Data Hiding in Audio File
Transcript of Data Hiding in Audio File
-
8/10/2019 Data Hiding in Audio File
1/15
MAJOR PROJECT REPORT ON
Data Hiding in Audio Files
PRESENTED BY:UMANG GIRDHER(08515003110)
UTSAV DIXIT(20115003110)
NITISH ANAND(08815003110)
-
8/10/2019 Data Hiding in Audio File
2/15
INTRODUCTION
Art and science
of writing
hidden
messages
No one apart
from the senderand intended
recipient,
suspects the
existence of themessage
A form of
security through
obscurity
-
8/10/2019 Data Hiding in Audio File
3/15
TECHNIQUE USED
-
8/10/2019 Data Hiding in Audio File
4/15
MESSAGE
EmbeddedData
Audio File
Hidden
MESSAGE
-
8/10/2019 Data Hiding in Audio File
5/15
Audio
-
8/10/2019 Data Hiding in Audio File
6/15
AUDIO TERMS
Samplingis the process in which
the analogue values are only captured at regular
time intervals.
Quantizationconverts each input value into one
of a discrete value.
Popularsampling rates for audio include 8 kHz,
9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and
44.1 kHz
-
8/10/2019 Data Hiding in Audio File
7/15
Audio File Types
File Format
Uncompressed
WAV AIEF
Compressed
Lossy
Mp3, AAC, WMA
Loseless
ALAC, FlAC,
WavPack
-
8/10/2019 Data Hiding in Audio File
8/15
WHY .WAV ?
Most popular Audio format
Dont lose any quality in recording
Easier format for Development
No Compression!!
-
8/10/2019 Data Hiding in Audio File
9/15
Techniques
-
8/10/2019 Data Hiding in Audio File
10/15
DIFFERENT ALGORITHM TYPES
LE ST
SIGNIFIC NT
BIT CODING
H SE
CODING
ECHO HIDING
SPRE D
SPECTRUM
-
8/10/2019 Data Hiding in Audio File
11/15
WHY LEAST SIGNIFICANT BIT?
Low computational complexity
Easier Implementation
Variation in choosing LSB
-
8/10/2019 Data Hiding in Audio File
12/15
ALGORITHM
Receives theaudio fileconvert it into bitpattern.
Step1
Each characterin the message isconverted intobit pattern.
Step 2 Check which LSB
to Replace Byusing Algorithm
Step 3
Replaces the LSBbit from audiowith LSB bit fromcharacter in themessage.
Step 4
-
8/10/2019 Data Hiding in Audio File
13/15
Content identification andmanagement
Authentication of content and objects
(includes government IDs) Content filtering (includes blockingand triggering of actions)
-
8/10/2019 Data Hiding in Audio File
14/15
Digital watermark is an important step toward management of copyrighted andsecured documents. Any kind of digital data like video (consists of image frames),audio, text can easily watermarked. The most obvious application is to usewatermarks to encode information. Information hiding is possible with the help ofwatermarking which is the need of todays piracy or illegal use of images.
The images can be copyrighted & patented with the help of watermarkingtechnique to prevent unauthorized access.
Visible watermarking technique is used by the Television channels to restrict the
illegal transmission & broadcasting of T.V. programs by inserting the watermark atthe corner of the channel signals. Illegal use of the watermarking technique can be done by the terrorists or other persons who are against the community by transferring the hiding
information through watermarks. But there are watermarking agents which act as a detective through the
transmission & reception of data/information. So, the watermarking technique is very much popular in these days, only thing we
need now days is recovery of Digital watermark if there is attack on it.
-
8/10/2019 Data Hiding in Audio File
15/15
THANK YOU!!