Preview

Steganography Using Text Embedding in Sound Files

Good Essays
Open Document
Open Document
8107 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography Using Text Embedding in Sound Files
Steganography
Using
Text Embedding
In

Sound Files

DEVELOPED BY

Nandini Chakraborty(MCA/2004/007)
Saikat Dasgupta(MCA/2004/027)
Abhik Ray(MCA/2004/049)

Under Guidance Of---

Hrishikesh Bhaumik
Lecturer, Department of I.T.
RCC Institute of Information Technology

Acknowledgement

At the very beginning we would like to thank Prof. Hrishikesh Bhaumik, Lecturer, RCC Institute of Information Technology for being our project guide. Without his help it would have been impossible for us to develop the project. We also are deeply grateful to our departmental head Prof. Chhanda Ray, who constantly helped and encouraged us throughout the duration of the project. We also thank those people who collected references and made them available on the Internet. Without their help it would have been impossible for us to complete the project. Many of our teachers, friends and seniors also helped us with whatever experience they had about the subject. We are grateful to them for sharing their valuable time with us. At last but not least, we thank our parents who inspired us and gave us all the support.

Nandini Chakraborty(MCA/2004/007)
Saikat Dasgupta(MCA/2004/027)
Abhik Ray(MCA/2004/049)

5th Semester
MCA Department,
RCC Institute of Information Technology.

Contents

Topics Page Number

Project Objective 3
Introduction 4
Preliminary Investigations 9 Project Scope

Feasibility Study 10 Technical Feasibility Operational Feasibility Economic Feasibility

Requirement Analysis 12

Software Requirement Specifications (Functional Requirements) 14
Development Strategy 16
Project Scheduling 18 Gantt Charts PERT/CPM

Logical Design 22 Context Diagram Level 1 DFD

Research 24 RSA algorithm Analog Audio Signals WAVE File Format



Bibliography: ❖ Rumored Usage in Terrorism The rumors about terrorists using steganography started first in the daily newspaper USA Today on February 5, 2001.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    A man named Eugene was found passed out behind a bar and brought into the emergency room. He is an alcoholic , has pancreaitis, and an enlarged liver. When he was brought in his blood levels of sodium, potassium, magnesium, and phosphorus were too low. His blood pH was acidotic. Eugene was found unconscious, but luckily, he suffered no head trauma. There was a lot of damage done to his liver and pancreas, and his doctor decided to try and get him to a rehab center.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Alzheimer's Disease

    • 1594 Words
    • 7 Pages

    We would like to extend our deepest gratitude to our parent’s for supporting us and…

    • 1594 Words
    • 7 Pages
    Good Essays
  • Good Essays

    TMDG

    • 689 Words
    • 3 Pages

    Last but not least we would like to thank our amazing parents, F and G who always encouraged us and provided us with all the things necessary to be successful. And of course, our last thanks goes to our grandma who spent all her time looking after not only us, but her V other grandchildren as well.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Practice of socially responsible actions is an indicator of good governance. Governance is about the relationships among shareholders, and in between management and equity holders. Theoretically speaking, corporate social responsibility (CSR) is about the corporation’s relationships with the rest of the world, including its employees and the society within which it operates.…

    • 919 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Customer Data Entry

    • 2428 Words
    • 10 Pages

    We are very much thankful to our project guide Prof. “”, who had been there for help whenever required.…

    • 2428 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Ty Bsc It

    • 7130 Words
    • 29 Pages

    PROGRAMME: B. Sc (Information Technology) COURSE: NETWORK SECURITY Periods per week 1 Period is 50 minutes Evaluation System Semester – V COURSE CODE: USIT501 Lecture 5 Practical 3 Hours Marks Theory Examination 2 60 Theory Internal -40 Practical 50…

    • 7130 Words
    • 29 Pages
    Satisfactory Essays
  • Good Essays

    Last but not the least, I would like to thank my parents who helped me a lot in gathering different…

    • 7478 Words
    • 74 Pages
    Good Essays
  • Satisfactory Essays

    Symposium Anchoring

    • 275 Words
    • 2 Pages

    We are much thankful to our internal project guide and head of the Department of Computer Science and Engineering Mr.P.Arjun M.E. for giving us the opportunity to do a project and for providing constant support and academic guidance.…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Audio Steganography

    • 5008 Words
    • 21 Pages

    Security is a complicated subject, which can be tackled by trained experts. As complexity increases, we need to understand the basics of security in a network world. We propose possibilities to develop adaptive steganographic techniques in general. Steganography refers to the practice of hiding secret message in communications over a public channel so that an eavesdropper cannot even tell that a secret message is being sent. The aim of this study was to investigate implement and evaluate a number of common methods of pixel-based Steganography. All the steganographic methods are based on the manipulation of LSB of pixel values or the rearrangement of colors to create LSB, which corresponds to the message being hidden. In addition to these, a technique such as putting your signature to the audio file will be used which provides a means to embed copyright and other information for identification and tracking.…

    • 5008 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Ginni Arora, is my original work and it is not submitted for any other degree, diploma, fellowship or any other similar title or prizes.…

    • 1084 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Seema G. Bhol, 2Arun Mishra & 3Srikanta Patnaik Sambalpur University, Burla, Orissa, India, 2Head (IT Services), L&T, Kansbhal, Orissa, India, 3 Department of Computer Science ITER , SOA University , Bhubaneswar, Orissa, India E-mail : guptaseema@hotmail.com, arun-kbl@kbl.ltindia.com, patnaik_srikanta@yahoo.co.in…

    • 8601 Words
    • 35 Pages
    Powerful Essays
  • Good Essays

    Investigatory Project

    • 719 Words
    • 3 Pages

    Last but not least I thank my parents for their encouragement and support in my humble venture.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Next, we would like to thank our parents for providing us with the support we needed when times are dreary, mentally and physically.…

    • 6833 Words
    • 28 Pages
    Powerful Essays
  • Good Essays

    Finally we are very grateful to our parents for all the care and support they provided us all this time.…

    • 2206 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Mobile Computing

    • 1975 Words
    • 8 Pages

    Wireless networking technology has engendered a new era of computing, called mobile computing. Mobile Computing is an umbrella term used to describe technologies that enable people to access network services any place, anytime, and anywhere.…

    • 1975 Words
    • 8 Pages
    Powerful Essays

Related Topics