢ All loops are executed at their boundaries within their operational bounds. the modules that in the next higher level those make use of the lower modules were tested.1.3. After the lower levels modules were tested. All test cases and outputs expected for those test cases.specification gives for each item to be tested. modules themselves were used as stubs. to print verification of the actions performed. proceeding one at a time.2 Test case execution analysis The steps to be performed for executing the test cases are specified in separate document called test procedure specification. Bottom-up testing was performed on each module. ➢ AIl internal data structures have been exercised. As developing a driver program. 7. ➢ All logical decisions have been exercised on their true and false sides.

As the system consists of the number of modules the interface to be tested was between the edges of the two modules. while at the same time conducting tests to uncover errors associated with interfacing. CHAPTER 8 3 . Bottom-up approach integration strategy was implemented with the following steps.. The software tested under this was incremental bottom-up approach.Integration Testing Integration testing is a systematic technique for constructing the program structure.

8 Audio Crypto Page Fig.SCREEN SHOTS Fig.9 Seletcing Output File 3 .

Fig.10 Embedding Message Fig.11 Opening the output file 1 .

12 Embedding file Fig.13 Master File Information 1 .Fig.

Fig.15 Selecting Data File 1 .14 Encryption Zone Fig.

17 Retrieving File 1 .Fig.16 Alert Message Fig.

19 Final output Alert message for retrieving file Successfully 3 . 18 Entering Password Fig.Fig.

efficient method for hiding the data from hackers and sent to the destination in a safe manner.CHAPTER 9 CONCLUSION In this project we have introduced a robust method of imperceptible audio data hiding. This system is to provide a good. So similarly these operations described above can be further modified as it is in the world of Information Technology CHAPTER 10 3 . This proposed system will not change the size of the file even after encoding and also suitable for any type of audio file format. information tracing and finger printing. tamper detection. Thus we conclude that audio data hiding techniques can be used for a number of purposes other than covert communication or deniable data storage . Man is now pushing away its own boundaries to make every thought possible.

REFERENCES 1.CRYPTOGRAPHY & 4.WILLIAM STALLING NETWORK SECURITY 2.com 3 .TATA Mc GRAW HILL.www.2.com 5 .BAHRAMI. www.wikiepedia.OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN PRESSMAN . JAVA COMPLETE REFERENCE 3.google.PATRICK NORTON AND HERBERT SCHILD. TATA Mc GRAW .