You are on page 1of 30

MP3 STEGANOGRAPHY

By
Rituparna Das Gupta(12202052011)
Arpita Mukherjee(12202052018)
Soumik Nag(12202051018)
Debanjan Roy(12202051022)

Under the guidance of

Mr. MALAY KULE


Dept.of CSE

OVERVIEW
INTRODUCTION
OBJECTIVE
PROBLEM DEFINITION
TOOLS & PLATFORM
RSA ALGORITHM
MPEG1 AUDIO LAYER3
IMPLEMENTATION
RESULT
CONCLUSION
REFERENCES

INTRODUCTION

MP3 STEGANOGRAPHY is a software by means of which we


can hide encrypted information using MP3 files as a medium.

It stuffs variable sized encrypted text within an MP3 file.

Using the same software we can even retrieve the original text.

The software does not compromise with the quality of the MP3
file.

OBJECTIVE
Implementation of RSA algorithm effectively thereby making it
infeasible for the intruders to decipher the original text.
The cipher text that is obtained by the implementation of RSA
algorithm is to be stuffed within a MP3 file.
The cipher text has to be retrieved and decrypted into original
text.
To ensure that the quality of the MP3 file is not degraded, after
the stuffing of text message is done.

PROBLEM DEFINITION
CRYPTOGRAPHY- It is the art of achieving security by encoding
messages to make them unreadable
STEGANOGRAPHY- The art of hiding messages into a media.
RSA -It is a public key algorithm. The key used for encryption is
different (but related to) the key used for decryption.

TOOLS & PLATFORM

TURBO C++ 3.0


VISUAL BASIC 6.0
WINDOWS XP
256 MB RAM

RSA ALGORITHM

WHY RSA ?
The RSA algorithm involves three steps-key generation, encryption and
decryption.
The ciphering and deciphering keys are different.
The ciphering and deciphering algorithms are different.

RSA ALGORITHM
Pick P & Q

Calculate
N=P*Q

Select E

Select D

CT=PT^E mod N
PT=CT^D mod N

MPEG1 AUDIO LAYER3

WHY MP3 ?
Cannot be easily identified as steganographic medium.
Huge storing capacity.
Detecting hidden information inside of a MP3 audio file one will
need to find an audio file to compare it with the original one.

MP3 FILE STRUCTURE

MP3 HEADER STRUCTURE

DESCRIPTION OF HEADER
Position

Purpose

A
B
C
D
E

Frame sync
11
MPEG audio version (MPEG-1, 2, etc.)
2
MPEG layer (Layer I, II, III, etc.)
2
Protection (if on, then checksum follows header)
1
Bit rate index (lookup table used to specify bit rate for this MPEG
4
version and layer)

Sampling rate frequency (44.1kHz, etc., determined by lookup table)

G
H
I

Padding bit (on or off, compensates for unfilled frames)


Private bit (on or off, allows for application-specific triggers)
Channel mode (stereo, joint stereo, dual channel, single channel)
Mode extension (used only with joint stereo, to conjoin channel data)

1
1
2

J
K
L
M

Length

Copyright (on or off)


1
Original (off if copy of original, on if original)
1
Emphasis (respects emphasis bit in the original recording; now
2
largely obsolete)

METHODOLOGY

IMPLEMENTATION
The Private bit, the Copyright bit, the Original bit ,Padding bit and the
Emphasis bit can be a good source of hiding some text files.
Here we used the Padding bit as destination for hiding text.
Within the first 4 Padding bits we store the size of the text file.
After that using the same method data is stuffed.

PROBLEMS WE FACED
If data is stuffed in the Padding bit and if it does not match with the original
data it contained, then we have to change the 16bit-CRC for every frame that
we stuff in because the value of the CRC is dependant upon the header.
Fair amount of distortion was present which was violating the main
objective of the project.
So ID3V1 tags were considered as the destination for
hiding the cipher text.

WHY ID3V1 TAG?


ID3V1 tags are found at the end of the MP3 file.
The audio distortion is negligible.
The greatest advantage in stuffing in these tags is that we
do not have to change the CRC.

STEPS WE FOLLOWED
A text file is encrypted using RSA algorithm.
An MP3 file is opened in hexadecimal format and studied.
The cipher text is stuffed in the ID3V1 tag.
The cipher text is retrieved from the ID3V1 tag and then
decrypted to get back the original plain text.

RESULT

INTERFACES

CONCLUSION
We are able to hide data within a MP3 file.
High level of security is maintained.
Quality of the MP3 file is not compromised with.

FUTURE WORK
Using an advanced algorithm for encryption and decryption of plain
text instead of RSA algorithm.
The Private bit, the Copyright bit, the Original bit, Padding bit and the
Emphasis bit can be a good source of hiding some text files.
To prevent misuse of the software.

REFERENCES
The following are the reference that has been considered for our
project:
http://en.wikipedia.org/wiki/steganography/mp3/rsa.
http://www.MP3.com
http://www.codeproject.com
http://www.Onlamp.com
http://www.MP3 - HydrogenaudioKnowledgebase.com
http://www.Layer3.org
http://www.Datavoyage.com
Cryptography and Network Security -By Atul Kahate

You might also like