Upload
raju-raj
View
700
Download
0
Embed Size (px)
Citation preview
An Industrial Oriented Project
On
Audio Cryptography System
Team MembersB.RajuG.Pavan
Audio Cryptography System
Contents Introduction Project Features Project Purpose Existing System Proposed System System Modules System Analysis Design Testing UML Diagrams Screenshots Future Scope Conclusion Reference
INTRODUCTIONCryptography
• Study of hiding the information.• Method of storing and transformation of data from source to destination in particular form So that whom intended they can only read and process it.
Project Features• Platform independent• No need to download any software• Provide high security• Cipher text is embedded in the audio wave file • Secrecy in terms of message hiding.• High Capacity of the audio file. • Accurate Extraction.• Resistance from external attacks.
Audio Cryptography System
Project PurposeProvides
• Confidentiality• Integrity• Non-Repudiation• Authentication
Audio Cryptography System
Existing System If a person sends sensitive information over the insecure channels of the system then there may be a chance of hacking it, they can alter the information and sends it over the net. This problem has been solved by the proposed system
Audio Cryptography System
Proposed System In the proposed system the above problem has been solved by embedding the data into the audio file. Before embedding it into the file, encryption operation will be performed by using the encryption key which is provided by the source. Then this audio file will be passed over the net, even if hacker hacks it, can be able to see only an audio file. At the destination side this data will be encrypted from audio file and performs decryption to get original message
Audio Cryptography System
System Modules
There are two modules embedded in this system they are
1. GUI Module2. Encryption & Decryption Module
GUI ModuleGUI is a Graphical User Interface and it is a type of user interface that allows users to interact with electronic devices with images rather than text commandsBasically GUI module is built by 1. AWT2. Components3. Swings
1.AWT: AWT is a Abstract Window Toolkit, A class library is provided by the Java programming language which is known as Abstract Window Toolkit (AWT) for writing graphical programs. The AWT contains several graphical widgets which can be added and positioned to the display area with a layout manager. AWT uses system peers object for constructing graphical widgets
Audio Cryptography System
2.Components: A graphical user interface is built of graphical elements called Components. A component is an object having a graphical representation that can be displayed on the screen and that can interact with the user. Components allow the user to interact with the program and provide the input to the program.
3.Swings: Swing is important to develop Java programs with a graphical user interface (GUI). There are many components which are used for the building of GUI in Swing. The Swing Toolkit consists of many components for the building of GUI. These components are also helpful in providing interactivity to Java applications.
Audio Cryptography System
Encryption & Decryption Module During encryption, audio file will be created and in this audio
file.
In this audio file LSB of the each byte will be replaced by the
encrypted data which is generated by the combination of the
encryption key and the plain text i.e., the original message.
Then this audio file will be sent to the recipient. At recipient
side this encrypted data will be extracted from each LSB and
performs decryption operation on it and gives original information.
Audio Cryptography System
LSB Coding: Least significant bit (LSB) coding is the simplest way to embed
information in adigital audio file. By substituting the least significant bit of each sampling point with a binary Message LSB coding allows for a large amount of data to be encoded. The following diagram illustrates how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method.
Audio Cryptography System
Powerful Encryption Algorithm :
This is used to enhance the security further. The following steps are used to encrypt the message a) Converting the message into its ASCII code.
b) Making the 64 bits blocks of the message. c) Generating an encryption key. d) Performing permutations and logical operations to the
bit pattern. Encoding:-The process of hiding the message in the audio file. Decoding:- Is a process of retrieving the message from the audio file.
Message
Output File
Audio File
LSB of each byte
Encryption Algorithm
Encoding
Key
Yes
ENCODING FLOW CHART
Encoded Audio
LSB of each byte
Decode
Decrypt
Message
Key
DECODING FLOW GRAPH
Audio Cryptography System
Hardware Requirements
• Processor: Pentium-III (or) Higher• Ram: 64MB (or) Higher• Hard disk: 50GB
Software Requirements
• Server Side Technology : AWT & Swings • Operating System: WindowsNT/2000• Languages: Java 2 Standard Edition
System Analysis
Design
System Architecture
Audio Cryptography System
Working Flow Of the System1) First we will take an audio file and perform sampling on it. We will
sample the file in 8 bits per frame. 2) Input the message file which we want to transmit. Then encrypt it
using the RSA algorithm by the use of public key. 3) After encryption we will embed the encrypted data in the audio file.
Here for embedding we will use multiple LSB algorithm. The above operations will be performed at the transmitter end.
4) After that the stego audio is transmitted to the intended receiver 5) The intended receiver will extract the encrypted data using steps of
extraction from the multiple LSB algorithm. 6) Then receiver will use the private key for decryption to get the
original message.
Audio Cryptography System
Testing Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and code generation
Test Case Design
1.White Box Testing 2.Balck Box Testing
Audio Cryptography System
Tests at various levels
1. Unit Testing2. Integration Testing 3. Validation Testing 4. System Testing
Audio Cryptography System
UML Diagrams
Class Diagram Use Case Diagram Activity Diagram
Audio Cryptography System
Class Diagram
Audio Cryptography System
Use Case Diagram
Use case diagram for send and receive a audio file
Audio Cryptography System
Select audio file
Select output directory
Encrypt message
Select message to
embed
Verify details
Enter key
Use case diagram for embedding/encoding
Audio Cryptography System
Select embed
audio file
Enter secret key
Decrypt message
Select retrieve to view file
Verify details
Enter key
Use case diagram for extracting/decoding
Activity Diagram
Encrypt
Encrypt or Decrypt
Take Audio
Get Text
Decrypt Message
Enter Key
Get Audio
Decrypt
Enter Key
Enter Text
Save or Send
Encrypt Message
Start
Stop
Screenshots:Run the batch file from the bin folder
Then click on file and select embed message
Then it will shows this automatically
Then select any audio file from the simple music. After selecting the audio file it ask about the destination path to store that audio file(better to give another path).Then give name as u like
After giving the destination file name then automatically shows
Then click on encrypt checkbox then it will ask about the password and enter some secret message.
Then click on go buttonThen your data is encrypted behind the destination audio file.Then it shows like
If your want to see the data content which is encrypted behind destination audio file then you can click on retrieve file.
Then you can select the saved destination audio file
Then it will shows
Then click on go button then it will ask for password
Enter that old password to decrypt the data, then it shows our text file
Audio Cryptography System
Future Scope Though it is a well built system, it has been limited to some restrictions. Quality of the sound depends upon the size of the audio file selected by the user and the length of the message to be hidden. There are a number of ways that this project can be extended. Its performance can be upgraded to higher levels by using a better algorithm for encoding and decoding. Instead of having a common secret key for encryption and decryption, a public-private key pairs can be used.
Audio Cryptography System
Conclusion Placing the machine to be protected behind physical walls.
However, physical security is not always an option due to
cost and/or efficiency considerations. Instead, most
computers are interconnected with each other openly,
thereby exposing them and the communication channels that
they use.
This proposed system is to provide a good, efficient method
for hiding the data from hackers and sent to the destination
in a safe manner.
Audio Cryptography System
Reference
Advanced Java Programming - Dietel and Dietel Mastering JAVA 2 - John ZukowskiJava Server Programming - ApressSoftware Engineering - Roger S PressmanAnálysis & Design of InformationSystems – Senn Websites:
www.eci.gov.inwww.google.comwww.apeci.comwww.askjeeves.com
Audio Cryptography System
Query
Audio Cryptography System
THANK YOU