Audio Cryptography System

43
An Industrial Oriented Project On Audio Cryptography System Team Members B.Raju G.Pavan

Transcript of Audio Cryptography System

Page 1: Audio Cryptography System

An Industrial Oriented Project

On

Audio Cryptography System

Team MembersB.RajuG.Pavan

Page 2: Audio Cryptography System

Audio Cryptography System

Contents Introduction Project Features Project Purpose Existing System Proposed System System Modules System Analysis Design Testing UML Diagrams Screenshots Future Scope Conclusion Reference

Page 3: Audio Cryptography System

INTRODUCTIONCryptography

• Study of hiding the information.• Method of storing and transformation of data from source to destination in particular form So that whom intended they can only read and process it.

Page 4: Audio Cryptography System

Project Features• Platform independent• No need to download any software• Provide high security• Cipher text is embedded in the audio wave file • Secrecy in terms of message hiding.• High Capacity of the audio file. • Accurate Extraction.• Resistance from external attacks.

Page 5: Audio Cryptography System

Audio Cryptography System

Project PurposeProvides

• Confidentiality• Integrity• Non-Repudiation• Authentication

Page 6: Audio Cryptography System

Audio Cryptography System

Existing System If a person sends sensitive information over the insecure channels of the system then there may be a chance of hacking it, they can alter the information and sends it over the net. This problem has been solved by the proposed system

Page 7: Audio Cryptography System

Audio Cryptography System

Proposed System In the proposed system the above problem has been solved by embedding the data into the audio file. Before embedding it into the file, encryption operation will be performed by using the encryption key which is provided by the source. Then this audio file will be passed over the net, even if hacker hacks it, can be able to see only an audio file. At the destination side this data will be encrypted from audio file and performs decryption to get original message

Page 8: Audio Cryptography System

Audio Cryptography System

System Modules

There are two modules embedded in this system they are

1. GUI Module2. Encryption & Decryption Module

Page 9: Audio Cryptography System

GUI ModuleGUI is a Graphical User Interface and it is a type of user interface that allows users to interact with electronic devices with images rather than text commandsBasically GUI module is built by 1. AWT2. Components3. Swings

1.AWT: AWT is a Abstract Window Toolkit, A class library is provided by the Java programming language which is known as Abstract Window Toolkit (AWT) for writing graphical programs. The AWT contains several graphical widgets which can be added and positioned to the display area with a layout manager. AWT uses system peers object for constructing graphical widgets

Page 10: Audio Cryptography System

Audio Cryptography System

2.Components: A graphical user interface is built of graphical elements called Components. A component is an object having a graphical representation that can be displayed on the screen and that can interact with the user. Components allow the user to interact with the program and provide the input to the program.

3.Swings: Swing is important to develop Java programs with a graphical user interface (GUI). There are many components which are used for the building of GUI in Swing. The Swing Toolkit consists of many components for the building of GUI. These components are also helpful in providing interactivity to Java applications.

Page 11: Audio Cryptography System

Audio Cryptography System

Encryption & Decryption Module During encryption, audio file will be created and in this audio

file.

In this audio file LSB of the each byte will be replaced by the

encrypted data which is generated by the combination of the

encryption key and the plain text i.e., the original message.

Then this audio file will be sent to the recipient. At recipient

side this encrypted data will be extracted from each LSB and

performs decryption operation on it and gives original information.

Page 12: Audio Cryptography System

Audio Cryptography System

LSB Coding: Least significant bit (LSB) coding is the simplest way to embed

information in adigital audio file. By substituting the least significant bit of each sampling point with a binary Message LSB coding allows for a large amount of data to be encoded. The following diagram illustrates how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method.

Page 13: Audio Cryptography System

Audio Cryptography System

Powerful Encryption Algorithm :

This is used to enhance the security further. The following steps are used to encrypt the message a) Converting the message into its ASCII code.

b) Making the 64 bits blocks of the message. c) Generating an encryption key. d) Performing permutations and logical operations to the

bit pattern. Encoding:-The process of hiding the message in the audio file. Decoding:- Is a process of retrieving the message from the audio file.

Page 14: Audio Cryptography System

Message

Output File

Audio File

LSB of each byte

Encryption Algorithm

Encoding

Key

Yes

ENCODING FLOW CHART

Page 15: Audio Cryptography System

Encoded Audio

LSB of each byte

Decode

Decrypt

Message

Key

DECODING FLOW GRAPH

Page 16: Audio Cryptography System

Audio Cryptography System

Hardware Requirements

• Processor: Pentium-III (or) Higher• Ram: 64MB (or) Higher• Hard disk: 50GB

Software Requirements

• Server Side Technology : AWT & Swings • Operating System: WindowsNT/2000• Languages: Java 2 Standard Edition

System Analysis

Page 17: Audio Cryptography System

Design

System Architecture

Page 18: Audio Cryptography System

Audio Cryptography System

Working Flow Of the System1) First we will take an audio file and perform sampling on it. We will

sample the file in 8 bits per frame. 2) Input the message file which we want to transmit. Then encrypt it

using the RSA algorithm by the use of public key. 3) After encryption we will embed the encrypted data in the audio file.

Here for embedding we will use multiple LSB algorithm. The above operations will be performed at the transmitter end.

4) After that the stego audio is transmitted to the intended receiver 5) The intended receiver will extract the encrypted data using steps of

extraction from the multiple LSB algorithm. 6) Then receiver will use the private key for decryption to get the

original message.

Page 19: Audio Cryptography System

Audio Cryptography System

Testing Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and code generation

Test Case Design

1.White Box Testing 2.Balck Box Testing

Page 20: Audio Cryptography System

Audio Cryptography System

Tests at various levels

1. Unit Testing2. Integration Testing 3. Validation Testing 4. System Testing

Page 21: Audio Cryptography System

Audio Cryptography System

UML Diagrams

Class Diagram Use Case Diagram Activity Diagram

Page 22: Audio Cryptography System

Audio Cryptography System

Class Diagram

Page 23: Audio Cryptography System

Audio Cryptography System

Use Case Diagram

Use case diagram for send and receive a audio file

Page 24: Audio Cryptography System

Audio Cryptography System

Select audio file

Select output directory

Encrypt message

Select message to

embed

Verify details

Enter key

 Use case diagram for embedding/encoding

Page 25: Audio Cryptography System

Audio Cryptography System

Select embed

audio file

Enter secret key

Decrypt message

Select retrieve to view file

Verify details

Enter key

 Use case diagram for extracting/decoding

Page 26: Audio Cryptography System

Activity Diagram

Encrypt

Encrypt or Decrypt

Take Audio

Get Text

Decrypt Message

Enter Key

Get Audio

Decrypt

Enter Key

Enter Text

Save or Send

Encrypt Message

Start

Stop

Page 27: Audio Cryptography System

Screenshots:Run the batch file from the bin folder

Page 28: Audio Cryptography System

Then click on file and select embed message

Page 29: Audio Cryptography System

Then it will shows this automatically

Page 30: Audio Cryptography System

Then select any audio file from the simple music. After selecting the audio file it ask about the destination path to store that audio file(better to give another path).Then give name as u like

Page 31: Audio Cryptography System

After giving the destination file name then automatically shows

Page 32: Audio Cryptography System

Then click on encrypt checkbox then it will ask about the password and enter some secret message.

Page 33: Audio Cryptography System

Then click on go buttonThen your data is encrypted behind the destination audio file.Then it shows like

Page 34: Audio Cryptography System

If your want to see the data content which is encrypted behind destination audio file then you can click on retrieve file.

Page 35: Audio Cryptography System

Then you can select the saved destination audio file

Page 36: Audio Cryptography System

Then it will shows

Page 37: Audio Cryptography System

Then click on go button then it will ask for password

Page 38: Audio Cryptography System

Enter that old password to decrypt the data, then it shows our text file

Page 39: Audio Cryptography System

Audio Cryptography System

Future Scope Though it is a well built system, it has been limited to some restrictions. Quality of the sound depends upon the size of the audio file selected by the user and the length of the message to be hidden. There are a number of ways that this project can be extended. Its performance can be upgraded to higher levels by using a better algorithm for encoding and decoding. Instead of having a common secret key for encryption and decryption, a public-private key pairs can be used.

Page 40: Audio Cryptography System

Audio Cryptography System

Conclusion Placing the machine to be protected behind physical walls.

However, physical security is not always an option due to

cost and/or efficiency considerations. Instead, most

computers are interconnected with each other openly,

thereby exposing them and the communication channels that

they use.

This proposed system is to provide a good, efficient method

for hiding the data from hackers and sent to the destination

in a safe manner.

Page 41: Audio Cryptography System

Audio Cryptography System

Reference

Advanced Java Programming - Dietel and Dietel Mastering JAVA 2 - John ZukowskiJava Server Programming - ApressSoftware Engineering - Roger S PressmanAnálysis & Design of InformationSystems – Senn Websites:

www.eci.gov.inwww.google.comwww.apeci.comwww.askjeeves.com

Page 42: Audio Cryptography System

Audio Cryptography System

Query

Page 43: Audio Cryptography System

Audio Cryptography System

THANK YOU