STEGANOGRPAHY [APPLICATION – I]

Slides:



Advertisements
Similar presentations
Signal Encoding Techniques
Advertisements

Audio Compression ADPCM ATRAC (Minidisk) MPEG Audio –3 layers referred to as layers I, II, and III –The third layer is mp3.
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 2 Fundamentals of Data and Signals
April 25, 2005ECE 457 Cellular Communication ECE 457 Spring 2005.
GBRA 5 WEEK TECHNICIAN LICENSE CLASS - WEEK 2 OPERATING MODES Ham’sAreRadioactive!
DIGITAL COMMUNICATIONS.  The modern world is dependent on digital communications.  Radio, television and telephone systems were essentially analog in.
Chapter 2 Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User’s Approach.
Chapter 8 Data and Network Communication Technology
Data Hiding within Audio Signals Matthew Wiedemer CSE691 November 20, 2001.
Chapter Two Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User's Approach Fifth Edition.
Lecture 7 AM and FM Signal Demodulation
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers.
Chapter 2 Fundamentals of Data and Signals
Integrated Circuits Design for Applications in Communications Dr. Charles Surya Department of Electronic and Information Engineering DE636  6220
Chapter 2: Fundamentals of Data and Signals. 2 Objectives After reading this chapter, you should be able to: Distinguish between data and signals, and.
Spread Spectrum Steganography
Audio Steganography Echo Data Hiding
1 Chapter 2 Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User’s Approach.
Data Communication and Networking 332 Hardware Components of Data Communication.
Why to Apply Digital Transmission?
Technician License Course Chapter 3 Lesson Plan Module 7 – Types of Radio Circuits.
A Review on: Spread Spectrum Watermarking Techniques
EE 350 / ECE 490 Analog Communication Systems 2/23/2010R. Munden - Fairfield University 1.
Data Communications & Computer Networks, Second Edition1 Chapter 2 Fundamentals of Data and Signals.
Computer Networks Digitization. Spring 2006Computer Networks2 Transfer of an Analog Signal  When analog data (voice, pictures, video) are transformed.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
EE Audio Signals and Systems Effects Kevin D. Donohue Electrical and Computer Engineering University of Kentucky.
PSK31 Digital Mode.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Data Communications Chapter 5 Data Encoding.
W.lilakiatsakun.  Radio Wave Fundamental  Radio Wave Attributes  RF System Component  RF Signal Propagation  RF Mathematics.
Digital Steganography
STEGANOGRAPHY By Allison Boyzuck. What is it? Simply put Steganography is the act of embedding either a picture or message in another picture or message.
COMMUNICATION SYSTEM EEEB453 Chapter 5 (Part IV) DIGITAL TRANSMISSION.
ECE 4710: Lecture #1 1 Communication Systems  Designed to transmit information between two points  Electrical systems do this via electrical signals.
Radio Signals Modulation Defined The purpose of radio communications is to transfer information from one point to another. The information to be sent.
Modulation-Why? 1. Low frequency signal has less energy, which means it can travel less distance. 2. Practibility of antenna.
3-2008UP-Copyrights reserved1 ITGD4103 Data Communications and Networks Lecture-11:Data encoding techniques week 12- q-2/ 2008 Dr. Anwar Mousa University.
Digital watermarking: algorithms and applications
Basic Encoding Techniques
Spread Spectrum Spread-spectrum techniques are methods by which energy generated in a particular bandwidth is deliberately spread in the frequency domain,
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Technician License Course Chapter 2 Lesson Plan Module 3 – Modulation and Bandwidth.
Chapter 2 Fundamentals of Data and Signals
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
1 Signals. 2 Signals Introduction Introduction Analog and Digital Analog and Digital.
Session 2. Objectives: By the end of this session, the student will be able to: Distinguish between data and signals. Cite the advantages of digital data.
Zahoor Ahmed J.P.Cances V.Meghdadi Cryptographic Spread Spectrum Relay Communication NGMAST 2008.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Cape Electrical and Electronic Technology Topic: Electromagnetic Waves By: Tahvorn George & Charles,J.
1587: COMMUNICATION SYSTEMS 1 Digital Signals, modulation and noise Dr. George Loukas University of Greenwich,
MULTICARRIER MODULATION FOR DATA TRANSMISSION. INTRODUCTION Modulation techniques: improve the efficiency of transmitted power. Linear equalization of.
Fundamentals of Communications. Communication System Transmitter: originates the signal Receiver: receives transmitted signal after it travels over the.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Audio Watermarking Schemes N. Lazic and P
Welcome
DIRECT SEQUENCE SPREAD SPECTRUM WITH FREQUENCY HOPPING
Digital Communication
Spread Spectrum Audio Steganography using Sub-band Phase Shifting
Introduction to electronic communication systems
Basic Concepts of Audio Watermarking
Visit for more Learning Resources
Modulation                                                                 Digital data can be transmitted via an analog carrier signal by modulating one.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Presentation transcript:

STEGANOGRPAHY [APPLICATION – I] DIVYA C. (106111025) MAHALAKSHMI (106111055) GURLEEN KAUR (106111106)

STEGANOGRAPHY 2

Embedded Data Hidden MESSAGE Audio File Audio Steganography 3

Types of Audio Steganography LSB Coding Phase Coding Echo Data Hiding Spread Spectrum

LSB Step 4 Step 2 Step1 Step 3 Low Computational Complexity Easier Implementation Step 4 Step 2 Replaces the LSB bit from audio with LSB bit from character in the message. Each character in the message is converted into bit pattern. Receives the audio file convert it into bit pattern. Check which LSB to Replace By RC4 Algorithm Step1 Step 3 5

RC4 Algorithm 6

Phase Coding Audio phase components are imperceptible to the human ear Rather than adding noises, this technique encodes the secret data bits to phase shifts in the phase spectrum of the audio signal, attaining inaudible encodings in terms of signal-to-noise ratio. pi/2 if Bit=0 -pi/2 if Bit=1

Spread spectrum A form of Radio Frequency communication. Data sent using spread spectrum is intentionally spread over a wide frequency range. Appears as noise, so it is difficult to detect and jam. Resistant to interference thus increasing the probability that the signal will be received correctly. Unlikely to interfere with other signals even if they are transmitted on the same frequency. Secret communications system used by the military.

Echo Data Hiding Echo introduced to hide data into audio signal Echo is varied with three parameters: Amplitude Decay Rate (Delay time) Offset

Inaudible echo If the offset or delay is short then the echo produced will be unperceivable. Also, initial amplitude and decay rate can also be set below the audible threshold of the human ear.

Advantages of audio Steganography Human limitations – 20.000 Hz. Large amount of data that can be hidden inside Hard to recognize because of the continuous flow of information