Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 48

Data Hiding in

Audio Files
(Steganography)
Aim
The aim of this project is to hide a text
file into an audio file of Au format, the
constraint is that the size and quality of
the audio should not be altered.
Steganography: What is
it?
Steganography: Art
of hiding information
• To ensure the privacy of communication
• Hiding information such that even its presence
can’t be detected
• There would be no perceivable changes in audio
file after message insertion
Steganography :
Methods of Concealment

• Invisible ink
• Digital signatures
• Covert channels
Steganography: Common
Elements
• Carrier medium : Audio file
• Embedded message : Text file
• Key : Password
Steganography: Users &
Applications
• Government, Law Enforcement,
Military purposes
• Common Applications
– Covert communication of sensitive data
– Facilitate ‘theft of data’
– Embedding hidden ‘trademarks’ in
images, music, etc.,
Steganography: How it
works?
Steganography in Audio
• Low Bit Encoding
• Phase Encoding
• Spread Spectrum
• Echo Data Hiding
Steganography in Audio
• Low Bit Encoding
– Most digital audio is created by sampling the
signal and quantizing the sample with a 16-bit
quantizer.
– The rightmost bit, or low order bit, of each
sample can be changed according to data string
– This modification from one sample value to
another is not perceptible by most people and
the audio signal still sounds the same
Low Bit
Encoding
Steganography in Audio
• Phase Encoding
– Relies on the relative insensitivity of the
human auditory system to phase changes
– Substitutes the initial phase of an audio
signal with a reference phase that
represents the data
– More complex than low bit encoding, but
it is much more robust and less likely to
distort the signal that is carrying the
hidden data.
Steganography in Audio
• Direct Sequence Spread Spectrum
– Spreads the signal by multiplying it by a
chip, which is a maximal length
pseudorandom sequence
– DSSS introduces additive random noise
to the sound file
Steganography in Audio
• Echo Data Hiding
– Discrete copies of the original signal are
mixed in with the original signal creating
echoes of each sound.
– By using two different time values
between an echo and the original sound,
a binary 1 or binary 0 can be encoded.
Implementation
• Audio file : AU format
• Encoding method : Low Bit Encoding
• Encryption method : PBE (MD5)
Password Based
Encryption
Data Flow Diagram
Stegano-
-graphed
Audio File Encoding Decoding

Carrier Media Audio file


Cipher Text
Data (Text
Encryption
File) Decryption Audio File

Data (Text
File)
Extraction

Embedding data into Audio of data from Audio


Implementation
Future Enhancements
• Can be sent through the network, and that
can be extracted at the other end.
• Support for other audio formats such as
(wav, mp3) can easily be added which
needs additional sound encoding/decoding
method to be implemented.
THANK YOU !

You might also like