Contact at or 8097636691
Responsive Ads Here

Tuesday, 13 February 2018

MP3Stego: Hiding Text in MP3 Files(2011)

MP3Stego: Hiding Text in MP3 Files(2011)

This Project Titled “Data Hiding in Audio files” is the software developed for hiding information which uses the technology called as Steganography –derived from the Greek words meaning, “Covered writing”, is the art of hiding information in ways that prevent its detection.
It is a method akin to covert channels, and invisible links, which add another step in security. A message in cipher text may arouse suspicion while an invisible message is not. Digital stenography uses a host data or message known as a “Container” or “Cover” to hide another data or message in it. The conventional way of protecting information was to use a standard symmetric or asymmetric key system in encryption. Steganography can also be used to place a hidden “trademark” in images, music, and software, a technique referred to as watermarking.
To ensure the privacy of the communication between two parties, various new methods are being developed. Cryptography being the mother to all those projects. However, cryptography is like a tool, it can do as well as it is programmed to do. Also, there are various different techniques that can be implemented to attain a certain level of security. Here we implement a technique for data hiding in audio images, known as Audio file Steganography.
First the audio file which behaves as carrier file is selected. Then a message or a text file to be embedded in audio is selected. Then a key file is selected. The key file contains characters whose ASCII values are taken for encryption. Then the file is embedded in audio using low bit encoding mechanism and extraction of embedded message is being done vice-versa.
We are of the belief that the easiest way to keep something from prying eyes is to place it right in front of the person looking for it and make it look as innocuous as possible.
Everyone has a taste for a certain kind of music. Hence, it is more than likely that the person will have that kind of music on the storage device of his computer. Also, it is quite common case where people share and transfer different music files to one another. If one were able to hide the message can be. Also, transfer of this message can be done quite conveniently without raising any eyebrows.
Our aim is to come up with a technique of hiding the message in the audio file in such a way, that there would be no perceivable changes in the in the audio file after the message insertion. At the same time, if the message that is to be hidden were encrypted, the level of security would be raised to quite a satisfactory level. Now, even if the hidden message were to be discovered the person trying to get the message would only be able to lay his hands on the encrypted message with no way of being able to decrypt it.
Data hiding in audio signals is especially challenging, because the Human Auditory System (HAS) operates over a wide dynamic range. The HAS perceives over a range of power greater than one billion to one and a range of frequencies greater than thousand to one. Sensitivity to additive random noise is also acute.
The perturbations in a sound file can be detected as low as one part in ten million which is 80dB below ambient level. However there are some ‘holes’ available. While the HAS has a large dynamic range, it has a fairly small differential range. As a result, loud sounds tend to mask out the quieter sounds.
Additionally, the HAS is unable to perceive absolute phase, only relative phase. Finally there are some environmental distortions so common as to be ignored by the listener in most cases.
 Low-bit encoding:
Low-bit encoding is the one of the simplest way to embed data into other data structures. By replacing the least significant bit of each sampling point by a coded binary string, we can encode a large amount of data in an audio signal.
Ideally, the channel capacity is 1 kb per second (kbps) per 1 kilohertz(kHz), e.g., in a noiseless channel, the bit rate will be 8 kbps in an 8 kHz sampled sequence and 44 kbps in a 44kHz sampled sequence. In return for this large channel capacity, audible noise is introduced. The impact of this noise is a direct function of the content of the host signal, e.g., crowd noise during a live sports event would mask low-bit encoding noise that would be audible in a string quartet performance.
Adaptive data attenuation has been used to compensate this variation. The major advantage of this method is its poor immunity to manipulation. Encoded information can be destroyed by channel noise, re-sampling, etc., unless it is encoded using redundancy techniques.
In order to be robust, these techniques reduce the data rate which could result in the requirement of a host of higher magnitude, often by one to two orders of magnitude. In practice, this method is useful only in closed, digital-to-digital environments.
Data hiding and extracting from an audio file is done in two main modules.
  • Embed module.
  • Extract module.
Embed  module(To embed the text file into the audio file)
In this module, the first step is selecting an input audio file . The selction is made through opening a new dialog box and the path selected is displayed through a textbox. The  second step is selecting an output audio file in which text data or a text file is embedded. The third step is choosing a text file or typing any text message for embedding.fourth step is
selecting a key file. In the fifth step what ever the files that we have selected  are viewed and verification of the path is done. In the sixth process data is embedded in to the audio file using low bit encoding technique.
After embedding the content both the audio files are played  and a listener cannot find any difference between the audios.
Extract module(To extract the text file from the audio file)
In this module, the first step is the process of selecting the encrypted audio file. This is the file ,that a user has to extract information from the output audio. second process involved in selecting a new text file to display the embedded meassage.Symmetric encryption method is used here, so the key selected during the embedding process is used in decrypting the message.All the process done till now are displayed using a list box and finally the embedded message can be viewed with the help of  a file or in a textbox.
Nowadays, several methods are used for communicating secret messages for defense purposes or in order to ensure the privacy of communication between two parties. So we go for hiding information in ways that prevent its detection.
Some of the methods used for privacy communication are the use of invisible links, covert channels are some of existing systems that are used to convey the messages.
The proposed system uses Audio file as a carrier medium which add another step in security. The objective of the newly proposed system is to create a system that makes it very difficult for an opponent to detect the existence of a secret message by encoding it in the carrier medium as a function of some secret key and that remains as the advantage of this system
 OPERATING SYSTEM                   :  Windows XP Professional
 FRONT END                                                :  Microsoft Visual Studio .Net 2003
 CODING LANGUAGE                   :  C# .Net
 SYSTEM                                         :   Pentium III 700 MHz
 HARD DISK                                   :   40 GB
 FLOPPY DRIVE                            :   1.44 MB
 MONITOR                                      :   15 VGA colour monitor
 MOUSE                                           :   Logitech.
 RAM                                                :   128 MB
 KEYBOARD                                  :   110 keys enhanced.

No comments:

Post a Comment