• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

Steganography Program for MP3 Audio Based on the Rule of Window Switching

Student: Pavluczkij Anton

Supervisor: Rimma Akhmetsafina

Faculty: School of Software Engineering

Educational Programme: Bachelor

Year of Graduation: 2014

<table cellpadding="0" cellspacing="0" class="im_log_t" id="im_log14488577" style="width: 627px; color: rgb(0, 0, 0); font-family: tahoma, arial, verdana, sans-serif, 'Lucida Sans'; font-size: 11px; line-height: 13px;"><tbody><tr class="im_in" data-date="1401526428" data-from="14488577" id="mess295090" style="cursor: pointer;"><td class="im_log_body" style="line-height: 16px; width: 356px; border-top-width: 5px; border-top-style: solid; border-top-color: rgb(255, 255, 255); padding: 5px; vertical-align: top;"><div class="wrapped" style="overflow: visible; word-wrap: break-word; width: 350px; padding-left: 4px; margin-left: -4px;"><div class="im_msg_text">In today&#39;s modern world, MP3 audio format is widespread, steganography techniques for which are actively developing. Specificity of steganography algorithms which are used for embedding information in MP3 file is that the file formats store a lossy compressed audio information, and thus the basic techniques used in audiosteganografii will not apply to MP3 files because of signal distortion.<br /><br />А large number of programs which are represented in open access use to embed information in MP3 fields without values and subsequent decompression of audio playback. The fact that the use of such methods is readily identifiable as MP3 file with embedded information will have a field which are not meeting specifications of a format, that means these programs have a weak steganography resistance. To increase the resistance a steganography algorithms should be used which use different encoding steps for embedding information,while the MP3 file containing the secret message will be consistent with the specification. Identification of such integration is much more difficult compared to methods using non-significant blocks of information to hide.<br /><br />The main purpose of the final qualification project is to develop a program that uses a switching windows mechanism which is used in the step of encoding WAV file to MP3 for embedding secret messages.<br /><br />In this paper, a known method of switching windows to improve steganographic resistance is modified. The modification is to reduce the noise that appears when information is embedded, by changing the key, which is used to determine the frames that contain the embedded information.The program that implements the original and the proposed modified method was developed.</div></div></td><td class="im_log_date" style="color: rgb(153, 153, 153); width: 52px; padding-left: 8px !important; border-top-width: 5px; border-top-style: solid; border-top-color: rgb(255, 255, 255); padding-top: 5px; padding-right: 5px; padding-bottom: 5px; vertical-align: top;">&nbsp;</td></tr></tbody></table><p>&nbsp;</p>

Student Theses at HSE must be completed in accordance with the University Rules and regulations specified by each educational programme.

Summaries of all theses must be published and made freely available on the HSE website.

The full text of a thesis can be published in open access on the HSE website only if the authoring student (copyright holder) agrees, or, if the thesis was written by a team of students, if all the co-authors (copyright holders) agree. After a thesis is published on the HSE website, it obtains the status of an online publication.

Student theses are objects of copyright and their use is subject to limitations in accordance with the Russian Federation’s law on intellectual property.

In the event that a thesis is quoted or otherwise used, reference to the author’s name and the source of quotation is required.

Search all student theses