Preview

Audio Steganography

Powerful Essays
Open Document
Open Document
5008 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Audio Steganography
CHAPTER 1 : INTRODUCTION
1.1 General Introduction
Security is a complicated subject, which can be tackled by trained experts. As complexity increases, we need to understand the basics of security in a network world. We propose possibilities to develop adaptive steganographic techniques in general. Steganography refers to the practice of hiding secret message in communications over a public channel so that an eavesdropper cannot even tell that a secret message is being sent. The aim of this study was to investigate implement and evaluate a number of common methods of pixel-based Steganography. All the steganographic methods are based on the manipulation of LSB of pixel values or the rearrangement of colors to create LSB, which corresponds to the message being hidden. In addition to these, a technique such as putting your signature to the audio file will be used which provides a means to embed copyright and other information for identification and tracking.
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.

In a computer-based audio Steganography system, secret messages are embedded in digital sound. The secret message is embedded by slightly altering the binary sequence of a sound file. Existing audio Steganography software can embed messages in WAV, AU, and even MP3 sound files. Embedding secret messages in digital sound is usually a more difficult process than embedding messages in other media, such as digital images. These methods range from rather simple algorithms that insert information in the form of signal noise to more

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    The audio codes in the film can be grouped into diegetic and non-diegetic. A good example of non-diegetic codes appears in the scene in which Mr Dadier and a colleague are ambushed in an ally by a group of students. While this happens energetic jazz music accompanied by lively drums play in the background creating a fast paced, suspenseful atmosphere. Another example of non-diegetic codes is when Dadier and his wife are talking about how they had previously lost a baby, throughout this conversation intimate music is playing making the audience emotional provoking feelings of sympathy towards the main…

    • 1684 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Recently “webcam hacking” has become a major concern in our modern world. Similar to the telecsreens found in 1984, webcams have the capability of constantly monitoring computer users. According to The Guardian, “Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing.” It is evident that our technology has the capability to surveil computer users at any moment.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Audiometric screenings are general assessments of hearing loss and can be performed in any clinical setting. Hearing tests may initially reveal a sensory pattern and later show the typical conductive loss pattern. Diagnosis is made by looking at family history, conducting hearing tests, and ruling out any other alternative disorders. Batson and Rizzolo (2017), found that the Hearing Handicap Inventory for the Elderly Screening Version, a commonly used questionnaire that quantifies hearing handicap, is used to accurately correlate to hearing loss verified on audiometric findings.…

    • 609 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    SHA-1 encryption scheme was broken and was replaced with a third round version of itself.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    conspiracy project

    • 493 Words
    • 2 Pages

    There are messages in everything that falls within the category of social media. From books and newspapers to cartoons and movies, all forms of media contain a purpose, mainly to get the audience to believe a certain way. While some messages may be very obvious, such as a food commercial advertising a new hamburger, other messages may not be as clear. What does this result in? Subliminal messages. According to an online dictionary, Dictionary.com, subliminal is defined as “existing or operating below the threshold; being or employing stimuli insufficiently intense to produce a discrete sensation but often being or designed to be intense enough to influence the mental processes or behavior of the individual” (Dictionary.com). In other words, subliminal is an attempt to convey subtle messages into the subconscious mind.…

    • 493 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Technology Synthesis Essay

    • 1003 Words
    • 5 Pages

    As technology grows the ways of communicating continue to become more effective. We have the ability to communicate through cell phones and the internet. The advancement in technology has invented the way of texting on a cell phone or using the social media on the internet. Lynne Truss, the author of The Joy of Texting, gives a great example of what texting is by saying “texting is a supremely secretive medium of communication-its like passing a note…” Using the example of passing a note is a great way of interpreting a text because no one knows what the text says and it…

    • 1003 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Greenberg wrote this article to talk about new technology and digital watermarks that help prevent identity theft. Greenberg states, “Reports on the use of biometrics technology and digital watermarks to secure important documents and prevent identity theft. Information on the biometric technology; Features of the digital watermarks; Responsibilities of individuals who are using these technologies.” This article relates to my topic because it explains, what can contribute to decreasing identity theft. This article is valid because it gives many examples on decreasing identity theft.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    SWAT Codes

    • 674 Words
    • 3 Pages

    Written codes can often communicate specific information more easily than visuals. For example, if it is very important that the viewer know the exact setting of the film, the name of the town or country will flash on the screen as a subtitle when we first cut to that setting. This setting may have some symbolic significance, so the written code ensures we know where it is.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lip Reading

    • 386 Words
    • 2 Pages

    In this project, we will use Computer-based lip-reading technology in increasing the level of information security (specifically of passwords, PIN, etc).…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The presentation of an invisible sign such as an idea or a quality into something visible.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays

Related Topics