Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
164 views17 pages

Micro Project Report ON Implement Communication System Using Steganography Using Audio Files

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 17

MICRO PROJECT REPORT

ON
Implement communication system using steganography using audio files.

In Partial fulfilment of Diploma in IT Engineering

(6th Semester)

In the subject of

Computer and Network Security (IF5469)

By

Ms. Pranjal Borkar

Ms. Kshitija Dawande

Ms. Priyanka Gawai

Ms. Rutuja Gawai

Mr. Vaibhav Dongre

Mr. Prajwal Kale

Submitted To
Government Polytechnic, Amravati

(An Autonomous Institute of Govt. of Maharashtra)

Under the guidance of

Karuna Ukey

Lecturer in IT Computer and Network Security

Department of Information Technology

Government Polytechnic Amravati.

(2021 - 2022)
Government Polytechnic, Amravati.
(An Autonomous Institute of Govt. of Maharashtra)

Department of Information Technology

Certificate
This is to certify that Mr./Ms.Pranjal Borkar (19IF007), Kshitija Dwande (19IF010) , Priyanka Gawai
(19IF021), Rutuja Gawai (19IF022), Vaibhav dongre (20IF201), Prajwal Kale (20IF204) of 6th
Semester Diploma in IT Engineering has satisfactorily completed the micro project entitled “Implement
communication system using steganography using audio files in Computer Network Security”
(IF5469) for the academic year 2021-2022 as prescribed in curriculum.

Place: Amravati Lecturer in Computer& Network Security

Date: / / 2022
GOVT.POLYTECHNIC, AMRAVATI

CURRICULUM DEVELOPMENT CELL


Guidelines for Micro-Project
1.0 Introduction
The micro project is basically intended to integrate one or more course outcome of the theory & related practical
stated in the course along with the affective domain skills. The purpose of micro project is to develop the ability to
work in real life situation individually or collectively. Every student is expected to devote about 16 hours of work for
micro project in a group of students 06 students during the whole semester. The micro project is given a weightage of
33% in progressive assessment. The process part of the micro project is the key which teacher has to monitor
regularly every fortnight, online or otherwise, so as to ensure that COs are achieved by the students over the period of
entire semester.

2.0 Salient features of Micro-Project


a. The micro- project need not to be very complex or research oriented it should be such, that students can
complete it on their own with limited help from teacher.
b. The micro project could be industry application based, internet based, workshop based, laboratory based or field
based.
c. Each micro project encompasses one or more COs which are in fact, an integration of PrOs, UOs and ADOs shall
be approved from course book.
d. Micro project titles shall be finalised after consultation with their teacher who would ensure that at least one or
more COs get addressed in each of them.
e. Micro project would be given to students as a group work. (Group size should not be more than 6 students).
f. Micro project requires about 16 hours of individual students engagement in the entire semester (i.e. about one
hour each week)
g. The course teacher would be the guide for all groups of his/her class for that course.

3.0 Abilities intended to be developed through Micro- Project


During the entire 3 years duration of the diploma program, following are some of the major abilities that are expected
to be developed in the student of this outcome based curriculum. It is not necessary that every micro project should
develop all the following abilities. However, some of the abilities mentioned below may be common in many of the
micro projects.
a. Show the attitude of enquiry.
b. Identify the problems in the area related to their diploma program.
c. Prepare project proposals before starting the project.
d. Assess the financial implication and feasibility of different solutions based on preliminary studies.
e. Collect relevant data from different sources ( Books/internet/market/suppliers/experts and others through
surveys/interviews)
f. Analyse the collected data and to generate useful information from it.
g. Present generated information visually in the form of appropriate charts/graphs.
h. Prepare required drawings & detailed plan for execution of the work.
i. Work persistently to achieve the targets.
j. Attempts alternative solutions/execute alternative plans, in case of failures.
k. Use relevant machines and equipment/instruments safely.
l. Develop the model of the desired equipment/ instrument/machine part and such others.
m. Derive different possible solutions creatively.
n. Identify the information suggesting the cause of the problem and possible solutions.
o. Show concern for material and cost reduction.
p. Incorporate safety features in products and processes.
q. Work independently for the responsibility undertaken.
r. Participate effectively in group work.
s. Ask for help from others including guide, when required.
t. Prepare the technical reports.
u. Prepare presentations.
v. Present findings/features of the projects in seminars.
w. Confidently answer the questions asked about the project.
x. Acknowledge the help rendered by others in the success of the project.

4.0 Report For The Micro Project


The micro project report has two parts. First part is ‘Project Proposal’ about two pages (Annexure-I). This is related
to the planning, which should be submitted by the end of fourth week of the semester. The purpose of this part is to
teach the student to plan and also to ensure that students finalise their micro project title and start working on the
micro project by the fourth week. The second part is the micro project report (Annexure II) which is to be submitted
after the completion of the project.

5.0 Cost Of Micro-Project


No cost should be incurred by the students for the micro project. Teachers should ensure that the micro-project should
not become financial burden on students and institute.
6.0 Assessment Of Micro-Project
Apart from the marks, the purpose of the Micro Project is to give the qualitative feedback to the students and hence
rubrics would be used for assessment of the Micro project. Qualitative feedback on project work would be given by
teacher. Teachers should make it very clear to the students that marks for the project would be awarded based
on the efforts made by them and not based on the project report only.
The following is the assessment methodology of the micro-project
a. For each Micro Project 10 marks are allotted for progressive Assessment.
b. In case of Physics and Chemistry each Micro project would be of 5 marks each.
c. A micro project Evaluation format is given in Annexure I as a guidelines.
d. Out of 10 marks 6 marks would be based on the process work.
e. Remaining 4 marks would be based on individual contribution to be decided by the teacher while taking the viva-
voce of the students.

7.0 Micro- Project Portfolios


a. It is a collection of the entire micro projects completed by the students during the 3 years of the diploma program.
Students can use this port folio in job interviews to show proudly about these micro-projects completed by them
during their diploma program.
b. Each Student has to build up a portfolio by collecting the reports of micro projects in a folder
c. In complied portfolio there will be a summary sheet of all the micro projects undertaken by a student through all
three year diploma program.

*******************
Annexure-I

PART A- Plan (About 1-2 pages)


Format for Micro-Project Proposal

Title of Micro Project: Implement communication system using steganography using audio files.

1.0 Brief Introduction (Importance of the project, in about 4 to 5 sentences)

Information hiding technique is a new kind of secret communication technology. The majority of
today’s information hiding systems uses multimedia objects like image, audio, video.
By development of computer and the expansion of its use in different areas of life and work, the
issue of security of information has gained specific importance. Audio steganography is a technique
used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is
the science of hiding some secret text or audio information in a host message

2.0 Aim of the Micro-Project (in about 4 to 5 sentences)


This Micro-Project aims at:

1. To hide the existence of a message from a third party.


2. Knowledge of steganography is of increasing importance to individuals in the law
enforcement, intelligence, and military communities.
3. To transmit hidden information by modifying an audio signal in an imperceptible manner.

3.0 Action Plan (Sequence and time required for major activities for 8 weeks)

S.N. Details of activity Planned start date Planned Finish I. Code &Name of Team
date Members

1 Planning 15 - 04 - 2022 16 -04 -2022 All team member

2 Collecting picture 17 - 04 – 2022 19 - 04 -2022 Kshitija Dawande ( 19IF010 )


Rutuja Gawai ( 19IF022 )
3 Collecting Information 20 - 04 – 2022 22 -04-2022 Pranjal Borkar ( 19IF007 )
Prajwal Kale ( 20IF204 )
4 Preparing Report File 23 - 04 - 2022 24 -04-2022 Priyanka Gawai ( 19IF021 )
Vaibhav Dongre ( 20IF201 )

4.0 Resources Required (major resources such as raw material, some machining facility, software etc)

S.N. Name of Resource/material Specifications Qty Remarks

1 Laptop Lenovo 1

2 Software Word application

Guideline for Assessment of Micro-Project

Evaluation as per suggested Rubric for Assessment of Micro-Project

Assessment Characteristic to be assessed Average Good Excellent


Parameter (1 mark) (1.5 mark) (2 mark)
Process Relevance of the courses &
Assessment proposals
(06) Literature survey/market
survey/information collection
Analysis of data & completion of the
target as per proposal/
Product Report Preparation/Quality of
Assessment Prototype/model
(04) Presentation / Viva

************************
Annexure-II

PART B- (Outcomes after Execution)


Format for Micro-Project Report

Title of Micro Project: Implement communication system using steganography using audio files.

1.0 Brief Introduction (Importance of the project, in about 4 to 5 sentences)

Information hiding technique is a new kind of secret communication technology. The majority of
today’s information hiding systems uses multimedia objects like image, audio, video.
By development of computer and the expansion of its use in different areas of life and work, the
issue of security of information has gained specific importance. Audio steganography is a technique
used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is
the science of hiding some secret text or audio information in a host message

2.0 Aim of the Micro-Project (in about 4 to 5 sentences)

This Micro-Project aims at:

1. To hide the existence of a message from a third party.


2. Knowledge of steganography is of increasing importance to individuals in the law enforcement,
intelligence, and military communities.
3. To transmit hidden information by modifying an audio signal in an imperceptible manner.

3.0 Action Plan (Sequence and time required for major activities for 8 weeks)

S.N. Details of activity Planned start date Planned Finish I. Code &Name of Team
date Members

1 Planning 15 - 04 - 2022 16 -04 -2022 All team member

2 Collecting picture 17 - 04 – 2022 19 - 04 -2022 Kshitija Dawande ( 19IF010 )


Rutuja Gawai ( 19IF022 )
3 Collecting Information 20 - 04 – 2022 22 -04-2022 Pranjal Borkar ( 19IF007 )
Prajwal Kale ( 20IF204 )
4 Preparing Report File 23 - 04 - 2022 24 -04-2022 Priyanka Gawai ( 19IF021 )
Vaibhav Dongre ( 20IF201 )
4.0 Resources Required (major resources such as raw material, some machining facility, software etc)

S.N. Name of Resource/material Specifications Qty Remarks

1 Laptop Lenovo 1

2 Software Word application

5.0 Information

What is steganography ?
Steganography is the use of various methods to hide information from unwanted eyes. In ancient times,
steganography was mostly done physically.In the centuries that followed, more modern forms of
steganography were invented, such as invisible inks. Today, steganography has moved to the digital world.
Digital steganography usually involves hiding data inside innocuous files such as images, videos, and
audio.Today, digital steganography is one of the important components in the toolboxes of spies and
malicious hackers, as well as human rights activists and political dissidents.
“Steganography by definition is the hiding of one file within another,” says Ira Winkler, lead security
principal at Trustwave.

Historical Background

Steganography is the practice of concealing a secret message behind a normal message. It stems from two
Greek words, which are steganos, means covered and graphia, means writing. Steganography is an ancient
practice, being practiced in various forms for thousands of years to keep communications private. For Example:

 The first use of steganography can be traced back to 440 BC when ancient Greece, people wrote
messages on wood and covered it with wax, that acted as a covering medium
 Romans used various forms of Invisible Inks, to decipher those hidden messages light or heat were used
 During World War II the Germans introduced microdots, which were complete documents, pictures, and
plans reduced in size to the size of a dot and were attached to normal paperwork
 Null Ciphers were also used to hide unencrypted secret messages in an innocent looking normal
message

Now, we have a lot of modern steganographic techniques and tools to make sure that knows our data remains
secret. Now you might be wondering if steganography is same as cryptography. No, they are two different
concepts

How does steganography work?


Steganography works by hiding information in a way that doesn’t arouse suspicion. One of the most popular
techniques is 'least significant bit (LSB) steganography. In this type of steganography, the information hider
embeds the secret information in the least significant bits of a media file.

For instance, in an image file each pixel is comprised of three bytes of data corresponding to the colors red,
green, and blue (some image formats allocate an additional fourth byte to transparency, or ‘alpha’).
LSB steganography changes the last bit of each of those bytes to hide one bit of data. So, to hide one
megabyte of data using this method, you’ll need an eight-megabyte image file.
Since modifying the last bit of the pixel value doesn’t result in a visually perceptible change to the picture, a
person viewing the original and the steganographically modified images won’t be able to tell the difference.
The same scheme can be applied to other digital media (audio and video), where data is hidden in parts of the
file that result in the least change to the audible or visual output.
There are other types of steganography, such as hiding an entire partition on a hard drive, or embedding data
in the header section of files and network packets. The effectiveness of these methods depends on how much
data they can hide and how easy they are to detect.
Depending on the nature of the cover object(actual object in which secret data is embedded), steganography can
be divided into five types:

1. Text Steganography
2. Image Steganography
3. Video Steganography
4. Network Steganography
5. Audio Steganography

Text Steganography
Text Steganography is hiding information inside the text files. It involves things like changing the
format of existing text, changing words within a text, generating random character sequences or using
context-free grammars to generate readable texts. Various techniques used to hide the data in the
text are:

 Format Based Method


 Random and Statistical Generation
 Linguistic Method

Image Steganography
Hiding the data by taking the cover object as the image is known as image steganography. In digital
steganography, images are widely used cover source because there are a huge number of bits
present in the digital representation of an image. There are a lot of ways to hide information inside an
image. Common approaches include:

 Least Significant Bit Insertion


 Masking and Filtering
 Redundant Pattern Encoding
 Encrypt and Scatter
 Coding and Cosine Transformation

Video Steganography
In Video Steganography you can hide kind of data into digital video format. The advantage of this
type is a large amount of data can be hidden inside and the fact that it is a moving stream of images
and sounds. You can think of this as the combination of Image Steganography and Audio
Steganography. Two main classes of Video Steganography include:

 Embedding data in uncompressed raw video and compressing it later


 Embedding data directly into the compressed data stream

Network Steganography (Protocol Steganography)

It is the technique of embedding information within network control protocols used in data
transmission such TCP, UDP, ICMP etc. You can use steganography in some covert channels that
you can find in the OSI model. For Example, you can hide information in the header of a
TCP/IP packet in some fields that are either optional.
In today’s digitalized world, various software tools are available for Steganography. In the remainder
of this Steganography Tutorial, we will explore some of the popular steganographic tools and their
capabilities.
What is Audio Steganography?
In audio steganography, the secret message is embedded into an audio signal which alters the binary sequence
of the corresponding audio file. Hiding secret messages in digital sound is a much more difficult process when
compared to others, such as Image Steganography. Different methods of audio steganography include:

 Least Significant Bit Encoding


 Parity Encoding
 Phase Coding
 Spread Spectrum

This method hides the data in WAV, AU, and even MP3 sound files.

Audio steganography is an approach of hiding information within an audio signal. As data is embedded in the
signal, it gets changed. This modification should be create indistinguishable to the human ear.
Image can also be taken as a medium but audio steganography is more impressive because of the features of
Human Auditory System (HAS) like large power, powerful range of hearing and high range of audible
frequency.
Cryptography includes the encryption of message. It creates no attempt to conceal the encrypted message. In
steganography, the original message is not changed but the very continuation is secret from the intruder by
embedding the message in the selected medium.
An audio environment is decided by two considerations such as first, its digital description and second, its
transmission media. Digital audio files have two main characteristics which are as follows:
 Sample quantisation rate − This is a 16-bit linear quantisation and defines highquality digital audio,
including those utilized by WAV files.
 Temporal sampling rate − This can establish an upper bound on the usable area of the frequency range.
The well-known ones contains 8 kHz, 9.6 kHz and so on, up to 44.1 kHz.

Some methods for Audio Stenganography

In audio steganography, secret message is installed into digitized audio signal which result offend altering of
binary series of the matching audio file. There are several methods are available for audio steganography which
are as follows –
1. Low-bit encoding
2. Phase coding
3. Spread spectrum
4. Echo data hiding
Low-bit encoding − Binary information can be saved in the Least Significant Bits of the sound files (same to
the image files). For instance, channel capacity is 1kb per second per Hz. Thus, if it can have an 8kHz sequence,
the capacity is 8kbps.
This method present audible noise. This has very low immunity to manipulation. Factors such as resampling
and channel noise can simply damage the signal.
However, if the amplitude is slightly altered, such that it does not create some perceptible difference, the
implementation provides high robustness to MPEG compression and some other forms of signal manipulation
such as filtering, resampling and re-quantization.
Phase coding − This works by substituting the procedure of an audio segment with a reference procedure that
defines data. Therefore, the original sound sequence is divided up into a sequence of N short segments.
A DFT (discrete Fourier Transform) is used to each segment and the phase difference is computed. There are
new phase frames are generated for all segments. The phase and original magnitude are connected to make a
new segment.
All new segments are link for the appropriated encoded output. At the receiver end, the segment length and
DFT are called and the values are copied.

Spread spectrum − The encoded information is spread as much as applicable over the frequency spectrum. In
Direct Sequence Spread Spectrum, the signal is spread by multiplying it by a specific maximal length
pseudorandom sequence, known as chip.
The sampling cost for the host signal is used as the chip cost for coding. The start and end quanta for the
procedure locking goals is taken responsibility of by the discrete, sampled characteristics of the host signal.
A higher chip cost leads to larger amount of related information. The only negative factor is random noise,
introduced by the DSSS.

Echo data hiding − Echo data hiding embeds information into a signal by utilizing an echo. The data is hidden
by varying three domains of the echo such as original amplitude, decay cost and offset or delay.
As the offset improves, the siganl and its echo blend. At a specific point, the human ear cannot categorize
between the two and the echo is heard as extra resonance.
By utilizing two different delay times, both below the human audible level, and it can encode a binary one or
zero.
The signal is divided into smaller bits, each of which is echoed to encode the desired bit. The last echoed signal
is a recombination of all independent echoed areas. This signal operate exceptionally well and is the strongest
code to date between audio files.

6.0 Skills Developed/learning out of this Micro-Project


Through this microproject , we learnt soft skill team work , time management preparing presentation and other
skill file editing etc

Signature of Student
7.0Assessment by Faculty as per Rubrics

Process Product Total Signature of


Assessment Assessment Marks Faculty
(06) (04) (10)

*********

Methodology for Conducting ESE (Practical) marked as # & @


The End Semester Examination practical is intended to measure practical outcome by performance
of the student. It shall be conducted by any of the methodology given below.
1. Practical based- Student shall be asked to perform practical in laboratory, write the
observations, calculations & result in the supplied answer sheet.
2. Skill test based- Question paper with skill based question shall be set. Student shall write
the answers in the supplied answer sheet. Separate question paper shall be set for each slot.
3. Observation Based- Students shall be allowed to observe some
model/tools/equipments/specimen related to experiments and write the answer of question asked by
examiner in the supplied answer sheet.
4. Computer Based- Students shall prepare a separate file for the answers as a file name of
his/her Identity Code and send it on the e-mail of examiner. Examiner shall preserve all these
assessed files in a folder.

In all above cases the assessed answer books/folder of students shall be persevered by internal
faculty.

*********

You might also like