CALEB WALTER 7/14/2013 Audio Stego – A Brief How To.

Slides:



Advertisements
Similar presentations
How to utilize your iTunes for use with your SwiMP3 Please be aware that all the SwiMP3 line of players do not have licensing to any of the songs that.
Advertisements

MY NCBI (module 4.5). MODULE 4.5 PubMed/How to Use MY NCBI Instructions - This part of the: course is a PowerPoint demonstration intended to introduce.
MY NCBI To register, add filters and use the MY NCBI options, you should directly access PubMed using the following address:
MY NCBI To register, add filters and use the MY NCBI options, you should directly access PubMed using the following address:
MY NCBI (module 4.5). MODULE 4.5 PubMed/How to Use MY NCBI Instructions - This part of the: course is a PowerPoint demonstration intended to introduce.
MY NCBI (module 4.5). MODULE 4.5 PubMed/How to Use MY NCBI Instructions - This part of the: course is a PowerPoint demonstration intended to introduce.
Chapter 7 – Managing Windows XP. Control Panel The main tool for configuring your system. Most of the tools to configure the system come with the normal.
Google Picasa Simple Sharing & Photo Editing May 2011Moore Memorial Library Public Computer Center | Greene, NY1.
MY NCBI (module 4.5). MODULE 4.5 PubMed/How to Use MY NCBI Instructions - This part of the:  course is a PowerPoint demonstration intended to introduce.
MY NCBI (module 4.5).
Working with Tables for Page Design – Lesson 41 Working with Tables for Page Design Lesson 4.
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
An Exploration in the Detection of Hidden Data in Audio Bit Streams Presented by: John Monk CS 525, Spring Semester 2002
Investigating the sound quality of different audio file formats In this activity, we are going to record a short voice sample with a sound recording tool,
Audacity Audacity® is free, open source, cross- platform software for recording and editing sounds. Audacity is available.
A stereo audio file 1. Audio Channels Number of audio channels determines number of waveforms in a recording Two relevant types of recording Stereo recording.
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Page 1. Page 2 Virtual Speaker: A Virtual Studio The software: Virtual Speaker is a package that automatically creates your voice files, prompts or any.
O dyssey Collaboration System: OCS. What is Distributed Collaboration? Work by teams whose members are separated by space and time.
Created by: Jenny Montemorano Presented by: The Gig… Geneva Information Gateway Sponsored by the NYS BTOP Grant.
Image and Sound Editing Raed S. Rasheed Sound What is sound? How is sound recorded? How is sound recorded digitally ? How does audio get digitized.
Microsoft Office Illustrated Using Advanced Features.
Audio Steganography Echo Data Hiding
1 Introduction to the Visual Studio.NET IDE Powerpoint slides modified from Deitel & Deitel.
GroupWise Tutorial What is GroupWise? GroupWise is an and calendar service (much like Microsoft outlook) for Collin College faculty and staff.
Background Images in HTML/CSS STEPHANIE BECKSTROM.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Caleb Walter. Created when Microsoft made the NTFS File system in NT 3.1 Made for Compatibility with HFS HFS uses Data Forks ; NTFS uses File Extensions.
Steganography.
(PubMed) MY NCBI (Advanced Course: Module 2). Table of Contents  How to register and sign into MY NCBI  Setting up filters in MY NCBI  Saving searches.
Audio. Why Audio Essential tool for – Interface – Narrative – Setting & Mood.
1 Workshop 4 (B): Visual Basic Test Project Mahidol University June 13, 2008 Paul Evenson University of Delaware Bartol Research Institute.
Making a Playable DVD movie using your digital photos And adding music to the movie.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
 Whether using paper forms or forms on the web, forms are used for gathering information. User enter information into designated areas, or fields. Forms.
Alice Workshop Working with Sound. Sound Working with sound is appealing to students Demo: Penguin Sound.
Using Microsoft Visual Studio 2005 Original by Suma Rao Revised by John G. McMahon ( 9/6/2008 )
CSD 340 (Blum)1 Using Visual Studio CSD 340 (Blum)2 Start/Microsoft Visual Studio 2005/Microsoft Visual Studio 2005.
Chapter 2 – Introduction to the Visual Studio .NET IDE
Access Lesson 11 Creating and Running Macros Microsoft Office 2010 Advanced Cable / Morrison 1.
(PubMed) MY NCBI (Advanced Course: Module 2). Table of Contents  How to register and sign into MY NCBI  Setting up filters in MY NCBI  Saving searches.
Soundscapes James Martin. Overview Problem Statement Proposed Solution Solution Created (Modules, Model, Pics) Testing Looking Back See It in Action Q&A.
CMPF124: Basics Skills for Knowledge Workers Manipulating Windows GUI.
Using This PowerPoint This PowerPoint presentation assumes your Computer Science teacher has provided you with the InstallingJava folder, which contains.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
1 After completing this lesson, you will be able to: Get around the Internet with your browser. Connect to the Internet. Print Web pages. Save Web pages.
This is how you invoke the Microsoft Visual Studio 2010 Software. All Programs >> Microsoft Visual Studio 2010.
Starting Associate Dictation: To start the Associate Dictation double click the Associate dictation icon on your desktop or from the preferred link set.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Soundscapes James Martin. Overview Review System TestingPrototype Q & A.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
University of Toledo Safety & Health Department
Audacity Basics.
Chapter 3: I Need a Tour Guide (Introduction to Visual Basic 2012)
(PubMed) MY NCBI (Advanced Course: Module 2)
Pori Saikia University of Essex
Audacity Presented by Carrie Walter
Introduction The Custom Store Groups folders and functions allows you to create, modify and use store accounts of specific interest to you or your team.
Welcome
Tips for Importing References from
Chapter 2 – Introduction to the Visual Studio .NET IDE
HOW TO PUT PASSWORD IN WORD, SPREAD SHEET AND DATABASE
(PubMed) MY NCBI (Advanced Course: Module 2)
Using Windows Live Movie Maker
Remark® Exam-Grading Instructions
(PubMed) MY NCBI (Advanced Course: Module 2)
Creating and Sending Message Links
MY NCBI (module 4.5).
Digital Story Telling with Frames
Presentation transcript:

CALEB WALTER 7/14/2013 Audio Stego – A Brief How To

What is Audio Steganography? Hiding Data inside Audio files (WAV, MP3, WMA, etc) Digital Audio differs from Analog Audio  Continuous Signal vs Discrete Signal  Sampled at a continuous rate (CD: 44Khz) Data is hidden by slightly changing the discrete signal to remain inaudible

Encoding Data in Audio Multiple Tools to encode audio into MP3 file and format  MP3Stego – Takes a.TXT file and.WAV File and Encodes and formats into a MP3 File  Coagula – Encodes an Image into an MP3 or.WAV File

Encoding with MP3Stego Create a sample.TXT file with your desired encoded message Save this Desired Message into the Same Folder as your.WAV

MP3Stego Encoding Cont. Find Desired.WAV File (I chose Classic Mr.T)  Make Sure it is in the same Directory as the Earlier.TXT File Load up MP3Stego GUI  Select “Encode TXT file in an MP3 File”

Encoding with MP3Stego Cont. Select your Desired Encoded Message in “Select Original TXT File” box Select your chosen WAV file to encode in “Select Original Sound File” box Type the desired name of your newly encoded MP3 in the “Output File” box

MP3Stego Encoding Cont. Press “Encode File!!!” Button to begin Encoding To enter a password to protect against random decoding, type desired Password into box  You will not see the text you type, so make sure you get it right!

Encoding with MP3Stego After Pressing Enter and confirming any desired passphrase, an Encoded MP3 File will be saved into the same directory as the.WAV and.TXT

Encoding with Coagula Create an Image with your preferred Image Creation/Modulation Software  I chose Paint  A Small Image without much empty space will work best

Encoding with Coagula Open up Coagula and go to File: Open Image Find your created image in the directory and press Open

Encoding with Coagula Either go to the Sound Drop down Menu and press “Render without Blue” or Press the button with Green and Red gears to render the image as sound Newly Encoded.WAV file will be saved as Coagula.wav in Coagula Directory

Decoding with MP3Stego Open Up MP3Stego and Select “Decode TXT File from an MP3 File” Select your Encoded MP3 File from before and in “Select MP3 to Decode:” box

Decoding with MP3Stego Enter in any established passphrase for your file within the Passphrase box Press Enter and a.TXT file bearing the name of the encoded MP3 file will appear in the directory

Decoding with Sonic Visualizer Open Up Sonic Visualizer and open the encoded.WAV File into the Visualizer  You will only see Audio Spectrum for now Go to Menu and press “Add Spectogram”  For this application any and all submenu options will have no effect

Future Methods for Audio Steganography Echo Hidden – Echo Inside Audio File, hiding data within the echo so that it is undeterminable to the human ear Song Filtering – Running multiple FIR filters over a song to encode data into it, without changing the sound or file size

Sources ords=boing+spring+springy ords=boing+spring+springy messages-and-codes-in-audio-files messages-and-codes-in-audio-files nload=Latest nload=Latest