SlideShare uma empresa Scribd logo
1 de 22
Audio
STEGANOGRAPHY
STEGANOGRAPHY


                                   No one apart
                                      from the
    Art and            A form of    sender and
 science of             security     intended
writing hidden          through      recipient,
 messages              obscurity   suspects the
                                    existence of
                                   the message


     www.company.com
STEGANOGRAPHY TECHNIQUE




  www.company.com
Embedded
  Data


              Hidden
             MESSAGE


Audio File




      MESSAGE
Audio
AUDIO TERMS
• Sampling is the process in which
the analogue values are only captured at regular
time intervals.

• Quantization converts each input value into one
  of a discrete value.

• Popular sampling rates for audio include 8 kHz,
  9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and
  44.1 kHz
     www.company.com
Audio File Types

                  File Format


     Uncompressed                     Compressed




                              Lossy           Loseless
   WAV              AIEF
                                              ALAC, FlAC,
                           Mp3, AAC, WMA
                                               WavPack




www.company.com
WHY .WAV ?
Most popular Audio format


Don’t lose any quality in recording

Easier format for Development

No Compression!!
  www.company.com
WAVE FILE FORMAT




 www.company.com
WAVE FILE FORMAT
HEX Values of Wave




File Size Chunk           Length of Format




 Data Chunk               Audio Attributes




        www.company.com
Steganography
  Techniques
TYPES OF STEGANOGRAPHY

            LSB CODING


          PHASE CODING


           ECHO HIDING

                   SPREAD
  www.company.com
                  SPECTRUM
WHY LSB?
Low computational complexity



Easier Implementation


Variation in choosing LSB

  www.company.com
LSB ALGORITHM


                             Step 2                                    Step 4
• Receives the                                • Check which LSB   • Replaces the LSB
  audio file            • Each character        to Replace By       bit from audio
  convert it into bit     in the message is     RC4 Algorithm       with LSB bit from
  pattern.                converted into
                                                                    character in the
                          bit pattern.
                                                                    message.
      Step1                                        Step 3


             www.company.com
CONT. ALGORITHM : CHANGING BITS




 www.company.com
CONT. ALGORITHM : CHANGING BITS




            RC4 Algorithm
 www.company.com
RC4 ALGORITHM

                        RC4



                                 The pseudo-
          The key-
                                   random
         scheduling
                                  generation
      algorithm (KSA)
                              algorithm (PRGA)


www.company.com
RC4 ALGORITHM
•   The key-scheduling algorithm (KSA)
    •   initialize the permutation in the array "S
    •    Array "S" is initialized to the identity permutation
    •   Swap values of S[i] and S[j].




          www.company.com
RC4 ALGORITHM
•   The pseudo-random generation algorithm (PRGA)
    •   Used as many iterations as are needed




         www.company.com
Live Demo
QUESTIONS




www.company.com
RESOURCES
•   Source Code :
    http://www.codeproject.com/Articles/6960/Steganography-
    VIII-Hiding-Data-in-Wave-Audio-Files
•   Other Online
    •   http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&
        rep=rep1&type=pdf
    •   deepaldhariwal.weebly.com/uploads/4/9/0/9/4909109/report.docx
    •   http://en.wikipedia.org/wiki/RC4




         www.company.com

Mais conteúdo relacionado

Mais procurados

Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Chandni Verma
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java projectTutorial Learners
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 

Mais procurados (20)

Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Steganography
Steganography Steganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
steganography
steganographysteganography
steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Encryption
EncryptionEncryption
Encryption
 
Steganography
SteganographySteganography
Steganography
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
Steganography
SteganographySteganography
Steganography
 

Semelhante a Audio steganography - LSB

Jonathan Christensen's Presentation at eComm 2009
Jonathan Christensen's Presentation at eComm 2009Jonathan Christensen's Presentation at eComm 2009
Jonathan Christensen's Presentation at eComm 2009eCommConf
 
Jonathan Christensen's Presentation at eComm 2009
Jonathan Christensen's Presentation at eComm 2009Jonathan Christensen's Presentation at eComm 2009
Jonathan Christensen's Presentation at eComm 2009eCommConf
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protectionArpan Pal
 
Acidgrooves DSP SDK Brochure
Acidgrooves DSP SDK BrochureAcidgrooves DSP SDK Brochure
Acidgrooves DSP SDK BrochureAcidgrooves
 
LiveCoding Package for Pharo
LiveCoding Package for PharoLiveCoding Package for Pharo
LiveCoding Package for PharoESUG
 
SCSD 2020 - Security Risk Assessment of Radio-Enabled Technologies
SCSD 2020 - Security Risk Assessment of Radio-Enabled TechnologiesSCSD 2020 - Security Risk Assessment of Radio-Enabled Technologies
SCSD 2020 - Security Risk Assessment of Radio-Enabled TechnologiesMarco Balduzzi
 
Generic Video Adaptation Framework Towards Content – and Context Awareness in...
Generic Video Adaptation Framework Towards Content – and Context Awareness in...Generic Video Adaptation Framework Towards Content – and Context Awareness in...
Generic Video Adaptation Framework Towards Content – and Context Awareness in...Alpen-Adria-Universität
 
Wireshark
WiresharkWireshark
Wiresharkbtohara
 
Lorawan: What you need to know
Lorawan: What you need to knowLorawan: What you need to know
Lorawan: What you need to knowPaul Coomans
 
SONY IBC2008
SONY IBC2008SONY IBC2008
SONY IBC2008lychakov
 
GOTO Night with Todd Montgomery: Aeron: What, why and what next?
GOTO Night with Todd Montgomery: Aeron: What, why and what next?GOTO Night with Todd Montgomery: Aeron: What, why and what next?
GOTO Night with Todd Montgomery: Aeron: What, why and what next?Alexandra Masterson
 
RabbitMQ with python and ruby RuPy 2009
RabbitMQ with python and ruby RuPy 2009RabbitMQ with python and ruby RuPy 2009
RabbitMQ with python and ruby RuPy 2009Paolo Negri
 
What's New with Amazon Elastic Transcoder November 2013
What's New with Amazon Elastic Transcoder November 2013What's New with Amazon Elastic Transcoder November 2013
What's New with Amazon Elastic Transcoder November 2013David Sayed
 
FOSS Sthlm: Realtime Communication Update
FOSS Sthlm: Realtime Communication UpdateFOSS Sthlm: Realtime Communication Update
FOSS Sthlm: Realtime Communication UpdateOlle E Johansson
 
Broadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasiBroadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasiSSPI Brasil
 

Semelhante a Audio steganography - LSB (20)

Jonathan Christensen's Presentation at eComm 2009
Jonathan Christensen's Presentation at eComm 2009Jonathan Christensen's Presentation at eComm 2009
Jonathan Christensen's Presentation at eComm 2009
 
Jonathan Christensen's Presentation at eComm 2009
Jonathan Christensen's Presentation at eComm 2009Jonathan Christensen's Presentation at eComm 2009
Jonathan Christensen's Presentation at eComm 2009
 
SPEECH CODING
SPEECH CODINGSPEECH CODING
SPEECH CODING
 
Astricon 2007
Astricon 2007Astricon 2007
Astricon 2007
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protection
 
Serial-War
Serial-WarSerial-War
Serial-War
 
Acidgrooves DSP SDK Brochure
Acidgrooves DSP SDK BrochureAcidgrooves DSP SDK Brochure
Acidgrooves DSP SDK Brochure
 
LiveCoding Package for Pharo
LiveCoding Package for PharoLiveCoding Package for Pharo
LiveCoding Package for Pharo
 
SCSD 2020 - Security Risk Assessment of Radio-Enabled Technologies
SCSD 2020 - Security Risk Assessment of Radio-Enabled TechnologiesSCSD 2020 - Security Risk Assessment of Radio-Enabled Technologies
SCSD 2020 - Security Risk Assessment of Radio-Enabled Technologies
 
Generic Video Adaptation Framework Towards Content – and Context Awareness in...
Generic Video Adaptation Framework Towards Content – and Context Awareness in...Generic Video Adaptation Framework Towards Content – and Context Awareness in...
Generic Video Adaptation Framework Towards Content – and Context Awareness in...
 
Wireshark
WiresharkWireshark
Wireshark
 
Lorawan: What you need to know
Lorawan: What you need to knowLorawan: What you need to know
Lorawan: What you need to know
 
SONY IBC2008
SONY IBC2008SONY IBC2008
SONY IBC2008
 
GOTO Night with Todd Montgomery: Aeron: What, why and what next?
GOTO Night with Todd Montgomery: Aeron: What, why and what next?GOTO Night with Todd Montgomery: Aeron: What, why and what next?
GOTO Night with Todd Montgomery: Aeron: What, why and what next?
 
RabbitMQ with python and ruby RuPy 2009
RabbitMQ with python and ruby RuPy 2009RabbitMQ with python and ruby RuPy 2009
RabbitMQ with python and ruby RuPy 2009
 
What's New with Amazon Elastic Transcoder November 2013
What's New with Amazon Elastic Transcoder November 2013What's New with Amazon Elastic Transcoder November 2013
What's New with Amazon Elastic Transcoder November 2013
 
FOSS Sthlm: Realtime Communication Update
FOSS Sthlm: Realtime Communication UpdateFOSS Sthlm: Realtime Communication Update
FOSS Sthlm: Realtime Communication Update
 
Ivr worx
Ivr worxIvr worx
Ivr worx
 
雲端媒體串流
雲端媒體串流雲端媒體串流
雲端媒體串流
 
Broadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasiBroadcast day-2007-tandberg-ipxasi
Broadcast day-2007-tandberg-ipxasi
 

Mais de Mohab El-Shishtawy

Mais de Mohab El-Shishtawy (6)

Intro to appcelerator
Intro to appceleratorIntro to appcelerator
Intro to appcelerator
 
Arabic key phrase extraction
Arabic key phrase extractionArabic key phrase extraction
Arabic key phrase extraction
 
Msp program and tech club Benha
Msp program and tech club BenhaMsp program and tech club Benha
Msp program and tech club Benha
 
Live@edu + Dreamspark + MSDNAA
Live@edu + Dreamspark + MSDNAALive@edu + Dreamspark + MSDNAA
Live@edu + Dreamspark + MSDNAA
 
Microsoft Azure
Microsoft AzureMicrosoft Azure
Microsoft Azure
 
Mobile Hardware
Mobile HardwareMobile Hardware
Mobile Hardware
 

Último

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 

Último (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Audio steganography - LSB

  • 2. STEGANOGRAPHY No one apart from the Art and A form of sender and science of security intended writing hidden through recipient, messages obscurity suspects the existence of the message www.company.com
  • 3. STEGANOGRAPHY TECHNIQUE www.company.com
  • 4. Embedded Data Hidden MESSAGE Audio File MESSAGE
  • 6. AUDIO TERMS • Sampling is the process in which the analogue values are only captured at regular time intervals. • Quantization converts each input value into one of a discrete value. • Popular sampling rates for audio include 8 kHz, 9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and 44.1 kHz www.company.com
  • 7. Audio File Types File Format Uncompressed Compressed Lossy Loseless WAV AIEF ALAC, FlAC, Mp3, AAC, WMA WavPack www.company.com
  • 8. WHY .WAV ? Most popular Audio format Don’t lose any quality in recording Easier format for Development No Compression!! www.company.com
  • 9. WAVE FILE FORMAT www.company.com
  • 10. WAVE FILE FORMAT HEX Values of Wave File Size Chunk Length of Format Data Chunk Audio Attributes www.company.com
  • 12. TYPES OF STEGANOGRAPHY LSB CODING PHASE CODING ECHO HIDING SPREAD www.company.com SPECTRUM
  • 13. WHY LSB? Low computational complexity Easier Implementation Variation in choosing LSB www.company.com
  • 14. LSB ALGORITHM Step 2 Step 4 • Receives the • Check which LSB • Replaces the LSB audio file • Each character to Replace By bit from audio convert it into bit in the message is RC4 Algorithm with LSB bit from pattern. converted into character in the bit pattern. message. Step1 Step 3 www.company.com
  • 15. CONT. ALGORITHM : CHANGING BITS www.company.com
  • 16. CONT. ALGORITHM : CHANGING BITS RC4 Algorithm www.company.com
  • 17. RC4 ALGORITHM RC4 The pseudo- The key- random scheduling generation algorithm (KSA) algorithm (PRGA) www.company.com
  • 18. RC4 ALGORITHM • The key-scheduling algorithm (KSA) • initialize the permutation in the array "S • Array "S" is initialized to the identity permutation • Swap values of S[i] and S[j]. www.company.com
  • 19. RC4 ALGORITHM • The pseudo-random generation algorithm (PRGA) • Used as many iterations as are needed www.company.com
  • 22. RESOURCES • Source Code : http://www.codeproject.com/Articles/6960/Steganography- VIII-Hiding-Data-in-Wave-Audio-Files • Other Online • http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413& rep=rep1&type=pdf • deepaldhariwal.weebly.com/uploads/4/9/0/9/4909109/report.docx • http://en.wikipedia.org/wiki/RC4 www.company.com

Notas do Editor

  1. The key-scheduling algorithm is used to initialize the permutation in the array "S." "keylength" is defined as the number of bytes in the key and can be in the range 1 ≤ keylength ≤ 256, typically between 5 and 16, corresponding to a key length of 40 – 128 bits. First, the array "S" is initialized to the identity permutation. S is then processed for 256 iterations in a similar way to the main PRGA, but also mixes in bytes of the key at the same time.
  2. or as many iterations as are needed, the PRGA modifies the state and outputs a byte of the keystream. In each iteration, the PRGA increments i, looks up the ith element of S, S[i], and adds that to j, exchanges the values of S[i] and S[j], and then uses the sum S[i] + S[j] (modulo 256) as an index to fetch a third element of S, (the keystream value K below) which is XORed with the next byte of the message to produce the next byte of either ciphertext or plaintext. Each element of S is swapped with another element at least once every 256 iterations.