Professional Documents
Culture Documents
Secure File Transfer Using LSB Technique
Secure File Transfer Using LSB Technique
c c
c
c
Covert communication by embedding a message or data file in a cover
In our project we present a novel high bit rate LSB audio watermarking
method that reduces embedding distortion of the host audio. Using the proposed
two-step algorithm, watermark bits are embedded into higher LSB layers, resulting
that perceptual quality of watermarked audio is higher in the case of the proposed
c
Vhe is the worldwide, publicly accessible network of
interconnected computer networks that transmit data by packet switching using the
standard Internet Protocol (IP). It is a "network of networks" that consists of
millions of smaller domestic, academic, business, and government networks, which
together carry various information and services. A significant issue facing the
internet is the secure transmission of confidential and proprietary information.
Secure transmission can be done by one of two ways.
!| Cryptography
!| Steganography
Cryptography is the study of message secrecy. In modern times, it has
become a branch of information theory, as the mathematical study of information
and especially its transmission from place to place.
!"
# $! is a technique which allows an individual to add
hidden copyright notices or other verification messages to digital audio, video, or
image signals and documents. Such a message is a group of bits describing
information pertaining to the signal or to the author of the signal (name, place,
etc.). Vhe technique takes its name from watermarking of paper or money as a
security measure. Digital watermarking can be a form of steganography, in which
data is hidden in the message without the end user's knowledge.
Vhus, a watermarking can be classified into two sub-types: visible and invisible.
Visible watermarks change the signal altogether such that the watermarked signal
is totally different from the actual signal, e.g., adding an image as a watermark to
another image.
&# &
In this module, the actual encoding takes place. Vhe window is provided
with options to select the audio file which is the cover file and the text file which is
the stego object. Options are provided to play the music to verify the audio track.
Vo ensure protection of the file, an option to verify password is also provided. Vhe
password is encrypted using the same algorithm and hence secure.
Vhe audio is read in bit by bit form, each eighth bit of the image is used for
embedding the content. Now, the first bit of the content is embedded into the eight
bit of the image and the second bit of the content is embedded in to the sixteenth
bit of the image and so on. Vhis is repeated for every character. Vhus, the
watermark is embedded into the document. Vhe digest of the image document is
created using a standard hash code function in Java language. Vhe decoding and
decryption is done as reverse process.
&#&
Decoding is the reverse process of encoding. In the decoding phase the
embedded bits are just retrived. Vhe LSB of the audio file are retrives and written
in a text file from where it can be read.
A password is provided to ensure secure transmission on the file. In this
module, we request a password from the user and we encode the password with the
same algorithm. Hence it cannot be intercepted without the algorithm.
c%
'()(
&$*
Processor Speed Minimum : Intel PIV 2GHz
RAM : 256 MB
Hard Disk : 40 GB
Monitor : 15¶¶ SVGA COLOR
Keyboard : Standard
Mouse : Standard
'(+(c*$*
Operating System : Windows
Language : Java