Contact at mumbai.academics@gmail.com or 8097636691
Responsive Ads Here

Monday, 29 January 2018

Data Hiding in Audio Signal: A Review(2012)

Data Hiding in Audio Signal: A Review(2012)

Abstract:
Information hiding technique is a new kind of secret communication technology. The majority of today’s information hiding systems uses multimedia objects like audio. Embedding secret messages in digital sound is usually a more difficult process. Varieties of techniques for embedding information in digital audio have been established. In this paper we will attend the general principles of hiding secret information using audio technology, and an overview of functions and techniques.
EXISTING SYSTEM:
          Nowadays, several methods are used for communicating secret messages for defense purposes or in order to ensure the privacy of communication between two parties. So we go for hiding information in ways that prevent its detection.
Some of the methods used for privacy communication are the use of invisible links, covert channels are some of existing systems that are used to convey the messages.
PROPOSED SYSTEM: 
            The proposed system uses Audio file as a carrier medium which add another step in security. The objective of the newly proposed system is to create a system that makes it very difficult for an opponent to detect the existence of a secret message by encoding it in the carrier medium as a function of some secret key and that remains as the advantage of this syste.
Modules and their Description:
Data hiding and extracting from an audio file is done in two main modules.
  • Embed module.
  • Extract module.      
Embed  Module (To embed the text file into the audio file):
            In this module, the first step is selecting an input audio file . The selection is made through opening a new dialog box and the path selected is displayed through a textbox. The second step is selecting an output audio file in which text data or a text file is embedded. The third step is choosing a text file or typing any text message for embedding. Fourth step is selecting a key file. In the fifth step what ever the files that we have selected are viewed and verification of the path is done. In the sixth process data is embedded in to the audio file using low bit encoding technique.
After embedding the content both the audio files are played and a listener cannot find any difference between the audios.
Extract Module (To extract the text file from the audio file):
              In this module, the first step is the process of selecting the encrypted audio file. This is the file that a user has to extract information from the output audio. Second process involved in selecting a new text file to display the embedded meassage.Symmetric encryption method is used here, so the key selected during the embedding process is used in decrypting the message. All the process done till now are displayed using a list box and finally the embedded message can be viewed with the help of a file or in a textbox.
Software Specification:
OPERATING SYSTEM                    :  Windows XP Professional
FRONT END                                   :  Microsoft Visual Studio .Net 2008
BACK END                                      : SQL SERVER 2005
CODING LANGUAGE                   :  C# .Net
Hardware Specification:
SYSTEM                                         :   Pentium III 700 MHz
HARD DISK                                   :   40 GB
RAM                                                :   128 MB

No comments:

Post a Comment