Abstract
In our system Steganography involves the method of acquiring insignificant bits in the audio file. We acquire the insignificant bits in the audio header and replace them with significant bits of data
Steganography has been used on a message, the viewer would not be able to tell that the message contains a hidden message within it.
The data to be concealed is compressed and hidden within another file. The hidden message may be placed inside the white space of text messages or the dark areas of a photographic image, or within the unused portions of a audio file format. The first item needed for Steganography is called a carrier or a container. This can be a text file, graphic file or sound file which will host the message that is desired to be hidden.
Here in our system Steganography involves the method of acquiring insignificant bits in the audio file. We acquire the insignificant bits in the audio header and replace them with significant bits of data.
When performing data hiding on audio, first the data is encrypted by password based encryption using DES algorithm to generate the cipher text. Now the cipher text is kept hidden in the audio file using low bit encoding method.
When extracting the data from audio first cipher text is separated from audio then the plain text is generated by decrypting the cipher text.
SOFTWARE REQUIREMENTS:-
- Operating System : Windows XP
- Languages : Java 1.6
HARDWARE REQUIREMENTS:-
- Processor : 600 MHz or above.
- RAM (SD/DDR) : 256 MB
- Hard Disc : 30GB
<<
back
Related Projects : Online Real Estate Property Management ,Online Recruitment System ,Online Rental House Web Portal ,Online University ,Optimal Channel Access Management with QoS Support for Cognitive Vehicular Networks ,Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks ,Orkut Using Java ,Personal Authentication Based On Iris Recognition ,Planning of Wireless Sensor Networks ,Predicting Missing Items in Shopping Carts ,Project Controller ,Project Scheduler ,Project Tracking ,Promotional Portal ,Random Cast ,Real-Time Detection Of Clone Attacks ,Reality Shows Organization ,Record Tracker ,Remote Administration using Mobile ,Remote PC Administration Using J2ME ,Resilient Online Coverage For Surveillance Applications , Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services ,RITAS: Services For Randomized Intrusion Tolerance ,Route Stability in MANETs under the Random Direction Mobility Model ,Script Identification Through Temporal Sequence Of The Strokes ,Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients ,Secure and Policy-Compliant Source Routing ,Secure Data Transmission , Ship Store System ,Smart Network Profile Manager
|