IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Implementation of Audio Steganography over Two Level LSB Using Half Adder Concept Anil Soni1, K. J. Satao2 1

Lecturer, Computer Science and Engineering; RSR- Rungta College of Engineering & Technolog, Bhilai, Chattisgarh, India [email protected]

2

Professor, Computer Science and Engineering; Head, Department of Information Technology, Rungta College of Engineering & Technolog, Bhilai, Chattisgarh, India [email protected]

Abstract The growing use of Internet among public masses and the abundant availability of public and private digital data in many real life applications have urged new and effective ways to ensure their security. Steganography is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. As we know it is the art and science of writing hidden messages in such a technique that no one, separately from the sender and intended receiver, suspects the existence of the message, a form of security through obscurity. Most of existing steganographic techniques use digital multimedia files as cover mediums to hide secret data. This paper focuses on combining the strengths of cryptography and steganography for secured communication. This paper proposes a method of audio steganographic system that provides a unique platform to hide the secret information in audio file though the information in text.

Keywords: LSB, Cryptography, Privacy, Security, Internet, Steganography. 1. Introduction Due to digitization, information and other works become easily available in digital form. So it is possible that when information exchange takes place during communication, an intruder may interpret with secret message to make copy of our secret information or to destroy our information. The first possibility may result into large-scale unauthorized copying which might weaken the melody, movie, book, and software publishing corporate and the other possibilities may result to damage of information which again results into miscommunication. These two troubles had specified significance to “Information Security”. At present, there are three major techniques that are being used for security reason: cryptography, watermarking, and steganography. Cryptography methods are depending on rendering the substance of a message distorted to unofficial person. In watermarking, data are concealed to carry some information about the cover medium such as ownership and copyright. Yet although cryptography and watermarking techniques are salient for reinforcing data protection, enhanced interest in exploring superior or complementary new techniques has been the focus of much ongoing research.

Anil Soni,

IJRIT

56

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63

2. Cryptography Cryptography is the science of information security that uses mathematics to encrypt and decrypt data. The word is derived from the Greekkryptos, meaning hidden. Cryptography empowers us to store susceptible information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. Cryptography can also provide authentication for verifying the identity of someone or something [2]. Data that can be read and understood without any special measures is called plaintext or clear text. The way of disguising clear text in such a way as to hide its substance is called encryption. Plaintext that is encrypted results in undetectable rubbish called cipher text. Encryption ensures that information is hidden from anyone for whom it is not intended, still those who can see the encrypted data. The reverse process of encryption i.e. getting original plaintext from cipher text is called decryption.

Fig. 1 Cryptography Process

3. Steganography The word Steganography is came from the Greek word for covered writing and basically means “to conceal in natural sight”. As defined by Cachin [1] steganography is the art and science of communicating in such a way that the presence of a message cannot be readable. Easy steganographic methods have been in use for hundreds of years, although now by the growing use of files in an electronic format new techniques for information hiding have become possible. Steganography does not alter the structure of the confidential message, but conceals it within a cover file so that it cannot be seen. Information in a cipher text, for instance, might provoke suspicion on the part of the receiver while an “invisible” message created with steganographic techniques will not. In some other word, steganography inhibits an unintended recipient from suspecting that the data subsists. In addition, the safety of usual steganography system relies on secrecy of the data encoding scheme. Once the encoding scheme is known, the steganography system is defeated [3, 4].

Anil Soni,

IJRIT

57

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63

Fig. 2 Steganography Process.

From figure, To minimize the difference between the cover- and the stego-medium, current steganography methods employ natural limitations in human auditory and viewable approaches. Picture and video based steganography depend on the limited human visual system to notice luminance variation at levels greater than 1 in 240 across uniform grey levels, or 1 in 30 across random patterns [5]. However, audio-based steganography exploits the masking effect property of the Human Auditory System (HAS) [6] Figure 3 shows how information hiding can be broken down into various fields. Steganography may be used to conceal a message intended for later retrieval by a specific person or group. In this case the purpose is to inhibit the message being detected by any other party. The other major area of steganography is copyright marking, where the information to be embedded is used to emphasize copyright over a document. Additional it can be further split into watermarking and fingerprinting.

Fig. 3 Steganographic Area

4. Audio Steganography In digital audio steganography system, covert message is inserted in audio file. The binary sequence of an audio file (cover object) is slightly changed by adding secret message in it. The audio file formats used by currently existing audio steganography software are WAV, AU, and even MP3 sound files. Audio steganography is a way of embedding information inside an audio signal. As data is embedded in the signal, the signal is get modified. This modification should not be made identified to the human ear. Inserting covert messages in audio file is more difficult than embedding messages in digital image. In order to hide secret messages, different techniques for inserting information in digital audio have been introduced. These methods range from simple algorithms which insert information in the form of noise in audio

5. Related Work As mentioned above there are four main categories of audio steganography that are commonly used to hide information into auditory data: least significant bit coding, echo coding, phase coding and spread spectrum Anil Soni,

IJRIT

58

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63

coding. Each method varies in implementation, bandwidth, and covertness. The methods have advantages and disadvantages and they are typically used for differing applications.

5.1 Least Significant Bit Encoding As the name implies least significant bit encoding (LSB encoding) deals with modifying the least significant bit of each audio frame in order to encode binary information. This is an inherently simple task and has the advantage of high bandwidth but is unfortunately easy to prevent. Small format changes that occur during file conversion, compression, or through preventative techniques, can easily contaminate the hidden data [7]. There have been proposed LSB coding methods, however, that utilize higher level bits in same fashion as the LSB method that are robust against some issues that are present in this category of audio steganography [8].

5.2 Echo Hiding The process of echo hiding involves inserting echoes with varying characteristics into discrete audio signals. Three echo parameters, amplitude, decay rate and offset (essentially the delay time of the echo) are applied in varying ways in order to successfully encode binary information. This method is very covert as each echo occurs below the audible limit of the human ear. The disadvantage of this technique is that the process can sometimes yield a noticeable mix of echoes which increases the risk for detection [7].

5.3 Phase coding Phase Coding addresses the issue of covertness and detectability as components of sound (modified phase) are much more difficult for the human ear to perceive than the addition or subtraction of noise. To implement this method the audio file is broken down into discrete chunks, separated into phase groups and then shifted according to the binary data being encoded. The main problem with this process is that modifications of audio phase allows for a relatively low quantity of stego-data. Thus this technique is relatively low bandwidth and is typically used for applications such as watermarking or copyrighting of audio files [7].

5.4 Spread Spectrum Coding The final type of audio steganography worth mentioning is Spectrum Coding. Spectrum Coding takes bits of information and randomly spreads them over the entire frequency spectrum [9]. It is similar to LSB but is more robust against steganalysis techniques. This procedure, however, is still somewhat vulnerable to detection as it can introduce noise into the audio file [7].

6. Proposed Method To overcome the drawbacks of obtainable system, a proficient encryption algorithm should be used. So the proposed system uses public key encryption algorithm through random based approach. It also provides a good platform to perform all steganographic techniques under one system. This system consists of text to audio, image to audio as well as audio to audio steganography. Step1: Step2: Step3: Step4: Step5:

Input secret message. Encrypt secret message using key which is encrypted secret message. Convert cover audio file into bit stream. Find size of encrypted secret messages. Convert each character of embedding secret messages into bit stream.

Encryption for Cryptography: Step6: Add two consecutive characters (in bit form) of encrypted secret message using half adder concept until end of file. Step7: Get output and carry for each half adder. Anil Soni,

IJRIT

59

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63

Insertion for Steganograpy: Step8: Replace first LSB and second LSB of each 16 bit of audio file with each bit of output and first of two consecutive character from MSB to LSB respectively that is stegano file Extraction for Seganogrphy: Step9: Extract each first LSB and second LSB for each 16 bit of audio file. Decryption for Cryptography: Step10: For each second LSB (first one of two consecutive character) + ? = First LSB (output) using half adder ? = Second of two consecutive characters Step11: Find encrypted secret message. Step12: Get secret message from encrypted secret message using same key.

Fig. 4 Steganographic Flowchart.

Implementation Snap Shot:

Anil Soni,

IJRIT

60

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63

Anil Soni,

IJRIT

61

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63

7. Conclusion Information security is a big challenge for computer users. This projected method is one of the instruments which allow the user to embed text or image or an audio data in cover media which is nothing but an audio signal under only one platform. There is no requiring going for different techniques of steganography. The stego object produced by described method is highly secured and prevent from vulnerability attacks. Review of proposed scheme has been discussed in this paper for embedding text or image or an audio data in cover audio file using public key encryption algorithm. Emphasis is on comparing proposed scheme with simple LSB based data hiding in audio. This steganography system is used for the transportation of high level or top secret documents between international governments also it allows for copyright protection on digital files using the message as a digital watermark.

8. References nd

[1] C. Cachin, “An Information-Theoretic Model for Steganography”, Proceedings of 2 Workshop on Information Hiding, MIT Laboratory for Computer Science, May 1998 [2] Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das, Debashis Ganguly and Swarnendu Mukherjee, “A tutorial review on Steganography”, International Conference on Contemporary Computing (IC3-2008), Noida, India, August 7-9, 2008, pp. 105-114. [3] Nedeljko Cvejic, Tapio Seppben “Increasing the capacity of LSB-based audio steganography ” FIN90014 University of Oulu, Finland ,2002. [4] A. A. Name, "Conference Paper Title", in Conference Name, Year, Vol. x, pp. xxx-xxx. [4] W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, “Techniques for data hiding”, IBM Systems Journal, Volume 39 , Issue 3-4, July 2000, pp. 547 – 568. [5] W Bender, D Gruhl, N Morimoto, A Lu, Techniques for Data Hiding. IBM Syst. J. 35(3 and 4), 313– 336 (1996) Anil Soni,

IJRIT

62

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63

[6] E Zwicker, H Fastl, Psychoacoustics (Springer Verlag, Berlin, 1990) [7] Ishaque, M. Qudus Khan, F. Abdul Sattar, S. Investigation of Steganalysis Algorithms for Multiple Cover Media. Ubiquitous Computing and Communication Journal. Vol 6, no 5, October 2011. [8] Cvejic, N., and T. Seppanen.Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method. In Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference On, 2:533 –537 Vol.2, 2004. [9] H. Matsuoka, Spread Spectrum Audio Steganography Using Sub-band Phase Shifting. in Intelligent Information Hiding and Multimedia Signal Processing, 2006. IIH-MSP 06. International Conference on, 2006, pp. 3 – 6.

Anil Soni,

IJRIT

63

Implementation of Audio Steganography over Two Level LSB Using ...

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63. Anil Soni, IJRIT. 56 ..... Systems Journal, Volume 39 , Issue 3-4, July 2000, pp. 547 – 568. [5] W Bender, D Gruhl, N Morimoto, A Lu, Techniques for Data Hiding. IBM Syst. J. 35(3 and 4), 313–. 336 (1996) ...

464KB Sizes 3 Downloads 361 Views

Recommend Documents

Implementation of Audio Steganography over Two Level LSB ... - IJRIT
The final type of audio steganography worth mentioning is Spectrum Coding. ... D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, “Techniques for data hiding”, IBM.

Implementation of Two-Level FH-CDMA with Non ...
The Frequency Hopping code division multiple access (FH-CDMA) gives high data and security to the data by assigning one hit FH pattern to ... by transmitting non-orthogonal sequences instead of data bits but in MFSK/FH-CDMA, the data rate is increase

Implementation of Two-Level FH-CDMA with Non-Orthogonal ...
Implementation of Two-Level FH-CDMA with Non-Orthogonal. Sequences for High Data Rate and Security. D.Venkata Reddy, K.KarunaKumari, Dr. R. Ramana Reddy. 1M.Tech, ECE, GITAM University, Vizag, [email protected]. 2Associate Professor, ECE, GITAM Uni

Fingerprint Template Protection using Steganography
fingerprint authentication system the key element in ... fingerprint template database using steganography. In this scheme steganography is applied at two levels which increase security of the system and make .... Management(IJSPTM), Vol. 1.

Steganography Using The Twelve Square Substitution Cipher.pdf ...
Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Steganograph ... n Cipher.pdf. Steganograph ... n Cipher.pdf. Open. Extract. Open with. Sign I

two-level boolean logic minimization using microbial ...
In conventional GA, a generational system is used. From one generation a .... the system prematurely converged to a solution with a fitness of 19,000 which is.

CycleGAN, a Master of Steganography
Dec 16, 2017 - strate an intriguing property of the model: CycleGAN learns to “hide” information about a source image into the images it generates in a nearly imperceptible, high- frequency signal. This trick ensures that the generator can recove

Video steganography
Jul 11, 2003 - ing, resampling, conversion from digital to analog and back again, etc. ...... 855-884. Pitas et al., “Applying Signatures on Digital Images,” IEEE.

Video steganography
Jul 11, 2003 - Design of Hidden Transmission,” Radioengineering, vol. 4,. No. 2, Jun. .... Communications—a Tutorial RevieW—Part I,” IEEE Com munications .... [ASSIGN EITHER A 0 OR A I TO EACH CROSS-CORRELATION RESULT.

two-level-diversified.pdf
Page 1 of 8. Two-level diversified classifier ensemble for. classification of credit entries. Pramod Patil1. , Dr.J.V.Aghav2. , and Vikram Sareen3. 1 Student at Department of Comp Engg, College Of Engineering Pune. 2 Processor at Department of Comp E

Design and Implementation of MPICH2 over InfiniBand with RDMA ...
from Intel Corporation, and National Science Foundation's grants #CCR-. 0204429 and ... the best of our knowledge, this is the first high performance design and implementation of ... data and the receive queue holds instructions that describe.

Comparison and implementation of audio based ...
Comparison and implementation of audio based searching for Indian Classical Music. Sanjay Goel ... The exponential growth of the Internet and compression.

Cheap One In Two Couples Audio Line Phone A Two Audio 3.5 ...
Cheap One In Two Couples Audio Line Phone A Two Au ... Earphone Line Free Shipping & Wholesale Price.pdf. Cheap One In Two Couples Audio Line Phone ...

notes over two way tables.pdf
Page 1 of 5. two way tables notes.notebook. 1. March 08, 2016. Page 1 of 5. Page 2 of 5. two way tables notes.notebook. 2. March 08, 2016. Page 2 of 5. Page 3 of 5. two way tables notes.notebook. 3. March 08, 2016. Page 3 of 5. notes over two way tab

steganography Art of Covert Communications, Streetman.pdf ...
Whoops! There was a problem loading more pages. steganography Art of Covert Communications, Streetman.pdf. steganography Art of Covert Communications ...

CURRENT STATE OF STEGANOGRAPHY
Department of Computer Science ... last three years, mostly due to the war on terror. This paper discusses ... II. Terminology. Steganography is often discussed alongside watermarking, fingerprinting, covert channels, subliminal .... information on a

Implementation of Cross Platorm Using Public and Private WEBOS.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Implementation ...

pdf steganography techniques
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. pdf steganography techniques. pdf steganography techniques.

IMPLEMENTATION OF AN FSK MODEM USING THE ...
archive. TI&ME allows users to build custom information pages and receive new product updates automatically via email. Email. For technical issues or ...

Implementation of Portable ECG Data Acquisition System using ... - IJRIT
can receive the updates through media like mobile phones and cautioned whenever an emergency service is required. Keywords: ARM7TDMI, LPC2148, SPI ... dumped into the LPC2148 through the serial UART port using Flash Magic software. During this proces

Implementation of Fast Radix-2 DCT Algorithm using ...
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, ... signal flow graphs, and Coordinate rotation digital computer (CORDIC) .... The following are some major features of our proposed CORDIC-based fast ...

Implementation of Brain Tumour Detection Using Segmentation ... - IJRIT
destroy all healthy brain cells. It can also indirectly ... aim in a large number of image processing applications is to extract important features from the image data, from which a description .... HSOM combine the idea of regarding the image segmen