This document discusses hiding textual data in an audio signal. It modifies the binary values of audio samples to embed secret text bits. The extraction process retrieves the hidden bits from the modified sample values. Key advantages are secrecy between sender and receiver, imperceptibility from the original audio, and high data capacity depending on file size. Disadvantages include loss of confidentiality if the algorithm is known, potential misuse, and inability to retrieve the original signal due to distortion. Applications include use in corporate communications, forensics, and by anti-social elements.
9. Sample
No.
Binary values of
corresponding
sample
Binary value
to be
embedded
Binary values
after
modification
51 01110100 0 01110100
53 01011110 1 01011111
55 10001011 0 10001010
57 01111011 0 01111010
59 10100010 0 10100010
61 00110010 0 00110010
63 11101110 0 11101110
65 01011100 1 01011101
SAMPLES OF AUDIO FILE BEFORE AND
AFTER EMBEDDING
10. EXTRACTION OF DATA FROM AUDIO
FILE
Sample No. Binary values with
embedded secret data
Bits that are stored in
the
queue
51 01110100 0
53 01011111 01
55 10001010 010
57 01111010 0100
59 10100010 01000
61 00110010 010000
63 11101110 0100000
65 01011101 01000001
11. ADVANTAGES
SECRECY : known only to the sender &
receiver.
IMPERCEPTIBILITY : indistinguishable from the
original.
HIGH CAPACITY : depends on the size of the
audio.
12. DISADVANTAGES
Once the algorithm is known
confidentiality of the information is lost.
Hackers may misuse the technique.
Due to distortion original signal may not
be obtained.