Professional Documents
Culture Documents
Index: Sahyadri Science College, Shimoga
Index: Sahyadri Science College, Shimoga
Index
Abstract……………………………………………………………………..
Chapter 1:
Introduction……………………………………….……………
Chapter 2.
Analysis…………………………………………………………
Purpose………………..……………………………………….
Scope…………..……………………………………………....
User Characteristics…..………………………………………
Assumptions and Dependency……………………….……...
Software and Hardware Requirement..……………………
Constraint…………………...………………………………….
Functional Requirement..…………………………………….
Chapter 3.
Design…….……………………………………………………
Embeding……………………………………...………………...
Dembed………………………………….………………………
Data Flow Diagram……………………………………….……
Chapter 4.
Implementation…………………………………………….....
Chapter 5.
Testing...……………………………………………………......
Chapter 6.
Post Implementation...………..…………………….…….......
Chapter 7.
User Walkthrough…………………………………….…….....
Chapter 8.
Future Enhancement……………………………………….....
Chapter 9.
References.…………………………………………….……...
ABSTRACT
Chapter 1
INTRODUCTION
The main and the must feature of all the product is security .so I
have chosen one of the medium steganography to provide security.
Steganography is the art and science of hiding information by embedding
messages within other messages. Steganography works by replacing useless or unused data
in regular computer files (such as graphics, sound, text, HTML, etc.) with different, invisible
information or Using steganography a secret message is embedded in a medium. This hidden
information can be plain text, cipher text, or even images. The existence of the hidden
message is not known except by the sender and receiver. The word is derived from the Greek
words “stegos” meaning covered and “graphia” meaning writing.
The system that has been developed by me hide message behind any Audio.
PROBLEM DEFINITION
Embeded data is difficult to decipher, but it is relatively easy to detect. Embeding
only obscures a message's meaning, not its existence. Therefore, steganography, a technique
that hides the existence of a message, is often used to supplement Embeding. It's easy to use
and works by replacing bits of data in computer files or communication channels.
Chapter 2
ANALYSIS
During analysis we find that there are many techniques for providing security to the
digital data i.e. text,Audio etc from the miscreants. Some of these are as follows:-
Cryptography.
Steganography.
Water-marking.
Cryptography is an important technique for hiding the message and thus providing
security to the message. Cryptographyis the process of obscuring information to make it
unreadable without some type of special knowledge. In this case the message is not
concealed just scrambled or obscured. It does not hide the fact that the message exists.A
coded message that is unhidden, no matter how strong the encryption, will arouse suspicion
and may in itself be problematic.
Another technique for providing security to the digital data is water-marking. A digital
watermark is a pattern of bits inserted into a digital audio ,image or video file that identifies the
file's copyright information (author, rights, etc.). Digital watermarks are designed to be
completely invisible, or in the case of audio clips, inaudible. In digital watermarking the purpose
of inserting the bits is to protect the cover Audio rather than the encrypted bits.
In steganography since message is hidden behind the Audio and it is Audio which is
playable same as original, when in encrypted form, thus providing security to the digital
data.There is no suitable encryption technique for Audio other than the steganography.
Hardware Requirement
Hard disk : 40 GB
RAM : 256 MB
Processor : Pentium
Software Requirement
interpretation occurs each time the program is executed. The below Figure 3.1 illustrates how
this works.
Java byte codes can be considered as the machine code instructions for
the Java Virtual Machine (JVM). Every Java interpreter, whether it's a Java development tool
or a Web browser that can run Java applets is an implementation of the Java VM. The Java
VM can also be implemented in hardware. Java byte codes help make "write once, run
anywhere" possible. The Java program can be compiled into byte codes on any platform that
has a Java compiler. The byte codes can then be run on any implementation of the Java VM.
For example, the same Java program can run on Windows NT, Solaris, and Macintosh.
JDK: The JDK contains the software and tools needed to compile, debug and execute applets
and applications written in Java language. Tools under JDK are javac compiler to compile java
source code into byte codes, java interpreter used to execute java byte codes, applet viewer
used to view and test applets and javadoc is the java documentation tool.
Purpose:-
An Audio contains thousand words so hiding of an message is a hiding of thousand
words. So the main purpose of our project is to hide a message into a cover Audio.
Scope:-
Message will be hidden into a cover Audio.
User characteristics:-
A user with brief knowledge about computer will be able to use our software for hiding
message. And software developers will be able to use it as a module in other project.
Constraint:-
The resultant Audio should be in mp3 format because it is a loss less compression of
mp3.
Functional Requirements:-
Store:-
Retrieve:-
Chapter 3
DESIGN
We are using least significant bit insertion method. In this method the LSB of each last
bit of audio used to store the secret data. The resulting changes are too small didn’t
recognized by the audio player. The process of storing text data into Audio as Shown below
Deembeding
For retrieving message first of the Audio is checked, some message encrypt in the Audio or
not, And decrypt the message.
First of all message length retrieved from the first 16 pixel ,then according to message
length ,message retrieved from given carry Audio. The Dembeding process as Shown below
CONTEXT DIAGRAM:
Steganography
Message,audio
Embeded audio
1-LEVEL DFD
2-LEVEL DFD
Get message
1.1
Embeded
Audio audio
generator
Bit generator 1.5
1.3
Get carrier
Audio
1.2
Embeder
1.4
Get Embeded
Audio
Message,
2.1 Message and Audio
2.5
Bit generator
2.3
Check message
2.2
Chapter 4
IMPLEMENTATION
The GUI will contain a “Check” object, and will instantiate “Encode” and“Decode” objects as
needed to encode and decode images. User will respond to all of theuser’s events and set the
progress bar to visible when an encryption process is started.
Field Summary
Integer WalkThroughState
Contains information regarding the current state of the walkthrough.
JFrame progressPopUp
User Panel
JPanel - Panel
The main panel of the application contains a text tab and an Audio tab as
described below.
JScrollPane- scrollPane
This tab is also located within the panel.it’s purpose is selecting the directory of carrier audio
file and for selecting that file
.
jTextField- textField
This text box contain a image path of decoing image.
Functional Panel
Constructor Summary
GUI()
Instantiates, adds, and sets listeners for all interactive components. Instantiates object
Chapter 5
TESTING
we applied many tests on our project and ww encountered many bugs and successfully
debugged them by using several test modules. Some test cases are as follows: -
Chapter 6
POST IMPLEMENTATION
Welcome Page
Login Page
Sahyadri Science College, Shimoga
16
Audio Steganography
Thank you
Chapter 7
THE USER WALKTHROUGH
A portion of the main GUI is devoted to the user walkthrough. This walkthrough willlead
first time users through the process of embeding and dembeding message and in its final
stepinitiate the actual embeding or dembeding of the user’s text. The user may prepare for and
perform embeding and dembeding at any time without the use of the walkthrough.Consult the
following flow chart and corresponding description of states to understand the walkthrough
process.
2 3
1
4 5 6
The box below explains how each state will be described. Each has a unique state number.
State 1:
Select message(*.txt).
State 2:
Choose a carrier Audio(*.mp3 ,*.Wave).
State 3:
Press “start” button and wait for while a progress bar not completed.
And message embeded successfully message will be show.
State 4:
Choose Embeded audio for the required message to de Dembed.
State 5:
Press Start
State 6:
After successfully Dembed , message will be show in new notepad.
Chapter 8
FUTURE ENHANCEMENT
Our project can be further extended by little bit of efforts. Various security enhancing and fault
tolerant features can be implemented easily. They are as follows:-
1. Further this product can be used to send the video clips and image similar in the
fashion as that message is send.
2. Another extra security can be provided.
.
Chapter 9
REFERENCES
www.realnetworks.com.
en.wikipedia.org/wiki/Steganography.
www.sun.java.com.