filmov
tv
Audio Cryptography Java Project

Показать описание
For More Details Contact
Name : Venkatarao ganipisetty
Mobile Number: +91 9966499110
Abstract:
Security often requires that data be kept safe from unauthorized access. And the best line of defense is physical security (placing the machine to be protected behind physical walls). However, physical security is not always an option (due to cost and/or efficiency considerations). Instead, most computers are interconnected with each other openly, thereby exposing them and the communication channels that they use. Cryptography secures information by protecting its confidentiality. It can also be used to protect information about the integrity and authenticity of data. Stronger cryptographic techniques are needed to ensure the integrity of data stored on a machine that may be infected or under attack. So far Cryptography is used in many forms but using it with Audio files is another Stronger Techniques. The process of Cryptography happens with Audio files for transferring more secure sensitive data. The Sensitive Data is Encoded with an Audio files and Passed over Insecure Channels to other end of Systems. Here we are using .wav file Format for Encryption and Decryption of Message. The given message will be encrypted with a given Audio files using a secret key. The System will then embed the secret message into the audio file. The result will be a new audio file, which has the secret message in it. While decrypting the same key should be given for encrypted Audio files to get the secret message from it.
Existing system:
If a person sends sensitive information over the insecure channels of the system then there may be a chance of hacking it, they can alter the information and sends it over the net. (Example is military persons sending sensitive information over the net.)This problem has been solved by the proposed system
Proposed system: In the proposed system the above problem has been solved by embedding the data into the audio file. Before embedding it into the file, encryption operation will be performed by using the encryption key which is provided by the source. Then this Audio files will be passed over the net, even if hacker hacks it, can be able to see only an audio file. At the destination side this data will be encrypted from Audio files and performs decryption to get original message.
Name : Venkatarao ganipisetty
Mobile Number: +91 9966499110
Abstract:
Security often requires that data be kept safe from unauthorized access. And the best line of defense is physical security (placing the machine to be protected behind physical walls). However, physical security is not always an option (due to cost and/or efficiency considerations). Instead, most computers are interconnected with each other openly, thereby exposing them and the communication channels that they use. Cryptography secures information by protecting its confidentiality. It can also be used to protect information about the integrity and authenticity of data. Stronger cryptographic techniques are needed to ensure the integrity of data stored on a machine that may be infected or under attack. So far Cryptography is used in many forms but using it with Audio files is another Stronger Techniques. The process of Cryptography happens with Audio files for transferring more secure sensitive data. The Sensitive Data is Encoded with an Audio files and Passed over Insecure Channels to other end of Systems. Here we are using .wav file Format for Encryption and Decryption of Message. The given message will be encrypted with a given Audio files using a secret key. The System will then embed the secret message into the audio file. The result will be a new audio file, which has the secret message in it. While decrypting the same key should be given for encrypted Audio files to get the secret message from it.
Existing system:
If a person sends sensitive information over the insecure channels of the system then there may be a chance of hacking it, they can alter the information and sends it over the net. (Example is military persons sending sensitive information over the net.)This problem has been solved by the proposed system
Proposed system: In the proposed system the above problem has been solved by embedding the data into the audio file. Before embedding it into the file, encryption operation will be performed by using the encryption key which is provided by the source. Then this Audio files will be passed over the net, even if hacker hacks it, can be able to see only an audio file. At the destination side this data will be encrypted from Audio files and performs decryption to get original message.