Preview

Audio Steganography

Powerful Essays
Open Document
Open Document
5008 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Audio Steganography
CHAPTER 1 : INTRODUCTION
1.1 General Introduction
Security is a complicated subject, which can be tackled by trained experts. As complexity increases, we need to understand the basics of security in a network world. We propose possibilities to develop adaptive steganographic techniques in general. Steganography refers to the practice of hiding secret message in communications over a public channel so that an eavesdropper cannot even tell that a secret message is being sent. The aim of this study was to investigate implement and evaluate a number of common methods of pixel-based Steganography. All the steganographic methods are based on the manipulation of LSB of pixel values or the rearrangement of colors to create LSB, which corresponds to the message being hidden. In addition to these, a technique such as putting your signature to the audio file will be used which provides a means to embed copyright and other information for identification and tracking.
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.

In a computer-based audio Steganography system, secret messages are embedded in digital sound. The secret message is embedded by slightly altering the binary sequence of a sound file. Existing audio Steganography software can embed messages in WAV, AU, and even MP3 sound files. Embedding secret messages in digital sound is usually a more difficult process than embedding messages in other media, such as digital images. These methods range from rather simple algorithms that insert information in the form of signal noise to more

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Summary Of Blown To Bits

    • 283 Words
    • 2 Pages

    What we see on our computer screen is not all the information that the computer knows. Computers can be used to send redacted messages. However, when sending redacted messages, one has to be careful about the way in which they release these messages. For example, one time the U.S. was trying…

    • 283 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The audio codes in the film can be grouped into diegetic and non-diegetic. A good example of non-diegetic codes appears in the scene in which Mr Dadier and a colleague are ambushed in an ally by a group of students. While this happens energetic jazz music accompanied by lively drums play in the background creating a fast paced, suspenseful atmosphere. Another example of non-diegetic codes is when Dadier and his wife are talking about how they had previously lost a baby, throughout this conversation intimate music is playing making the audience emotional provoking feelings of sympathy towards the main…

    • 1684 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    After the catastrophic Civil War, the Reconstruction era struggled to repair the shattered nation. In the beginning of the time period, Congress passed new amendments into the Constitution to integrate former slaves into America’s society. The 14th Amendment was one of these new additions to the Constitution, which gave equal rights to freedmen. The 15th Amendment allowed blacks to vote and express their views on politics. The Reconstruction Amendments aimed to give citizenship rights and the ability to vote but failed in providing equality to African Americans.…

    • 665 Words
    • 3 Pages
    Good Essays
  • Good Essays

    SWAT Codes

    • 674 Words
    • 3 Pages

    Written codes can often communicate specific information more easily than visuals. For example, if it is very important that the viewer know the exact setting of the film, the name of the town or country will flash on the screen as a subtitle when we first cut to that setting. This setting may have some symbolic significance, so the written code ensures we know where it is.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Carter, S. (2014) in The Open University (2014) DD308-14J>Audio-visual Resources>DD308 Audio Tracks: Audio CD1: Security Discussions. Available online at https://learn2.open.ac.uk/mod/oucontent/view.php?id=455368 accessed November 15 2014…

    • 2018 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    SHA-1 encryption scheme was broken and was replaced with a third round version of itself.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Audiometric screenings are general assessments of hearing loss and can be performed in any clinical setting. Hearing tests may initially reveal a sensory pattern and later show the typical conductive loss pattern. Diagnosis is made by looking at family history, conducting hearing tests, and ruling out any other alternative disorders. Batson and Rizzolo (2017), found that the Hearing Handicap Inventory for the Elderly Screening Version, a commonly used questionnaire that quantifies hearing handicap, is used to accurately correlate to hearing loss verified on audiometric findings.…

    • 609 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Greenberg wrote this article to talk about new technology and digital watermarks that help prevent identity theft. Greenberg states, “Reports on the use of biometrics technology and digital watermarks to secure important documents and prevent identity theft. Information on the biometric technology; Features of the digital watermarks; Responsibilities of individuals who are using these technologies.” This article relates to my topic because it explains, what can contribute to decreasing identity theft. This article is valid because it gives many examples on decreasing identity theft.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    conspiracy project

    • 493 Words
    • 2 Pages

    There are messages in everything that falls within the category of social media. From books and newspapers to cartoons and movies, all forms of media contain a purpose, mainly to get the audience to believe a certain way. While some messages may be very obvious, such as a food commercial advertising a new hamburger, other messages may not be as clear. What does this result in? Subliminal messages. According to an online dictionary, Dictionary.com, subliminal is defined as “existing or operating below the threshold; being or employing stimuli insufficiently intense to produce a discrete sensation but often being or designed to be intense enough to influence the mental processes or behavior of the individual” (Dictionary.com). In other words, subliminal is an attempt to convey subtle messages into the subconscious mind.…

    • 493 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Technology Synthesis Essay

    • 1003 Words
    • 5 Pages

    As technology grows the ways of communicating continue to become more effective. We have the ability to communicate through cell phones and the internet. The advancement in technology has invented the way of texting on a cell phone or using the social media on the internet. Lynne Truss, the author of The Joy of Texting, gives a great example of what texting is by saying “texting is a supremely secretive medium of communication-its like passing a note…” Using the example of passing a note is a great way of interpreting a text because no one knows what the text says and it…

    • 1003 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Lip Reading

    • 386 Words
    • 2 Pages

    In this project, we will use Computer-based lip-reading technology in increasing the level of information security (specifically of passwords, PIN, etc).…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The presentation of an invisible sign such as an idea or a quality into something visible.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays

Related Topics