This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
This paper is subjected about voice encoding and decoding method using Steganography. Audio Steganography is the application developed to embed an audio file in another audio signal. It is concerned with embedding information in an safe cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography.
Steganography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party, the goal of Steganography is to hide the data from a third party. In this system the data will be send through the network as an audio file. The user who received the file will do the operations like de embedding, decryption, and decompress in their level of hierarchy etc. The latter is used to detect copyright violators and the former is used to prosecute them. For example when a data is transferred from person to another in order to protect this data from a third party that should be embedded into the audio file and then sent. If the data is hacked by the third party user will open up in any audio player but not displaying the data. This protects data from being invisible and hence is secure during transmission. The user in receiving end uses another piece of code to retrieve the data from the audio file.
The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted.
Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered and sending the in audio format is most secured way to transfer the data through the network. The Audio Stegnography is software, which tries to alter the originality of the file into some encrypted form and embed the file into an audio file. Then the users can easily and securely carry the compressed data wherever he wants. The major task of the Audio Stegnography is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to de embed the data file from audio file and decrypt the data to its original format upon the proper request by the user. While the Encryption and Decryption is done the application should confirm the standards of authentication and authorization of the user.
The Entire application should strive to achieve a user friendly Graphical User Interface, which need to be in a self-learning mode for the end user. The System Should provide all the functional standards of proper navigation with in the environment, which makes it possible for the users to have a smooth flow while working under the environment. The Overall system should provide proper menu based navigation for easier navigation and operation. The Application should be designed in such a way that, as soon as it starts create a Buffer and associate this buffer to some homogeneous data environment, the application should ask the user for the Encryption Key details and should start its functionality upon the logistics that are provided with in this key. The key should be designed in such a way that it prevents the unauthorized persons from stealing the information at any point of time. This is some part of securing the data from third party people. And the other way of securing the data is using Steganography in which embedding the encrypted file in to a audio file. If any one track that file they only see the audio file not the data.
The application of De-embedding, Decryption and de compress should be a reverse process at the other end and should be translated only when the receiver of the data applies the proper reversal key. The Decryption process should have a log-based methodology that will take care of any errors that may be encountered while the system is under utilization and should record all those events, which are above the general standards of security.
This system basically uses the Blowfish encryption algorithm to encrypt the passwords. This algorithm is a 64-bit block cipher with a variable length key. This algorithm has been used because it requires less memory. It uses only simple operations, therefore it is easy to implement.
1) Blowfish Algorithm Implementation Module
2) Stegnography Module
3) Compression Module
4) Send File
4) GUI Module
· Operating System
Windows NT/2000 (Client/Server).
· Software requirements
Front-end: Java J2SDK 1.5, Swings.
* System Configuration
Pentium III Processor with 700 MHz Clock Speed
256 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card.