Beruflich Dokumente
Kultur Dokumente
N. Spandana
E.C.E.(M.N.E.)
M.I.T.S. Madanapalli, India
Stego
system
encoder
Secret
message
channel
Security
key
I.
Secret
message
INTRODUCTION
Stego
system
decoder
A. STEGANOGRAPHY
The process of hiding a message, an image, or a file in
any media is known as Stganography. Here the media may be
either a plain text, an audio, or a video. The word
Steganography is derived from an Ancient Greek words
STEGANO and GRAPHIA. The word STEGANO means
covered and GRAPHIA means writing. Johannes
Trithemius was the first person to use this term. He used this
term first in his book known as Steganographia, which is a
thesis on Steganography as well as Cryptography. Basically
the messages that are hidden will appear either on images,
audio, or any cover text. Some of the achievements on
Steganography that do not have the type of security through
irrelevance, while the schemes of Steganography that are keydependent bond on to The Kerckhoffs principle. The main
plus of Steganography than cryptography is the secret
www.ijsres.com
Cover
media
Figure 1: Steganographic process
B. AUDIO STEGANOGRAPHY
In this work we deal with Audio Steganography. in this
process a message is hidden secretly in the audio. Generally in
Steganography cover media is used to hide the message. Here
in this case of Audio Steganography, the cover media is used
to hide the message and this message is known as encrypted
message. This encrypted message is based on either the public
Page 55
EM
BED
D
AN
D
AU
DIO
PRO
CES
SIN
G
SE
CR
ET
DA
TA
NE
T
W
OR
K
K
E
Y
EM
BED
D
AN
D
AU
DIO
PRO
CES
SIN
G
LIBRARIES
Linux kernel
HIGH LEVEL ABSTRACTIONS
FILE
NETWORK
SYSTEMS PROTOCOLS
SE
CR
ET
DA
TA
LOW-LEVEL INTERFACE
HARDWARE
Figure 2: Generic Audio Steganographic System
Page 56
www.ijsres.com
VI. CONCLUSION
The project AUDIO STEGANOGRAPHY has been
successfully designed and tested. It has been developed by
integrating features of all the hardware components and
software used. Presence of every module has been reasoned
out and placed carefully thus contributing to the best working
of the unit. Secondly, using highly advanced ARM11 board
Page 57
REFERENCES
[1] Neil F.Johnson, Sushil Jajodia, Exploring Steganography;
Seeing the Unseen, Computer, vol.31, no 2,pp. 26-34,
feb.1998.
[2] R.Chandramouli, Nasir Memon, Analysis of LSB Based
Image Steganography Techniques Proc. IEEE ICIP 2001
pp 1019-1022.
[3] Li Zhi Sui Ai Fen , Detection of Random LSB Image
Steganography Techniques proc. IEEE 2004 pp 21132117.
www.ijsres.com
Page 58