Document at Ions

download Document at Ions

of 42

Transcript of Document at Ions

  • 8/3/2019 Document at Ions

    1/42

    A

    MINI PROJECT REPORT

    ON

    HIDING TEXTUAL DATA IN CIPHER

    CRYPTO SYSTEMS BY USING AUDIOS

    P.SRAVANI G.PRAHITHA

    [08R61A0592] [08R61A0562]

    G.PRAVALIKA P.PRIYANKA

    [08R61A0566] [08R61A0569]

    UNDER THE ESTEEMED GUIDANCE OF

    Mr. P.L.K.KUMAR REDDY

    Head of the department, CSE

    Department of Computer Science and Engineering

    PRIYADARSHINI COLLEGE OF ENGINEERING

    AND TECHNOLOGY

    (Approved by AICTE,Affiliated to JNTU,Anantapur)

    Nellore-524004.

    1

  • 8/3/2019 Document at Ions

    2/42

    HIDING TEXTUAL DATA IN CIPHER

    CRYPTO SYSTEMS BY USING AUDIOS

    Mini Project report submitted in partial fulfillment of the requirement for

    the award of degree of

    BACHELOR OF TECHNOLOGY

    IN

    COMPUTER SCIENCE AND ENGINEERING

    By

    P.SRAVANI G.PRAHITHA

    [08R61A0592] [08R61A0562]

    G.PRAVALIKA P.PRIYANKA

    [08R61A0566] [08R61A0569]

    Department of Computer Science and Engineering

    PRIYADARSHINI COLLEGE OF ENGINEERING &

    TECHNOLOGY

    (Approved by AICTE, Affiliated to JNTU, Anantapur)

    Nellore-524004

    2

  • 8/3/2019 Document at Ions

    3/42

    PRIYADARSHINI COLLEGE OF ENGINEERING

    AND TECHNOLOGY

    (Approved by AICTE,Affiliated to JNTU,Anantapur)

    Nellore-524004

    CERTIFICATE

    This is to certify that the project report entitled HIDING TEXTUAL

    DATA IN CIPHER CRYPTO SYSTEMS BY USING AUDIOSbeing submitted

    byP.SRAVANI (08R61A0592) G.PRAHITHA (08R61A0562) G.PRAVALIKA

    (08R61A0566) P.PRIYANKA (08R61A0569) in partial fulfillment for the award

    of the Degree of Bachelor of Technology in CSE to the Jawaharlal Nehru

    Technological University Anantapur is a record of bonafied work carried out by

    him under my guidance and supervision.

    The results embodied in this project report have not been submitted to anyother University or Institute for the award of any Degree of Diploma.

    Mr. P.L.K. KUMAR REDDY Mr. P.L.K. KUMAR REDDY

    (Head of the Department) (Project Guide)

    COMPUTER SCIENCE ENGINEERING Assistant Professor CSE Dept.

    EXAMINER

    ACKNOWLEDGEMENT

    1

  • 8/3/2019 Document at Ions

    4/42

    All endeavors a long period can be successful only with the advice and

    support of many well wishers. We take this opportunity to express our gratitude

    and appreciation to all of them.

    We are grateful to thank Dr. I. GOPAL REDDY, the Director of

    Priyadarshini College of Engineering & Technology, Nellore for his inspiring

    environment and providing us necessary infrastructure required for doing the

    project work.

    We are immensely grateful to Dr. VIJAY BASKAR REDDY, Principal,

    Priyadarshini College of Engineering & Technology, Nellore for his

    encouragement and inspiration throughout the process.

    At the outset, we sincerely acknowledge our deep sense of gratitude to our

    Head of the CSE Department Mr. P.L.K.K. REDDY for his encouragement and

    help throughout the project work.

    We would like to express our sincere gratitude to internal guide of our

    project Mr. P.L.K.KUMAR REDDY, for her support and conscientious

    guidance throughout the project work. We extend our sincere thanks to our

    parents and friends for their continuous support and encouragement without which

    this project would not have been a success.

    Thanking you all,

    Project Associates,

    P.SRAVANI

    G.PRAHITHA

    G.PRAVALIKA

    P.PRIYANKA

    ABSTRACT

    2

  • 8/3/2019 Document at Ions

    5/42

    Information hiding technique is a new kind of secret communicationtechnology. The majority of todays information hiding systems uses multimediaobjects like audio.Embedding secret messages in digital sound is usually a more difficult process.Varieties of techniques for embedding information in digital audio have beenestablished. In this paper we will attend the general principles of hiding secret

    information using audio technology, and an overview of functions and techniques.

    Keywords: Audio data hiding, parity coding, phase coding, spread spectrum,echo hiding, LSB

    1

  • 8/3/2019 Document at Ions

    6/42

    CONTENTS

    LIST OF ABBREVATIONS

    LIST OF FIGURES

    ABSTRACT

    CHAPTER 1

    INTRODUCTION

    1.1 Project Overview

    CHAPTER 2

    SOFTWARE AND HARDWARE REQUIREMENTS

    2.1 hardware requirements

    2.2 software requirements

    CHAPTER 3

    LITERTURE SURVEY REVIEW OF LITERATURE

    3.1 Previous Works

    3.2 Proposed Work

    3.3 Applications

    CHAPTER 4

    SYSTEM ANALYSIS

    4.1 Introduction

    4.1.1 procedure

    4.1.2 feasibility report

    1

  • 8/3/2019 Document at Ions

    7/42

    CHAPTER 5

    DESIGN

    5.1 UML Diagrams introduction

    5.1.1Static uml diagrams

    5.1.2 Dynamic uml diagrams

    CHAPTER 6

    CODE

    6.1 Algorithm

    CHAPTER 7

    TESTING

    7.1 Introduction

    7.1.1 Levels Of Testing

    7.1.2 Testing Process

    7.1.3Test Plan

    7.1.3.1 Test Case Specification

    7.1.3.2 TestCaseExecution Analysis

    CHAPTER 8

    SCREEN SHOTS

    CHAPTER 9

    CONCLUSION

    2

  • 8/3/2019 Document at Ions

    8/42

    CHAPTER 10

    REFERENCES

    LIST OF FIGURES

    Fig 1: Block diagram of data hiding and retrieval

    Fig 2.Class Diagram

    2

  • 8/3/2019 Document at Ions

    9/42

    Fig 3.Use Case Diagram For Sender

    Fig 4.Use Case Diagram For Receiver

    Fig 5.Sequence Diagram For Sender

    Fig 6.Sequence Diagram For Reciever

    Fig 7.enciphering computation

    Fig.8 Audio Crypto Page

    Fig.9 Selecting Output File

    Fig.10 Embedding Message

    Fig.11 Opening the output file

    Fig.12 Embedding file

    Fig.13 Master File Information

    Fig.14 Encryption Zone

    Fig.15 Selecting Data File

    Fig.16 Alert Message

    Fig.17 Retrieving File

    Fig. 18 Entering Password

    Fig.19 Final output Alert message for retrieving file

    Successfully

    CHAPTER 1

    INTRODUCTION

    2

  • 8/3/2019 Document at Ions

    10/42

    The fast improvement of the Internet and the digital

    information revolution caused major changes in the overall

    culture. Flexible and simple-to-use software and decreasing

    prices of digital devices (e.g. portable CD and mp3 players, DVD

    players, CD and DVD recorders, laptops, PDAS) have made itfeasible for consumers from all over the world to create, edit and

    exchange multimedia data. Broadband Internet connections

    almost an errorless transmission of data helps people to distribute

    large multimedia files and make identical digital copies of them.

    In modern communication system Data Hiding is most essential

    for Network Security issue. Sending sensitive messages and files

    over the Internet are transmitted in an unsecured form but

    everyone has got something to keep in secret. Audio data hiding

    method is one of the most effective ways to protect your privacy.

    1.1 Project overview

    General principles of data hiding technology, as well as

    terminology adopted at the First International Workshop on

    Information Hiding, Cambridge, U.K. are illustrated in Fig1. A

    data message is hidden within a cover signal (object) in the block

    called embedded using a stego key, which is a secret set of

    parameters of a known hiding algorithm. The output of the

    embedded is called stego signal (object). After transmission,

    recording, and other signal processing which may contaminate

    and bend the stego signal, the embedded message is retrieved

    using the appropriate stego key in the block called extractor.

    2

  • 8/3/2019 Document at Ions

    11/42

    Fig 1: Block diagram of data hiding and retrieval.

    A number of different cover objects (signals) can be used to

    carry hidden messages. Data hiding in audio signals exploits

    imperfection of human auditory system known as audio masking.

    In presence of a loud signal (masker), another weaker signal may

    be in audible, depending on spectral and temporal characteristics

    of both masked signal and masker [3] Masking models are

    extensively studied for perceptual compression of audio signals

    [2] In the case of perceptual compression the quantization noise is

    hidden below the masking threshold, while in a data hiding

    application the embedded signal is hidden there. Data hiding in

    audio signals is especially challenging, because the human

    auditory system operates over a wide dynamic range. The human

    auditory system perceives over a range of power greater than one

    billion to one and a range of frequencies greater than one

    thousand to one. Sensitivity to additive random noise is also

    acute.

    The perturbations in a sound file can be detected as low as

    one part in ten million (80 dB below ambient level).However,

    there are some holes available. While the human auditorysystem has a large dynamic range, it has a fairly small differential

    range. As a result, loud sounds tend to mask out quiet sounds.

    Additionally, the human auditory system is unable to perceive

    absolute phase, only relative phase. Finally, there are some

    environmental distortions so common as to be ignored by the

    listener in most cases [4]. Now we will discuss many of these

    methods of audio data hiding technology.

    1

  • 8/3/2019 Document at Ions

    12/42

    EMBED

    The compressed data & CRC file is appended (embed) to the

    end of the image file without affecting the image data or the

    header information of that image. The software stores the data in

    a format that is not recognizable even when viewed from a text or

    document editor.

    DE-EMBED

    At the receiving end the module identify the location of the

    data picks up the size of the file, filename and reads the data to

    the length of the data file and regenerate the text file that was

    embedded with in the image file.

    CHAPTER 2

    Software and hardware Requirements

    2.1 Hard Ware Requirements

    2

  • 8/3/2019 Document at Ions

    13/42

    Processor :: Pentium(or) Higher

    Ram :: 64MB (or) Higher

    Cache :: 512MB

    Hard disk :: 10GB (or) Above

    2.2 Software Requirements

    Tools :: Java Swings

    Operating System :: Windows XP

    CHAPTER 3

    Literature survey review of literature

    3.1 Previous Works

    1

  • 8/3/2019 Document at Ions

    14/42

    This section presents some common methods used for hiding

    secret information in audio. Many software implementations of

    these methods are available on the Web and are listed in the

    relatives section. Some of the latter methods require previous

    knowledge of signal processing techniques, Fourier analysis, andother areas of high level mathematics. When developing a data-

    hiding method for audio, one of the first considerations is the

    likely environments the sound signal will travel between

    encoding and decoding. There are two main areas of modification

    which we will consider. First, the storage environment, or digital

    representation of the signal that will be used, and second the

    transmission pathway the signal might travel.

    Parity coding

    One of the prior works in audio data hiding technique is

    parity coding technique. Instead of breaking a signal down into

    individual samples, the parity coding method breaks a signal

    down into separate regions of samples and encodes each bit from

    the secret message in a sample region's parity bit.

    Phase Coding

    The phase coding method works by substituting the phase of

    an initial audio segment with a reference phase that represents the

    data. The phase of subsequent segments is adjusted in order to

    preserve the relative phase between segments. Phase coding,

    when it can be used, is one of the most effective coding methods

    in terms of the signal-to perceived noise ratio. When the phaserelation between each frequency component is dramatically

    changed, noticeable phase dispersion will occur. However, as

    long as the modification of the phase is sufficiently small

    (sufficiently small depends on the observer; professionals in

    broadcast radio can detect modifications that are imperceivable to

    an average observer), an inaudible coding can be achieved.

    3.2Proposed Work

    2

  • 8/3/2019 Document at Ions

    15/42

    Here we will discuss the disadvantages of the previous

    procedure and how those are different with present method. There

    are two main disadvantages associated with the use of methods

    like parity coding. The human ear is very sensitive and can often

    detect even the slightest bit of noise introduced into a sound file,although the parity coding method does International Journal of

    Database Theory and Application come much closer to making

    the introduced noise inaudible. Another problem is robustness.

    Least significant bit (LSB) coding is the simplest way to

    embed information in a digital audio file. By substituting the least

    significant bit of each sampling point with a binary message, LSB

    coding allows for a large amount of data to be encoded. Among

    many different data hiding techniques proposed to embed secret

    message within audio file, the LSB data hiding technique is one

    of the simplest methods for inserting data into digital signals in

    noise free environments, which merely embeds secret message-

    bits in a subset of the LSB planes of the audio stream.

    The following steps are:a. Receives the audio file in the form of bytes and converted

    in to bit pattern.

    b. Each character in the message is converted in bit pattern.

    c. Replaces the LSB bit from audio with LSB bit from

    character in the message.

    This proposed system is to provide a good, efficient method

    for hiding the data from hackers and sent to the destination in a

    safe manner. This proposed system will not change the size of the

    file even after encoding and also suitable for any type of audio

    file format.

    Encryption and Decryption techniques have been used to

    make the security system robust,low-bit encoding embeds secret

    data into the least

    3

  • 8/3/2019 Document at Ions

    16/42

    significant bit (LSB) of the audio file,the channel capacity is

    1KB per second per kilohertz (44 kbps for a 44 KHz sampled

    sequence). This method is easy to incorporate.

    3.3 Applications

    Audio data hiding can be used anytime you want to hide

    data. There are many reasons to hide data but most important is to

    prevent unauthorized persons from becoming aware of the

    existence of a message. In the business world Audio data hiding

    can be used to hide a secret chemical formula or plans for a new

    invention. Audio data hiding can also be used incorporate world.

    Audio data hiding can also be used in the noncommercial

    sector to hide information that some one wants to keep private,

    Terrorists can also use Audio data hiding to keep their

    communications secret and to coordinate attacks. In the project

    ARTUS1 which aims to embed animation parameters into audio

    and video contents, Data hiding in video an audio, is of interest

    for the protection of copyrighted digital media, and to the

    government for information systems security and for covert

    communications.

    CHAPTER 4

    SYSTEM ANALYSIS

    4.1 Introduction

    4

  • 8/3/2019 Document at Ions

    17/42

    After analyzing the requirements of the task to be performed,

    the next step is to analyze the problem and understand its context.

    The first activity in the phase is studying the existing system and

    other is to understand the requirements and domain of the new

    system. Both the activities are equally important, but the firstactivity serves as a basis of giving the functional specifications

    and then successful design of the proposed system.

    Understanding the properties and requirements of a new system is

    more difficult and requires creative thinking and understanding of

    existing running system is also difficult, improper understanding

    of present system can lead diversion from solution.

    4.1.1 Procedure

    The data is to be embedded in an selected audio file.

    The embedding process is done internally because of

    the GUI.

    Whenever we selected the embedding data, then in

    internally the particular programs

    Module Description

    Graphical User Interface(GUI)

    Encryption, Decryption with Audio File

    GUI Module

    This module generates the user interface through which a

    user browses the audio file and can play and stop the audio file.

    This GUI contains different fields such as text area for entering

    message and buttons for encryption and decryption.

    Encryption and Decryption Module

    During encryption, audio file will be created and in this

    audio file. In this audio file LSB of the each byte will be replaced

    by the encrypted data which is generated by the combination of

    the encryption key and the plain text i.e., the original message.

    5

  • 8/3/2019 Document at Ions

    18/42

    Then this audio file will be sent to the recipient. At recipient side

    this encrypted data will be extracted from each LSB and performs

    decryption operation on it and gives original information

    The encryption and decryption process are done by usingthe algorithm DES. The DES algorithm.

    4.1.2 Feasibility Report

    Preliminary investigation examine project feasibility, the

    likelihood the system will be useful to the organization. The main

    objective of the feasibility study is to test the Technical,

    Operational and Economical feasibility for adding new modules

    and debugging old running system. All system is feasible if they

    are unlimited resources and infinite time. There are aspects in the

    feasibility study portion of the preliminary investigation:

    Technical Feasibility

    Operational Feasibility

    Economical Feasibility

    Technical Feasibility

    The technical issue usually raised during the feasibility stage

    of the investigation includes the following:

    Does the necessary technology exist to do what is

    suggested?

    Do the proposed equipments have the technical

    capacity to hold the data required to use the new

    system?

    Will the proposed system provide adequate response

    to inquiries, regardless of the number or location of

    users?

    Can the system be upgraded if developed?

    2

  • 8/3/2019 Document at Ions

    19/42

    Are there technical guarantees of accuracy, reliability,

    ease of access and data security?

    Earlier no system existed to cater to the needs of

    Secure Infrastructure Implementation System. The

    current system developed is technically feasible. It isa web based user interface for audit workflow at NIC-

    CSD. Thus it provides an easy access to the users.

    The databases purpose is to create, establish and

    maintain a workflow among various entities in order

    to facilitate all concerned users in their various

    capacities or roles.

    Operational Feasibility

    Proposed projects are beneficial only if they can be turned

    out into information system. That will meet the organizations

    operating requirements. Operational feasibility aspects of the

    project are to be taken as an important part of the project

    implementation. Some of the important issues raised are to test.

    The operational feasibility of a project includes the

    following: -

    Is there sufficient support for the management from

    the users?

    Will the system be used and work properly if it is

    being developed and implemented?

    Will there be any resistance from the user that will

    undermine the possible application benefits?

    This system is targeted to be in accordance with the

    above-mentioned issues. Beforehand, the

    management issues and user requirements have been

    taken into consideration. So there is no question of

    resistance from the users that can undermine the

    possible application benefits.

    1

  • 8/3/2019 Document at Ions

    20/42

    The well-planned design would ensure the optimal

    utilization of the computer resources and would help

    in the improvement of performance status.

    Economical Feasibility

    A system can be developed technically and that will be used

    if installed must still be a good investment for the organization. In

    the economical feasibility, the development cost in creating the

    system is evaluated against the ultimate benefit derived from the

    new systems. Financial benefits must equal or exceed the costs.

    The system is economically feasible. It does not require any

    addition hardware or software. Since the interface for this system

    is developed using the existing resources and technologies

    available at NIC, There is nominal expenditure and economical

    feasibility for certain.

    CHAPTER 5

    DESIGN

    Introduction

    Design is a meaningful engineering representation of

    something that is to be built. Software design is a process through

    which the requirements are translated into a representation of the

    software. Design is the place where quality is fostered in software

    engineering. Design is the perfect way to accurately translate a

    customers requirement in to a finished software product. Design

    1

  • 8/3/2019 Document at Ions

    21/42

    creates a representation or model, provides detail about software

    data structure, architecture, interfaces and components that are

    necessary to implement a system.

    5.1 UML DIAGRAMS INTRODUCTION

    The unified modeling language is a standard language for

    specifying, Visualizing, Constructing and documenting the

    software system and its components. It is a graphical language

    which provides a vocabulary and set of semantics and rules. The

    UML focuses on the conceptual and physical representation of

    the system. It captures the decisions and understandings about

    systems that must be constructed.It information about the

    systems.

    The UML has nine diagrams; these diagrams can be

    classified into the following groups.

    5.1.1 Static UML diagrams

    Class Diagram

    Component Diagram

    Deployment Diagram

    5.1.2 Dynamic UML diagrams

    Use case diagram.

    Sequence diagram.

    Collaboration diagram.

    State chart diagram.

    Activity diagram.

    Static or structural diagrams

    Class diagram

    2

  • 8/3/2019 Document at Ions

    22/42

    This shows a set of classes, interfaces, collaborations and

    their relationships. There are the most common diagrams in

    modeling the object oriented systems and are used to give the

    static view of a system.

    Component diagram

    This shows a set of components and their relationships

    and used to illustrate the static implementation view of a system

    interfaces of collaborations.

    Deployment diagram

    Set of nodes and their relationships have shown here. Theyare used to show the static deployment view of the architecture

    of a system. They are related to the component diagrams where a

    node encloses one or more components.

    Dynamic or behavioral diagrams

    Use Case diagram

    Set of use cases and actors and their relationships have

    shown here. These diagrams illustrate the static use case view of

    a system and are important in organizing and modeling the

    behaviors of a system.

    Sequence diagram & collaboration diagram

    These two diagrams are semantically same i.e. the dynamics

    of a system can be modeled using one diagram and transform it tothe other kind of diagram without loss of information. Both form

    the, Interaction diagram.

    Sequence diagram

    Sequence diagram is an interaction diagram which focuses

    on the time ordering of messages it shows a set of objects and

    2

  • 8/3/2019 Document at Ions

    23/42

    messages exchange between these objects. This diagram

    illustrates the dynamic view of a system

    Collaboration diagram

    This diagram is an interaction diagram that stresses oremphasizes the structural organization of the objects that send

    and receive messages.objects and messages send and received.

    Class diagram

    3

  • 8/3/2019 Document at Ions

    24/42

    Fig 2.Class Diagram

    2

  • 8/3/2019 Document at Ions

    25/42

    Use case Diagram

    Fig 3.Use Case Diagram For Sender

    3

  • 8/3/2019 Document at Ions

    26/42

    Use case Diagram

    Fig 4.Use Case Diagram For Receiver

    2

  • 8/3/2019 Document at Ions

    27/42

    Sequence diagram

    Fig 5.Sequence Diagram For Sender

    1

  • 8/3/2019 Document at Ions

    28/42

    Sequence diagram

    Fig 6.Sequence Diagram For Reciever

    2

  • 8/3/2019 Document at Ions

    29/42

    CHAPTER 6

    CODE

    Encryption and Decryption Module

    During encryption, audio file will be created and in this

    audio file. In this audio file LSB of the each byte will be replaced

    by the encrypted data which is generated by the combination of

    the encryption key and the plain text i.e., the original message.

    Then this audio file will be sent to the recipient. At recipient side

    this encrypted data will be extracted from each LSB and performs

    decryption operation on it and gives original information

    The encryption and decryption process are done by using

    the algorithm DES. The DES algorithm description is as follows:

    6.1 ALGORITHM

    DATA ENCRYPTION STANDARD (DES)

    The algorithm is designed to encipher and decipher blocks of

    data consisting of 64 bits under control of a 64-bit key.Deciphering must be accomplished by using the same key as for

    enciphering, but with the schedule of addressing the key bits

    altered so that the deciphering process is the reverse of the

    enciphering process. A block to be enciphered is subjected to an

    initial permutation IP, then to a complex key-dependent

    computation and finally to a permutation which is the inverse of

    the initial permutation IP-1 The key-dependent computation can

    be simply defined in terms of a functionf, called the cipher

    function, and a function KS, called the key schedule. A

    description of the computation is given first, along with details as

    to how the algorithm is used for encipher ment. Next, the use of

    the algorithm for decipherment is described. Finally, a definition

    of the cipher functionfis given in terms of primitive functions

    which are called the selection functions Si and the permutation

    function P. Si, P and KS of the algorithm are contained in theAppendix.

    2

  • 8/3/2019 Document at Ions

    30/42

    The following notation is convenient: Given two

    blocks L and R of bits, LR denotes the block consisting of the bits

    ofL followed by the bits ofR. Since concatenation is associative,

    B1B2...B8, for example, denotes the block consisting of the bits of

    B1 followed by the bits of B2...followed by the bits of B8.

    Blocks are composed of bits numbered

    from left to right, i.e., the left most bit of a block is bit one.

    Figure 7: Enciphering computation.

    2

  • 8/3/2019 Document at Ions

    31/42

    CHAPTER 7

    TESTING

    7.1Introduction

    Testing is one of the most important phases in the software

    development activity. In software development life

    cycle(SDLC),the main aim of testing process is the quality; the

    developed software is tested against attaining the required

    functionality and performance during the testing process the

    software is worked with some particular test cases and the output

    of the test cases are analyzed.

    The success of the testing process in

    determining the errors is mostly depends upon the test criteria, for

    testing any software we need to have a description of the

    expected behavior of the system and method of determining

    whether the observed behavior confirmed to the expected

    behavior.

    7.1.1 Levels Of Testing

    Since the errors in the software can be injured at any stage

    we have to carry out the testing process at different levels during

    the development. The basic levels of testing are Unit, Integration,

    System and Acceptance testing.

    The Unit Testing is carried out on

    coding. Here different modules are tested against the

    specifications produced during design for the modules. In case of

    integration testing different tested modules are combined into

    subsystems and tested in case of the system testing the full

    software is tested and in the next level of testing the system is

    tested with user requirement document prepared during SRS.

    There are 2 basic approaches for

    testing. They are

    2

  • 8/3/2019 Document at Ions

    32/42

    Functional TestingIn Functional Testing test cases are decided solely on the

    basis of requirements of the program or module and the internals

    of the program or modules are not considered for selection of test

    cases. This is also called Black Box Testing.

    Structural TestingIn Structural Testing test case are generated on actual code of

    the program or module to be tested. This is also called as White

    Box Testing.

    7.1.2 Testing Process

    A number of activities must be performed for testing

    software. Testing starts with test plan. Test plan identifies all

    testing related activities that need to be performed along with the

    schedule and guidelines for testing. The plan also specifies the

    levels of testing that need to be done, by identifying the different

    testing units. For each unit specified in the plan first the test cases

    and reports are produced. These reports are analyzed.

    7.1.3 Test PlanTest Plan is a general document for entire project, which

    defines the scope, approach to be taken and the personal

    responsible for different activities of testing, The inputs for

    forming test plan are:

    1.Project plan

    2.Requirements document

    3.System design

    7.1.3.1 Test case specification

    Although there is one test plan for entire project test cases

    have to be specified separately for each test case. Test case

    3

  • 8/3/2019 Document at Ions

    33/42

    specification gives for each item to be tested. All test cases and

    outputs expected for those test cases.

    7.1.3.2 Test case execution analysis

    The steps to be performed for executing the test cases arespecified in separate document called test procedure

    specification. This document specifies any specified requirements

    that exist for setting the test environment and describes the

    methods and formats for reporting the results of testing.

    White Box Testing

    This type of testing ensures that

    All independent paths have been exercised at least

    once.

    All logical decisions have been exercised on their true

    and false sides.

    All loops are executed at their boundaries within their

    operational bounds.

    AIl internal data structures have been exercised.

    Unit Testing

    Unit testing mainly focused first in the smallest and low level

    modules, proceeding one at a time. Bottom-up testing was

    performed on each module. As developing a driver program, that

    tests modules by developed or used. But for the purpose of

    testing, modules themselves were used as stubs, to print

    verification of the actions performed. After the lower levels

    modules were tested, the modules that in the next higher level

    those make use of the lower modules were tested. Each module

    was tested against required functionality and test cases were

    developed to test the boundary values.

    4

  • 8/3/2019 Document at Ions

    34/42

    Integration Testing Integration testing is a systematic technique for constructing

    the program structure, while at the same timeconducting teststo

    uncover errors associated with interfacing. As the system consists

    of the number of modules the interface to be tested was between

    the edges of the two modules. The software tested under this was

    incremental bottom-up approach.

    Bottom-up approach integration

    strategy was implemented with the following steps..

    CHAPTER 8

    3

  • 8/3/2019 Document at Ions

    35/42

    SCREEN SHOTS

    Fig.8 Audio Crypto Page

    Fig.9 Seletcing Output File

    3

  • 8/3/2019 Document at Ions

    36/42

    Fig.10 Embedding Message

    Fig.11 Opening the output file

    1

  • 8/3/2019 Document at Ions

    37/42

    Fig.12 Embedding file

    Fig.13 Master File Information

    1

  • 8/3/2019 Document at Ions

    38/42

    Fig.14 Encryption Zone

    Fig.15 Selecting Data File

    1

  • 8/3/2019 Document at Ions

    39/42

    Fig.16 Alert Message

    Fig.17 Retrieving File

    1

  • 8/3/2019 Document at Ions

    40/42

    Fig. 18 Entering Password

    Fig.19 Final output Alert message for retrievingfile Successfully

    3

  • 8/3/2019 Document at Ions

    41/42

    CHAPTER 9

    CONCLUSION

    In this project we have introduced a robust method of

    imperceptible audio data hiding. This system is to provide a

    good, efficient method for hiding the data from hackers and

    sent to the destination in a safe manner. This proposed

    system will not change the size of the file even after

    encoding and also suitable for any type of audio file format.

    Thus we conclude that audio data hiding techniques can be

    used for a number of purposes other than covert

    communication or deniable data storage , information

    tracing and finger printing, tamper detection. Man is now

    pushing away its own boundaries to make every thought

    possible. So similarly these operations described above

    can be further modified as it is in the world of Information

    Technology

    CHAPTER 10

    3

  • 8/3/2019 Document at Ions

    42/42

    REFERENCES

    1.WILLIAMSTALLING PRESSMAN - CRYPTOGRAPHY &

    NETWORK SECURITY

    2.PATRICK NORTON AND HERBERT SCHILD, TATA Mc

    GRAW - 2. JAVA COMPLETE REFERENCE -

    3.BAHRAMI,TATA Mc GRAW HILL- OBJECT ORIENTED

    SYSTEM ANALYSIS AND DESIGN

    4. www.wikiepedia.com

    5 .www.google.com