Document at Ions
-
Upload
sravani-reddy -
Category
Documents
-
view
217 -
download
0
Transcript of Document at Ions
-
8/3/2019 Document at Ions
1/42
A
MINI PROJECT REPORT
ON
HIDING TEXTUAL DATA IN CIPHER
CRYPTO SYSTEMS BY USING AUDIOS
P.SRAVANI G.PRAHITHA
[08R61A0592] [08R61A0562]
G.PRAVALIKA P.PRIYANKA
[08R61A0566] [08R61A0569]
UNDER THE ESTEEMED GUIDANCE OF
Mr. P.L.K.KUMAR REDDY
Head of the department, CSE
Department of Computer Science and Engineering
PRIYADARSHINI COLLEGE OF ENGINEERING
AND TECHNOLOGY
(Approved by AICTE,Affiliated to JNTU,Anantapur)
Nellore-524004.
1
-
8/3/2019 Document at Ions
2/42
HIDING TEXTUAL DATA IN CIPHER
CRYPTO SYSTEMS BY USING AUDIOS
Mini Project report submitted in partial fulfillment of the requirement for
the award of degree of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
By
P.SRAVANI G.PRAHITHA
[08R61A0592] [08R61A0562]
G.PRAVALIKA P.PRIYANKA
[08R61A0566] [08R61A0569]
Department of Computer Science and Engineering
PRIYADARSHINI COLLEGE OF ENGINEERING &
TECHNOLOGY
(Approved by AICTE, Affiliated to JNTU, Anantapur)
Nellore-524004
2
-
8/3/2019 Document at Ions
3/42
PRIYADARSHINI COLLEGE OF ENGINEERING
AND TECHNOLOGY
(Approved by AICTE,Affiliated to JNTU,Anantapur)
Nellore-524004
CERTIFICATE
This is to certify that the project report entitled HIDING TEXTUAL
DATA IN CIPHER CRYPTO SYSTEMS BY USING AUDIOSbeing submitted
byP.SRAVANI (08R61A0592) G.PRAHITHA (08R61A0562) G.PRAVALIKA
(08R61A0566) P.PRIYANKA (08R61A0569) in partial fulfillment for the award
of the Degree of Bachelor of Technology in CSE to the Jawaharlal Nehru
Technological University Anantapur is a record of bonafied work carried out by
him under my guidance and supervision.
The results embodied in this project report have not been submitted to anyother University or Institute for the award of any Degree of Diploma.
Mr. P.L.K. KUMAR REDDY Mr. P.L.K. KUMAR REDDY
(Head of the Department) (Project Guide)
COMPUTER SCIENCE ENGINEERING Assistant Professor CSE Dept.
EXAMINER
ACKNOWLEDGEMENT
1
-
8/3/2019 Document at Ions
4/42
All endeavors a long period can be successful only with the advice and
support of many well wishers. We take this opportunity to express our gratitude
and appreciation to all of them.
We are grateful to thank Dr. I. GOPAL REDDY, the Director of
Priyadarshini College of Engineering & Technology, Nellore for his inspiring
environment and providing us necessary infrastructure required for doing the
project work.
We are immensely grateful to Dr. VIJAY BASKAR REDDY, Principal,
Priyadarshini College of Engineering & Technology, Nellore for his
encouragement and inspiration throughout the process.
At the outset, we sincerely acknowledge our deep sense of gratitude to our
Head of the CSE Department Mr. P.L.K.K. REDDY for his encouragement and
help throughout the project work.
We would like to express our sincere gratitude to internal guide of our
project Mr. P.L.K.KUMAR REDDY, for her support and conscientious
guidance throughout the project work. We extend our sincere thanks to our
parents and friends for their continuous support and encouragement without which
this project would not have been a success.
Thanking you all,
Project Associates,
P.SRAVANI
G.PRAHITHA
G.PRAVALIKA
P.PRIYANKA
ABSTRACT
2
-
8/3/2019 Document at Ions
5/42
Information hiding technique is a new kind of secret communicationtechnology. The majority of todays information hiding systems uses multimediaobjects like audio.Embedding secret messages in digital sound is usually a more difficult process.Varieties of techniques for embedding information in digital audio have beenestablished. In this paper we will attend the general principles of hiding secret
information using audio technology, and an overview of functions and techniques.
Keywords: Audio data hiding, parity coding, phase coding, spread spectrum,echo hiding, LSB
1
-
8/3/2019 Document at Ions
6/42
CONTENTS
LIST OF ABBREVATIONS
LIST OF FIGURES
ABSTRACT
CHAPTER 1
INTRODUCTION
1.1 Project Overview
CHAPTER 2
SOFTWARE AND HARDWARE REQUIREMENTS
2.1 hardware requirements
2.2 software requirements
CHAPTER 3
LITERTURE SURVEY REVIEW OF LITERATURE
3.1 Previous Works
3.2 Proposed Work
3.3 Applications
CHAPTER 4
SYSTEM ANALYSIS
4.1 Introduction
4.1.1 procedure
4.1.2 feasibility report
1
-
8/3/2019 Document at Ions
7/42
CHAPTER 5
DESIGN
5.1 UML Diagrams introduction
5.1.1Static uml diagrams
5.1.2 Dynamic uml diagrams
CHAPTER 6
CODE
6.1 Algorithm
CHAPTER 7
TESTING
7.1 Introduction
7.1.1 Levels Of Testing
7.1.2 Testing Process
7.1.3Test Plan
7.1.3.1 Test Case Specification
7.1.3.2 TestCaseExecution Analysis
CHAPTER 8
SCREEN SHOTS
CHAPTER 9
CONCLUSION
2
-
8/3/2019 Document at Ions
8/42
CHAPTER 10
REFERENCES
LIST OF FIGURES
Fig 1: Block diagram of data hiding and retrieval
Fig 2.Class Diagram
2
-
8/3/2019 Document at Ions
9/42
Fig 3.Use Case Diagram For Sender
Fig 4.Use Case Diagram For Receiver
Fig 5.Sequence Diagram For Sender
Fig 6.Sequence Diagram For Reciever
Fig 7.enciphering computation
Fig.8 Audio Crypto Page
Fig.9 Selecting Output File
Fig.10 Embedding Message
Fig.11 Opening the output file
Fig.12 Embedding file
Fig.13 Master File Information
Fig.14 Encryption Zone
Fig.15 Selecting Data File
Fig.16 Alert Message
Fig.17 Retrieving File
Fig. 18 Entering Password
Fig.19 Final output Alert message for retrieving file
Successfully
CHAPTER 1
INTRODUCTION
2
-
8/3/2019 Document at Ions
10/42
The fast improvement of the Internet and the digital
information revolution caused major changes in the overall
culture. Flexible and simple-to-use software and decreasing
prices of digital devices (e.g. portable CD and mp3 players, DVD
players, CD and DVD recorders, laptops, PDAS) have made itfeasible for consumers from all over the world to create, edit and
exchange multimedia data. Broadband Internet connections
almost an errorless transmission of data helps people to distribute
large multimedia files and make identical digital copies of them.
In modern communication system Data Hiding is most essential
for Network Security issue. Sending sensitive messages and files
over the Internet are transmitted in an unsecured form but
everyone has got something to keep in secret. Audio data hiding
method is one of the most effective ways to protect your privacy.
1.1 Project overview
General principles of data hiding technology, as well as
terminology adopted at the First International Workshop on
Information Hiding, Cambridge, U.K. are illustrated in Fig1. A
data message is hidden within a cover signal (object) in the block
called embedded using a stego key, which is a secret set of
parameters of a known hiding algorithm. The output of the
embedded is called stego signal (object). After transmission,
recording, and other signal processing which may contaminate
and bend the stego signal, the embedded message is retrieved
using the appropriate stego key in the block called extractor.
2
-
8/3/2019 Document at Ions
11/42
Fig 1: Block diagram of data hiding and retrieval.
A number of different cover objects (signals) can be used to
carry hidden messages. Data hiding in audio signals exploits
imperfection of human auditory system known as audio masking.
In presence of a loud signal (masker), another weaker signal may
be in audible, depending on spectral and temporal characteristics
of both masked signal and masker [3] Masking models are
extensively studied for perceptual compression of audio signals
[2] In the case of perceptual compression the quantization noise is
hidden below the masking threshold, while in a data hiding
application the embedded signal is hidden there. Data hiding in
audio signals is especially challenging, because the human
auditory system operates over a wide dynamic range. The human
auditory system perceives over a range of power greater than one
billion to one and a range of frequencies greater than one
thousand to one. Sensitivity to additive random noise is also
acute.
The perturbations in a sound file can be detected as low as
one part in ten million (80 dB below ambient level).However,
there are some holes available. While the human auditorysystem has a large dynamic range, it has a fairly small differential
range. As a result, loud sounds tend to mask out quiet sounds.
Additionally, the human auditory system is unable to perceive
absolute phase, only relative phase. Finally, there are some
environmental distortions so common as to be ignored by the
listener in most cases [4]. Now we will discuss many of these
methods of audio data hiding technology.
1
-
8/3/2019 Document at Ions
12/42
EMBED
The compressed data & CRC file is appended (embed) to the
end of the image file without affecting the image data or the
header information of that image. The software stores the data in
a format that is not recognizable even when viewed from a text or
document editor.
DE-EMBED
At the receiving end the module identify the location of the
data picks up the size of the file, filename and reads the data to
the length of the data file and regenerate the text file that was
embedded with in the image file.
CHAPTER 2
Software and hardware Requirements
2.1 Hard Ware Requirements
2
-
8/3/2019 Document at Ions
13/42
Processor :: Pentium(or) Higher
Ram :: 64MB (or) Higher
Cache :: 512MB
Hard disk :: 10GB (or) Above
2.2 Software Requirements
Tools :: Java Swings
Operating System :: Windows XP
CHAPTER 3
Literature survey review of literature
3.1 Previous Works
1
-
8/3/2019 Document at Ions
14/42
This section presents some common methods used for hiding
secret information in audio. Many software implementations of
these methods are available on the Web and are listed in the
relatives section. Some of the latter methods require previous
knowledge of signal processing techniques, Fourier analysis, andother areas of high level mathematics. When developing a data-
hiding method for audio, one of the first considerations is the
likely environments the sound signal will travel between
encoding and decoding. There are two main areas of modification
which we will consider. First, the storage environment, or digital
representation of the signal that will be used, and second the
transmission pathway the signal might travel.
Parity coding
One of the prior works in audio data hiding technique is
parity coding technique. Instead of breaking a signal down into
individual samples, the parity coding method breaks a signal
down into separate regions of samples and encodes each bit from
the secret message in a sample region's parity bit.
Phase Coding
The phase coding method works by substituting the phase of
an initial audio segment with a reference phase that represents the
data. The phase of subsequent segments is adjusted in order to
preserve the relative phase between segments. Phase coding,
when it can be used, is one of the most effective coding methods
in terms of the signal-to perceived noise ratio. When the phaserelation between each frequency component is dramatically
changed, noticeable phase dispersion will occur. However, as
long as the modification of the phase is sufficiently small
(sufficiently small depends on the observer; professionals in
broadcast radio can detect modifications that are imperceivable to
an average observer), an inaudible coding can be achieved.
3.2Proposed Work
2
-
8/3/2019 Document at Ions
15/42
Here we will discuss the disadvantages of the previous
procedure and how those are different with present method. There
are two main disadvantages associated with the use of methods
like parity coding. The human ear is very sensitive and can often
detect even the slightest bit of noise introduced into a sound file,although the parity coding method does International Journal of
Database Theory and Application come much closer to making
the introduced noise inaudible. Another problem is robustness.
Least significant bit (LSB) coding is the simplest way to
embed information in a digital audio file. By substituting the least
significant bit of each sampling point with a binary message, LSB
coding allows for a large amount of data to be encoded. Among
many different data hiding techniques proposed to embed secret
message within audio file, the LSB data hiding technique is one
of the simplest methods for inserting data into digital signals in
noise free environments, which merely embeds secret message-
bits in a subset of the LSB planes of the audio stream.
The following steps are:a. Receives the audio file in the form of bytes and converted
in to bit pattern.
b. Each character in the message is converted in bit pattern.
c. Replaces the LSB bit from audio with LSB bit from
character in the message.
This proposed system is to provide a good, efficient method
for hiding the data from hackers and sent to the destination in a
safe manner. This proposed system will not change the size of the
file even after encoding and also suitable for any type of audio
file format.
Encryption and Decryption techniques have been used to
make the security system robust,low-bit encoding embeds secret
data into the least
3
-
8/3/2019 Document at Ions
16/42
significant bit (LSB) of the audio file,the channel capacity is
1KB per second per kilohertz (44 kbps for a 44 KHz sampled
sequence). This method is easy to incorporate.
3.3 Applications
Audio data hiding can be used anytime you want to hide
data. There are many reasons to hide data but most important is to
prevent unauthorized persons from becoming aware of the
existence of a message. In the business world Audio data hiding
can be used to hide a secret chemical formula or plans for a new
invention. Audio data hiding can also be used incorporate world.
Audio data hiding can also be used in the noncommercial
sector to hide information that some one wants to keep private,
Terrorists can also use Audio data hiding to keep their
communications secret and to coordinate attacks. In the project
ARTUS1 which aims to embed animation parameters into audio
and video contents, Data hiding in video an audio, is of interest
for the protection of copyrighted digital media, and to the
government for information systems security and for covert
communications.
CHAPTER 4
SYSTEM ANALYSIS
4.1 Introduction
4
-
8/3/2019 Document at Ions
17/42
After analyzing the requirements of the task to be performed,
the next step is to analyze the problem and understand its context.
The first activity in the phase is studying the existing system and
other is to understand the requirements and domain of the new
system. Both the activities are equally important, but the firstactivity serves as a basis of giving the functional specifications
and then successful design of the proposed system.
Understanding the properties and requirements of a new system is
more difficult and requires creative thinking and understanding of
existing running system is also difficult, improper understanding
of present system can lead diversion from solution.
4.1.1 Procedure
The data is to be embedded in an selected audio file.
The embedding process is done internally because of
the GUI.
Whenever we selected the embedding data, then in
internally the particular programs
Module Description
Graphical User Interface(GUI)
Encryption, Decryption with Audio File
GUI Module
This module generates the user interface through which a
user browses the audio file and can play and stop the audio file.
This GUI contains different fields such as text area for entering
message and buttons for encryption and decryption.
Encryption and Decryption Module
During encryption, audio file will be created and in this
audio file. In this audio file LSB of the each byte will be replaced
by the encrypted data which is generated by the combination of
the encryption key and the plain text i.e., the original message.
5
-
8/3/2019 Document at Ions
18/42
Then this audio file will be sent to the recipient. At recipient side
this encrypted data will be extracted from each LSB and performs
decryption operation on it and gives original information
The encryption and decryption process are done by usingthe algorithm DES. The DES algorithm.
4.1.2 Feasibility Report
Preliminary investigation examine project feasibility, the
likelihood the system will be useful to the organization. The main
objective of the feasibility study is to test the Technical,
Operational and Economical feasibility for adding new modules
and debugging old running system. All system is feasible if they
are unlimited resources and infinite time. There are aspects in the
feasibility study portion of the preliminary investigation:
Technical Feasibility
Operational Feasibility
Economical Feasibility
Technical Feasibility
The technical issue usually raised during the feasibility stage
of the investigation includes the following:
Does the necessary technology exist to do what is
suggested?
Do the proposed equipments have the technical
capacity to hold the data required to use the new
system?
Will the proposed system provide adequate response
to inquiries, regardless of the number or location of
users?
Can the system be upgraded if developed?
2
-
8/3/2019 Document at Ions
19/42
Are there technical guarantees of accuracy, reliability,
ease of access and data security?
Earlier no system existed to cater to the needs of
Secure Infrastructure Implementation System. The
current system developed is technically feasible. It isa web based user interface for audit workflow at NIC-
CSD. Thus it provides an easy access to the users.
The databases purpose is to create, establish and
maintain a workflow among various entities in order
to facilitate all concerned users in their various
capacities or roles.
Operational Feasibility
Proposed projects are beneficial only if they can be turned
out into information system. That will meet the organizations
operating requirements. Operational feasibility aspects of the
project are to be taken as an important part of the project
implementation. Some of the important issues raised are to test.
The operational feasibility of a project includes the
following: -
Is there sufficient support for the management from
the users?
Will the system be used and work properly if it is
being developed and implemented?
Will there be any resistance from the user that will
undermine the possible application benefits?
This system is targeted to be in accordance with the
above-mentioned issues. Beforehand, the
management issues and user requirements have been
taken into consideration. So there is no question of
resistance from the users that can undermine the
possible application benefits.
1
-
8/3/2019 Document at Ions
20/42
The well-planned design would ensure the optimal
utilization of the computer resources and would help
in the improvement of performance status.
Economical Feasibility
A system can be developed technically and that will be used
if installed must still be a good investment for the organization. In
the economical feasibility, the development cost in creating the
system is evaluated against the ultimate benefit derived from the
new systems. Financial benefits must equal or exceed the costs.
The system is economically feasible. It does not require any
addition hardware or software. Since the interface for this system
is developed using the existing resources and technologies
available at NIC, There is nominal expenditure and economical
feasibility for certain.
CHAPTER 5
DESIGN
Introduction
Design is a meaningful engineering representation of
something that is to be built. Software design is a process through
which the requirements are translated into a representation of the
software. Design is the place where quality is fostered in software
engineering. Design is the perfect way to accurately translate a
customers requirement in to a finished software product. Design
1
-
8/3/2019 Document at Ions
21/42
creates a representation or model, provides detail about software
data structure, architecture, interfaces and components that are
necessary to implement a system.
5.1 UML DIAGRAMS INTRODUCTION
The unified modeling language is a standard language for
specifying, Visualizing, Constructing and documenting the
software system and its components. It is a graphical language
which provides a vocabulary and set of semantics and rules. The
UML focuses on the conceptual and physical representation of
the system. It captures the decisions and understandings about
systems that must be constructed.It information about the
systems.
The UML has nine diagrams; these diagrams can be
classified into the following groups.
5.1.1 Static UML diagrams
Class Diagram
Component Diagram
Deployment Diagram
5.1.2 Dynamic UML diagrams
Use case diagram.
Sequence diagram.
Collaboration diagram.
State chart diagram.
Activity diagram.
Static or structural diagrams
Class diagram
2
-
8/3/2019 Document at Ions
22/42
This shows a set of classes, interfaces, collaborations and
their relationships. There are the most common diagrams in
modeling the object oriented systems and are used to give the
static view of a system.
Component diagram
This shows a set of components and their relationships
and used to illustrate the static implementation view of a system
interfaces of collaborations.
Deployment diagram
Set of nodes and their relationships have shown here. Theyare used to show the static deployment view of the architecture
of a system. They are related to the component diagrams where a
node encloses one or more components.
Dynamic or behavioral diagrams
Use Case diagram
Set of use cases and actors and their relationships have
shown here. These diagrams illustrate the static use case view of
a system and are important in organizing and modeling the
behaviors of a system.
Sequence diagram & collaboration diagram
These two diagrams are semantically same i.e. the dynamics
of a system can be modeled using one diagram and transform it tothe other kind of diagram without loss of information. Both form
the, Interaction diagram.
Sequence diagram
Sequence diagram is an interaction diagram which focuses
on the time ordering of messages it shows a set of objects and
2
-
8/3/2019 Document at Ions
23/42
messages exchange between these objects. This diagram
illustrates the dynamic view of a system
Collaboration diagram
This diagram is an interaction diagram that stresses oremphasizes the structural organization of the objects that send
and receive messages.objects and messages send and received.
Class diagram
3
-
8/3/2019 Document at Ions
24/42
Fig 2.Class Diagram
2
-
8/3/2019 Document at Ions
25/42
Use case Diagram
Fig 3.Use Case Diagram For Sender
3
-
8/3/2019 Document at Ions
26/42
Use case Diagram
Fig 4.Use Case Diagram For Receiver
2
-
8/3/2019 Document at Ions
27/42
Sequence diagram
Fig 5.Sequence Diagram For Sender
1
-
8/3/2019 Document at Ions
28/42
Sequence diagram
Fig 6.Sequence Diagram For Reciever
2
-
8/3/2019 Document at Ions
29/42
CHAPTER 6
CODE
Encryption and Decryption Module
During encryption, audio file will be created and in this
audio file. In this audio file LSB of the each byte will be replaced
by the encrypted data which is generated by the combination of
the encryption key and the plain text i.e., the original message.
Then this audio file will be sent to the recipient. At recipient side
this encrypted data will be extracted from each LSB and performs
decryption operation on it and gives original information
The encryption and decryption process are done by using
the algorithm DES. The DES algorithm description is as follows:
6.1 ALGORITHM
DATA ENCRYPTION STANDARD (DES)
The algorithm is designed to encipher and decipher blocks of
data consisting of 64 bits under control of a 64-bit key.Deciphering must be accomplished by using the same key as for
enciphering, but with the schedule of addressing the key bits
altered so that the deciphering process is the reverse of the
enciphering process. A block to be enciphered is subjected to an
initial permutation IP, then to a complex key-dependent
computation and finally to a permutation which is the inverse of
the initial permutation IP-1 The key-dependent computation can
be simply defined in terms of a functionf, called the cipher
function, and a function KS, called the key schedule. A
description of the computation is given first, along with details as
to how the algorithm is used for encipher ment. Next, the use of
the algorithm for decipherment is described. Finally, a definition
of the cipher functionfis given in terms of primitive functions
which are called the selection functions Si and the permutation
function P. Si, P and KS of the algorithm are contained in theAppendix.
2
-
8/3/2019 Document at Ions
30/42
The following notation is convenient: Given two
blocks L and R of bits, LR denotes the block consisting of the bits
ofL followed by the bits ofR. Since concatenation is associative,
B1B2...B8, for example, denotes the block consisting of the bits of
B1 followed by the bits of B2...followed by the bits of B8.
Blocks are composed of bits numbered
from left to right, i.e., the left most bit of a block is bit one.
Figure 7: Enciphering computation.
2
-
8/3/2019 Document at Ions
31/42
CHAPTER 7
TESTING
7.1Introduction
Testing is one of the most important phases in the software
development activity. In software development life
cycle(SDLC),the main aim of testing process is the quality; the
developed software is tested against attaining the required
functionality and performance during the testing process the
software is worked with some particular test cases and the output
of the test cases are analyzed.
The success of the testing process in
determining the errors is mostly depends upon the test criteria, for
testing any software we need to have a description of the
expected behavior of the system and method of determining
whether the observed behavior confirmed to the expected
behavior.
7.1.1 Levels Of Testing
Since the errors in the software can be injured at any stage
we have to carry out the testing process at different levels during
the development. The basic levels of testing are Unit, Integration,
System and Acceptance testing.
The Unit Testing is carried out on
coding. Here different modules are tested against the
specifications produced during design for the modules. In case of
integration testing different tested modules are combined into
subsystems and tested in case of the system testing the full
software is tested and in the next level of testing the system is
tested with user requirement document prepared during SRS.
There are 2 basic approaches for
testing. They are
2
-
8/3/2019 Document at Ions
32/42
Functional TestingIn Functional Testing test cases are decided solely on the
basis of requirements of the program or module and the internals
of the program or modules are not considered for selection of test
cases. This is also called Black Box Testing.
Structural TestingIn Structural Testing test case are generated on actual code of
the program or module to be tested. This is also called as White
Box Testing.
7.1.2 Testing Process
A number of activities must be performed for testing
software. Testing starts with test plan. Test plan identifies all
testing related activities that need to be performed along with the
schedule and guidelines for testing. The plan also specifies the
levels of testing that need to be done, by identifying the different
testing units. For each unit specified in the plan first the test cases
and reports are produced. These reports are analyzed.
7.1.3 Test PlanTest Plan is a general document for entire project, which
defines the scope, approach to be taken and the personal
responsible for different activities of testing, The inputs for
forming test plan are:
1.Project plan
2.Requirements document
3.System design
7.1.3.1 Test case specification
Although there is one test plan for entire project test cases
have to be specified separately for each test case. Test case
3
-
8/3/2019 Document at Ions
33/42
specification gives for each item to be tested. All test cases and
outputs expected for those test cases.
7.1.3.2 Test case execution analysis
The steps to be performed for executing the test cases arespecified in separate document called test procedure
specification. This document specifies any specified requirements
that exist for setting the test environment and describes the
methods and formats for reporting the results of testing.
White Box Testing
This type of testing ensures that
All independent paths have been exercised at least
once.
All logical decisions have been exercised on their true
and false sides.
All loops are executed at their boundaries within their
operational bounds.
AIl internal data structures have been exercised.
Unit Testing
Unit testing mainly focused first in the smallest and low level
modules, proceeding one at a time. Bottom-up testing was
performed on each module. As developing a driver program, that
tests modules by developed or used. But for the purpose of
testing, modules themselves were used as stubs, to print
verification of the actions performed. After the lower levels
modules were tested, the modules that in the next higher level
those make use of the lower modules were tested. Each module
was tested against required functionality and test cases were
developed to test the boundary values.
4
-
8/3/2019 Document at Ions
34/42
Integration Testing Integration testing is a systematic technique for constructing
the program structure, while at the same timeconducting teststo
uncover errors associated with interfacing. As the system consists
of the number of modules the interface to be tested was between
the edges of the two modules. The software tested under this was
incremental bottom-up approach.
Bottom-up approach integration
strategy was implemented with the following steps..
CHAPTER 8
3
-
8/3/2019 Document at Ions
35/42
SCREEN SHOTS
Fig.8 Audio Crypto Page
Fig.9 Seletcing Output File
3
-
8/3/2019 Document at Ions
36/42
Fig.10 Embedding Message
Fig.11 Opening the output file
1
-
8/3/2019 Document at Ions
37/42
Fig.12 Embedding file
Fig.13 Master File Information
1
-
8/3/2019 Document at Ions
38/42
Fig.14 Encryption Zone
Fig.15 Selecting Data File
1
-
8/3/2019 Document at Ions
39/42
Fig.16 Alert Message
Fig.17 Retrieving File
1
-
8/3/2019 Document at Ions
40/42
Fig. 18 Entering Password
Fig.19 Final output Alert message for retrievingfile Successfully
3
-
8/3/2019 Document at Ions
41/42
CHAPTER 9
CONCLUSION
In this project we have introduced a robust method of
imperceptible audio data hiding. This system is to provide a
good, efficient method for hiding the data from hackers and
sent to the destination in a safe manner. This proposed
system will not change the size of the file even after
encoding and also suitable for any type of audio file format.
Thus we conclude that audio data hiding techniques can be
used for a number of purposes other than covert
communication or deniable data storage , information
tracing and finger printing, tamper detection. Man is now
pushing away its own boundaries to make every thought
possible. So similarly these operations described above
can be further modified as it is in the world of Information
Technology
CHAPTER 10
3
-
8/3/2019 Document at Ions
42/42
REFERENCES
1.WILLIAMSTALLING PRESSMAN - CRYPTOGRAPHY &
NETWORK SECURITY
2.PATRICK NORTON AND HERBERT SCHILD, TATA Mc
GRAW - 2. JAVA COMPLETE REFERENCE -
3.BAHRAMI,TATA Mc GRAW HILL- OBJECT ORIENTED
SYSTEM ANALYSIS AND DESIGN
4. www.wikiepedia.com
5 .www.google.com