Академический Документы
Профессиональный Документы
Культура Документы
ON
BY
TILAK MAHARASHTRA
VIDYAPEETH
NAVI MUMBAI-410-210
2016-2017
"Acknowledgement"
"Data Hide Into Audio &Video"
PROJECT REPORT ON AS PER OF THE CURRICULAM OF
_____________________________________
_____________________________________
Data Hide into Audio & Video
INDEX
1
TITLE
Page no
1
Introduction 1
1.1
What is Steganography?
7
1.2
What is Authentication?
8
1.3
Methods of Authentication
8
1.4
Steganography Concept
9
1.5
Motivation
10
1.6
Objective
10
2
Problem Definition
2.1
Existing Approach
12
2.2
Purpose Approach
13
3
Requirement Specification
3.1
Data Hide into Audio & Video
Software Requirement
15
3.2
Hardware Requirement
15
4
Literature Survey
4.1
Introduction
17
4.1.1
Technical Feasibility
17
4.1.2
Operational Feasibility
17
4.1.3
Economical Feasibility
18
4.2
Software Requirement and Analysis
19
General
19
4.2.1
Module Description
20
5
Testing and planning
5.1
Testing
23
5.2
Testing Methodology
23
5.3
Purpose
Data Hide into Audio & Video
28
5.4
Planning
28
5.5
Gantt Chart
29
5.6
PERT Chart
31
6
System Design
6.1
Purpose
34
6.2
Project Development Approach
34
6.3
Data Flow Diagram
35
6.4
Flow Chart
36
6.5
Use Case Diagram
38
7
Advantages
40
8
Needs and Applications
42
9
Screen Shots
45
10
Conclusion
51
11
References
Data Hide into Audio & Video
52
Abstract
The Internet as a whole does not use secure links, thus information in transit
may be vulnerable to interception as well. The importance of reducing a chance
of the information being detected during the transmission is being an issue now
days. Some solution to be discussed is how to pass information in a manner that
the very existence of the message is unknown in order to repel attention of the
potential attacker. Besides hiding data for confidentiality, this approach of
information hiding can be extended to copyright protection for digital media. In
this research, we clarify what steganography is, the definition, the importance as
well as the technique used in implementing steganography. We focus on the Least
Significant Bit (LSB) technique in hiding messages in an audio and video. The
system enhanced the LSB technique by randomly dispersing the bits of the
message in the image and thus making it harder for unauthorized people to
extract the original message. Audio steganography is concerned with hiding
information in a cover (host) audio signal in an imperceptible way. Hidden
information from the stego, or data-embedded audio & video signal, is retrieved
using a key similar to the one that was employed during the hiding phase. Least
Significant Bit (LSB) modification technique is the most simple and efficient
technique used for audio steganography. Proposed technique has been tested
successfully on a .wav file at a sampling frequency of 3000 samples/second with
each sample containing 8 bits. It is very important for effective and successful
embedding process to select appropriate pixels in the video frames, which are
used to store the secret data. We use video based Steganography because of large
size and memory requirements. Hiding information in a carrier file we use least
significant bit (LSB) insertion technique. In Least significant bit (LSB) insertion
technique, for hiding information we change LSB of video file with the
information bits .This paper will focus on hiding information in specific frames of
the video and in specific position of the frame by LSB substitution.
Data Hide into Audio & Video
Data Hide into Audio & Video
Chapter 1
Introduction
1
Data Hide into Audio & Video
Steganography is the art and science of writing hidden messages in such a way that no
one, apart from the sender and intended recipient, suspects the existence of the
message, a form of security through obscurity. The word steganography is of Greek
origin and means "concealed writing" from the Greek words steganos meaning
"covered or protected", and graphic meaning "writing. The first recorded use of the
term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on
cryptography and steganography disguised as a book on magic. Generally, messages
will appear to be something else: images, articles, shopping lists, or some other cover
text and, classically, the hidden message may be in invisible ink between the visible
lines of a private letter. The advantage of steganography, over cryptography alone, is
that messages do not attract attention to themselves. Plainly visible encrypted
messages no matter how unbreakable will arouse suspicion, and may in themselves be
incriminating in countries where encryption is illegal Therefore, whereas cryptography
protects the contents of a message, steganography can be said to protect both
messages and communicating parties. Steganography includes the concealment of
information within computer files. In digital steganography, electronic
communications may include steganographic coding inside of a trans-port layer, such
as a document file, image file, program or protocol. Media files are ideal for
steganographic transmission because of their large size. As a simple example, a sender
might start with an innocuous image file and adjust the color of every 100th pixel to
correspond to a letter in the alphabet, a change so subtle that someone not specifically
looking for it is unlikely to notice it.
2
Data Hide into Audio & Video
Introduction
The process of an administrator granting rights and the process of checking user
account permissions for access to resources are both referred to as authorization. The
privileges and preferences granted for the authorized account depend on the users
permissions, which are either stored locally or on the authentication server. The
settings defined for all these environment variables are set by an administrator.
3
Data Hide into Audio & Video
To validate the identity of database users and prevent unauthorized use of a database
user name, you can authenticate users by using any combination of the methods
described in the following sections:
4
Data Hide into Audio & Video
1.5 Motivation:
The primary reason for selecting steganography among the list of possible project
topics was due to the unfamiliarity of the word that twigged an interest in the subject.
Another motivation for researching the topic was after reading an online article in the
USA Today titled "Terror groups hide behind Web encryption" that claims terrorists
and, in particular, Osama bin Laden and the al-Qaida network, may be using
thought that images with hidden messages are placed on bulletin boards or dead drops
for other terrorists to pick up and retrieve hidden messages. Thus far, this supposition
1.6 Objective
The goal of steganography is hide the fact that communication is taking place. So, a
fundamental requirement of this steganography system is that the hider message
carried by stego-media should not be sensible to human beings.
hidden message. This approach of information hiding technique has recently became
5
Data Hide into Audio & Video
Chapter 2
Problem Definition
6
Data Hide into Audio & Video
PROBLEM DEFINITION
7
Data Hide into Audio & Video
For e.g. Sending of encrypted credit card details over the internet is well known to a
malicious user. But, the actual content is randomized or confused and hence not
revealed. But, in Steganography the fact that the credit card details is being sent is
kept secretly (as the message or the image appears innocent). The advantage of
steganography over cryptography alone is that messages do not attract attention to
themselves, to messengers, or to recipients. An unhidden coded message, no matter
how unbreakable it is, will arouse suspicion and may in itself be incriminating, as in
some countries encryption is illegal.
Encryption software protects internet connected computers from crackers and other
online intruders. The technology is widely used to encrypt credit card information,
bank account numbers and other type of financial records so they can send safely and
securely across the internet. Protect much of the intellectual content thats marketed on
the web, such as music, Videos, articles, and software, restricting its availability to
paying customers. This system helps to hide the information while sending the
important and confidential documents in video files; it will be invisible for the third
person. This system is helpful for the defense and security departments sending and
receiving the confidential matters in emergency situations.
Encryption software protects internet connected computers from crackers and other
online intruders. The technology is widely used to encrypt credit card information,
bank account numbers and other type of financial records so they can send safely and
securely across the internet. Protect much of the intellectual content thats marketed on
the web, such as music, Videos, articles, and software, restricting its availability to
paying customers. This system helps to hide the information while sending the
important and confidential documents in video files; it will be invisible for the third
person. This system is helpful for the defense and security departments sending and
receiving the confidential matters in emergency situations.
8
Data Hide into Audio & Video
Chapter 3
Requirement Specification
9
Data Hide into Audio & Video
REQUIREMENT SPECIFICATION
The minimum software requirement specifications for developing this project are as
follows:
10
Data Hide into Audio & Video
The Collection of internal electronic circuits and external physical devices used in
building a computer is called Hardware.
Processor : Pentium IV
11
Data Hide into Audio & Video
Chapter 4
Literature Survey
LITERATURE SURVEY
4.1 Introduction
A feasibility study is a high-level capsule version of the entire System analysis and
Design Process. The study begins by classifying the problem definition. Feasibility is
to determine if its worth doing. Once an acceptance problem definition has been
generated, the analyst develops a logical model of the system. A search for alternatives
is analyzed carefully. There are 3 parts in feasibility study.
12
Data Hide into Audio & Video
Proposed project is beneficial only if it can be turned into information systems that
will meet the organizations operating requirements. Simply stated, this test of
feasibility asks if the system will work when it is developed and installed. Are there
major barriers to Implementation? Here are questions that will help test the
operational feasibility of a project:
Is there sufficient support for the project from management from users? If the
current system is well liked and used to the extent that persons will not be able
to see reasons for change, there may be resistance.
Are the current business methods acceptable to the user? If they are not, Users
may welcome a change that will bring about a more operational and useful
systems.
Have the user been involved in the planning and development of the project?
Since the proposed system was to help reduce the hardships encountered. In the
existing manual system, the new system was considered to be operational feasible.
13
Data Hide into Audio & Video
place. This feasibility study gives the top management the economic justification for
the new system. A simple economic analysis which gives the actual comparison of
costs and benefits are much more meaningful in this case. In addition, this proves to
be a useful point of reference to compare actual costs as the project progresses. There
could be various types of intangible benefits on account of automation. These could
include increased customer satisfaction, improvement in product quality better
decision making timeliness of information, expediting activities, improved accuracy of
operations, better documentation and record keeping, faster retrieval of information,
better employee morale
General
The first step in developing anything is to state the requirements. This applies just as
much to leading edge research as to simple programs and to personal programs, as
well as to large team efforts. Being vague about your objective only postpones
decisions to a later stage where changes are much more costly.
The problem statement should state what is to be done and not how it is to be
done. It should be a statement of needs, not a proposal for a solution. A user manual
for the desired system is a good problem statement. The requestor should indicate
14
Data Hide into Audio & Video
which features are mandatory and which are optional, to avoid overly constraining
design decisions. The requestor should avoid describing system internals, as this
restricts implementation flexibility. Performance specifications and protocols for
interaction with external systems are legitimate requirements. Software engineering
standards, such as modular construction, design for testability, and provision for future
extensions, are also proper.
The analyst must work with the requestor to refine the requirements so they
represent the requestors true intent. This involves challenging the requirements and
15
Data Hide into Audio & Video
1. Sending message
2. Encryption module
3. Decryption module.
4. Receiving message
1.Sending message
The sender can send a message to the destination more securely. This can be
done by attaching a video file to the message. So the third party can be unaware
the secret message. They think that a video file is sending and they not at all
know about this secret sending of the message.
16
Data Hide into Audio & Video
2. Encryption module
In this a sender can encrypt a file by entering a key.The same key must be
entered
3.Decryption Module
This process can be done by entering the key that previously entered during the
Encryption process. If the entered key is wrong the message wont be received
correctly.
4.Recieving Message
In this the Receiver can receive the hidden message by the decryption process.
In This the user enter the same key as the sender sends.The receiver can receive the
message by correctly entering the key.
17
Data Hide into Audio & Video
Chapter 5
TESTING
18
Data Hide into Audio & Video
5.1 Testing:
Black box Testing: is the testing process in which tester can perform testing
on an application without having any internal structural knowledge of
application.
Usually Test Engineers are involved in the black box testing.
White box Testing: is the testing process in which tester can perform testing
on an application with having internal structural knowledge.
Usually The Developers are involved in white box testing.
Gray Box Testing: is the process in which the combination of black box and
white box techniques are used.
19
Data Hide into Audio & Video
Levels of Testing
2. Objective of testing,
20
Data Hide into Audio & Video
Of application.
application
Types Of Testing:
Smoke Testing: is the process of initial testing in which tester looks for the
availability of all the functionality of the application in order to perform detailed
testing on them. (Main check is for available forms)
Regression Testing: is one of the best and important testing. Regression testing is the
process in which the functionality, which is already tested before, is once again tested
whenever some new change is added in order to check whether the existing
functionality remains same.
21
Data Hide into Audio & Video
Static Testing: is the testing, which is performed on an application when it is not been
executed. ex: GUI, Document Testing
Dynamic Testing: is the testing which is performed on an application when it is being
executed. ex: Functional testing.
Alpha Testing: it is a type of user acceptance testing, which is conducted on an
application when it is just before released to the customer.
Beta-Testing: it is a type of UAT that is conducted on an application when it is
released to the customer, when deployed in to the real time environment and being
accessed by the real time users.
Monkey Testing: is the process in which abnormal operations, beyond capacity
operations are done on the application to check the stability of it in spite of the users
abnormal behavior.
Compatibility testing: it is the testing process in which usually the products are
tested on the environments with different combinations of databases (application
servers, browsersetc) In order to check how far the product is compatible with all
these environments platform combination.
Installation Testing: it is the process of testing in which the tester try to install or try
to deploy the module into the corresponding environment by following the guidelines
produced in the deployment document and check whether the installation is successful
or not.
Adhoc Testing: Adhoc Testing is the process of testing in which unlike the formal
testing where in test case document is used, with out that test case document testing
can be done of an application, to cover that testing of the future which are not covered
in that test case document. Also it is intended to perform GUI testing which may
involve the cosmetic issues.
22
Data Hide into Audio & Video
Test scope
Test coverage is provided for the screen Acadamic status entry form of a
student module of university management system application
Areas of the application to be tested
Test Scenario
When the office personals use this screen for the marks entry, calculate the
status details, saving the information on students basis and quit the form.
Test Procedure
The procedure for testing this screen is planned in such a way that the data
entry, status calculation functionality, saving and quitting operations are tested
in terms of Gui testing, Positive testing, Negative testing using the
corresponding Gui test cases, Positive test cases, Negative test cases
respectively
23
Data Hide into Audio & Video
5.4 Purpose
The software planning begins with a statement of the work to be performed and other
constraints and goals that define and bound the software project (those established by
the practices of the Requirements Management key process area). The software
planning process includes steps to estimate the size of the software work products and
the resources needed, produce a schedule, identify and assess software risks, Iterating
through these steps may be necessary to establish the plan for the software project
(i.e., the software development plan).
24
Data Hide into Audio & Video
A Gantt chart can be developed for the entire project. It depicts a part of a software
project schedule that emphasizes the concept scooping task for a new software
project. All project tasks (for concept scooping) are listed in the left hand column.
The horizontal bars show the time needed to complete an activity.
A Gantt chart is a type of bar chart that illustrates a project schedule. Gantt charts
illustrate the start and finish dates of the terminal elements and summary elements
of a project. Terminal elements and summary elements comprise the work
breakdown structure of the project. Some Gantt charts also show the dependency
relationships between activities.
Although a Gantt chart is useful and valuable for small projects that fit on a single
sheet or screen, they can become quite unwieldy for projects with more than about
30 activities. Larger Gantt charts may not be suitable for most computer displays. A
related criticism is that Gantt charts communicate relatively little information per
unit area of display. That is, projects are often considerably more complex than can
be communicated effectively with a Gantt chart.
Gantt charts only represent part of the triple constraints of projects, because they
focus primarily on schedule management. Moreover, Gantt charts do not represent
the size of a project or the relative size of work elements, therefore the magnitude of
a behind-schedule condition is miss communicated. If two projects are the same
number of days behind schedule, the larger project has a larger impact on resource
utilization, yet the Gantt does not represent this difference.
25
Data Hide into Audio & Video
26
Data Hide into Audio & Video
The Program Evaluation and Review Technique (PERT) is a network model that
allows for randomness in activity completion times. PERT was developed in the late
1950s for the U.S.
especially the time needed to complete each task, and identifying the minimum
A PERT event: is a point that marks the start or completion of one or more tasks. It
consumes no time and uses no resources. It marks the completion of one or more
tasks, and is not "reached" until all of the activities leading to that event have been
completed.
A predecessor event: an event (or events) that immediately precedes some other
event without any other events intervening. It may be the consequence of more
A successor event: an event (or events) that immediately follows some other event
without any other events intervening. It may be the consequence of more than one
activity.
27
Data Hide into Audio & Video
28
Data Hide into Audio & Video
Chapter 6
System Design
SYSTEM DESIGN
6.1 Purpose
29
Data Hide into Audio & Video
The purpose of design document is to build the project in a manner specified and
developed the project in such a way that it is able to satisfy the user requirement and
develop according the requirement of user.
30
Data Hide into Audio & Video
31
Data Hide into Audio & Video
32
Data Hide into Audio & Video
33
Data Hide into Audio & Video
Use case diagrams model the functionality of system using actors and use cases. Use
case diagram visually represents what happens when an actor interacts with a
system. This approach uses a combination of text and pictures in order to improve
the understanding of requirements. The use case describes what of a system and not
how. They only give functional view of the system.
Terms used:
Actor: Actor is an external agent that lies outside the system model but interacts
with it in some or the other way. An actor may be a person, machine or an
information system that is external to the system model. An actor is represented by a
stick figure and is not a part of the system itself. Customers, users, external devices
interacting with the system are treated as actors.
Use cases: It is initiated by the user with a particular goal in mind, and completes
success-fully when that goal is satisfied. it describes the sequence of interactions
between actors and the system necessary to deliver the services that satisfies the
goal. It also includes possible variants of this sequence. The system is represented
by the rectangular box that contains oval shaped use cases. The actors are
represented by the sticks as shown in figure above. The use case can be described
as: Figure 4.4 shows the Use Case Diagram.
34
Data Hide into Audio & Video
35
Data Hide into Audio & Video
Chapter 7
Advantages
Advantages:
36
Data Hide into Audio & Video
Audio and video based Steganography has the potential to conceal more
information:
Audio video files are generally larger than images
Our hearing can be easily fooled
Slight changes in amplitude can store vast amounts of information
Another aspect of audio and video Steganography that makes it so attractive is its
ability to combine with existing cryptography technologies.
Users no longer have to rely on one method alone. Not only can
information be encrypted, it can be hidden altogether.
Security:
37
Data Hide into Audio & Video
Chapter 8
Needs and Application
38
Data Hide into Audio & Video
protocol. Media files are ideal for steganographic transmission because of their large
size. As a simple example, a sender might start with an in-nocuous image file and
adjust the color of every 100th pixel to correspond to a letter in the alphabet, a
change so subtle that someone not specifically looking for it is unlikely to notice it.
We take advantage of the fragility of the embedded data in this application area.We
asserted in the Home Page that "the embedded data can rather be fragile than be
very robust." Actually, embedded data are fragile in most steganography programs.
Especially, GTECH Hide & View program embeds data in an extremely fragile
manner.
In this area embedded data is "hidden", but is "explained" to publicize the content.
Today, digital contents are getting more and more commonly distributed over
Internet than before. For example, music companies release new albums on their
Webpage in a free or charged manner. However, in this case, all the contents are
equally distributed to the people who can make access to the page. So, an ordinary
Web distribution scheme is not suited for a "case-by-case" and "selective"
distribution. Of course it is always possible to attach digital contents to e-mail
messages and send them to the customers. But it will takes a lot of cost in time and
labor.
Media data (photo picture, movie, music, etc.) have some association with other
information. A photo picture, for instance, may have the following.
(1) The title of the picture and some physical object information
(2) The date and the time when the picture was taken
40
Data Hide into Audio & Video
Chapter 9
Screen Shots
Screen Shots
41
Data Hide into Audio & Video
Here we Enter text and enter text and select carrier file to encrypt
42
Data Hide into Audio & Video
43
Data Hide into Audio & Video
44
Data Hide into Audio & Video
45
Data Hide into Audio & Video
46
Data Hide into Audio & Video
This form is specially design for only local user (local user can decrypt file only)
Conclusion
The proposed approach in this project uses a new steganographic approach
called audio and video steganography. The application creates a stego audio and
video in which the personal data is embedded and is protected with a password
which is highly secured. The main intention of the project is to develop a
steganographic application that provides good security. The proposed approach
provides higher security and can protect the message from stego attacks. The image
resolution doesnt change much and is negligible when we embed the message into
the audio and video and the audio and video is protected with the personal
password. So, it is not possible to damage the data by unauthorized person. We used
the Least Significant Bit algorithm in this project for developing the application
which is faster and reliable and compression ratio is moderate compared to other
algorithms. The compression depends on the document size as well as the carrier
audio and video size. Steganography has its place in security. It is not intended to
replace cryptography but supplement it. Hiding a message with steganography
methods reduces the chance of a message being detected. However, if that message
is also encrypted, if discovered, it must also be cracked (yet another layer of
protection).
47
Data Hide into Audio & Video
References
1) N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen 31(2)
(1998) 26- 34
48
Data Hide into Audio & Video
49
Data Hide into Audio & Video
50