IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 359-363

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

A New Method to Hide the Data in Audio Using Steganography Kavyashree1, Kavya Hegde2, Vikesh Vasanth Rao3 1

2

Student, Srinivas Institute of Technology, VTU Belgaum Mangalore, Karnataka, India [email protected]

Assistant Professor, Srinivas Institute of Technology, VTU Belgaum Mangalore, Karnataka, India 3

Student, Srinivas Institute of Technology, VTU Belgaum Mangalore, Karnataka, India [email protected]

Abstract Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Steganography is well known and widely used techniques that hide their existence. Steganography relies on hiding covert message in unsuspected multimedia data and is generally used in secret communication between acknowledged parties. Steganography works by replacing bits of useless or unused data in regular computer files(such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Audio steganography is a young branch of this discipline. The prime focus is to transmit any secret message using the audio signal, which can only be retrieved by the intended recipient, while keeping the original characteristics of the carrier audio signal unaltered. An encoding mechanism is used for embedding in the 4th Bit LSB method. The quality of the audio file after encoding remains unaffected. Symmetric key cryptographic algorithm, DES was also used to ensure greater security. Keywords: Steganography, Cryptography, Audio Steganography, LSB ,DES.

1. Introduction In fact, most of today’s application asks for authentication and secrecy of the data. Secret transmission of data is an important task to preserve the data from the immune to attacks, threats and misuse. Security has become a critical feature for thriving networks and in military alike[1]. So more robust methods are chosen so that they ensure secured data transfer. Cryptography and Steganography are well known and widely used techniques that manipulate information (messages) in order to cipher or hide their existence. Cryptography (from Greek krypts, ”hidden”, and grphein, ”to write”) is, traditionally, the study of means of converting information from its normal, comprehensible form into an incomprehensible format, rendering it unreadable without secret knowledge, the art of encryption. The art of protecting information (plain text) by transforming it (encrypting it) into an unreadable format is called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can Kavyashree,IJRIT

359

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 359-363

sometimes be broken by cryptanalysis, also called code breaking, although modern cryptography techniques are virtually unbreakable [2]. Cryptography encrypts the actual message that is being sent. This security mechanism uses mathematical schemes and algorithms to scramble data into unreadable text. It can only be decoded or decrypted by the party that possesses the associated key. The general form of cryptographic technique is shown in fig 1.1

Fig.1. Cryptography System Scenario

The primary goal of Steganography is to reliably send hidden information secretly, not merely to obscure its presence. Steganography in today’s computer era is considered lately, new directions based on Steganographic approaches started to emerge to ensure data secrecy [4]. Rather than as a substitute to existing solutions, these approaches could achieve better data secrecy if combined with conventional security techniques. Modern techniques of steganography exploit the characteristics of digital media by utilizing them as carriers (covers) to hold hidden information. Covers can be of different types including image, audio, video, text. Where the cover file used is audio file. The sender embeds data of any type in a digital cover file to produce a stego-file, in such a way that an observer cannot detect the existence of the hidden message [3]. At the other end, the receiver processes the received stego file to extract the hidden message. The general form of Steganographic technique is shown in fig 1.2

Fig. 2: Steganography System Scenario

2. Literature Survey Least significant bit (LSB) coding is the simplest way to embed information in a digital audio file. By substituting the least significant bit of each sampling point with a binary message, LSB coding allows for a large amount of data to be encoded. Figure 3 illustrates how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method [5]. In LSB coding, the ideal data transmission rate is 1 kbps per kHz. In some implementations of LSB coding, however, the two least significant bits of a sample are replaced with two message bits. This increases the amount of data that can be encoded but also increases the amount of resulting noise in the Kavyashree,IJRIT

360

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 359-363

audio file as well. Thus, one should consider the signal content before deciding on the LSB operation to use. For example, a sound file that was recorded in a bustling subway station would mask low-bit encoding noise. On the other hand, the same noise would be audible in a sound file containing a piano solo. To extract a secret message from an LSB encoded sound file, the receiver needs access to the sequence of sample indices used in the embedding process. Normally, the length of the secret message to be encoded is smaller than the total number of samples in a sound file. One must decide then on how to choose the subset of samples that will contain the secret message and communicate that decision to the receiver. One trivial technique is to start at the beginning of the sound file and perform LSB coding until the message has been completely embedded, leaving the remaining samples unchanged. This creates a security problem, however in that the first part of the sound file will have different statistical properties than second part of the sound file that was not modified. One solution to this problem is to pad the secret message with random bits so that the length of the message is equal to the total number of samples. Yet now the embedding process ends up changing far more samples than the transmission of the secret required. This increases the probability that a would-be attacker will suspect secret communication.

Fig.3. Message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method

3. Proposed Method Implementation

Fig.4.Overall System Architecture

Kavyashree,IJRIT

361

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 359-363

The procedure for data hiding using Steganographic application in this project is as follows fig 4 The sender first uses the Steganographic application for encrypting the secret message. For this encryption, the sender uses text document in which the data is written and the audio file as a carrier file in which the secret message or text document to be hidden. The sender sends the carrier file and text document to the encryption phase for data embedding, in which the text document is embedded into the audio file. The procedure of encryption is discussed in the next phase. In encryption phase, the data is embedded into carrier file which was protected with the password. Now the carrier file acts as an input for the decryption phase. The audio file in which data is hidden i.e. the carrier file is sent to the receiver using a transmission medium. E.g. Web or e-mail. The receiver receives the carrier file and places the audio file in the decryption phase. In the decryption phase, the original text document can be revealed using the appropriate password. The decryption phase decrypts the original text document using the least significant bit decoding and decrypts the original message. Before the encryption of the text, the message is encrypted in order to avoid unauthorized modification using DES algorithm. The data hiding and the data extracting of audio steganography process will be done in three phases.

V. Experimental Results Different experiments were conducted to prove that the proposed method of embedding audio file. The following experiments were conducted by modifying the 2nd and 4th bit LSB with same data and different data. • Same audio file is embedded with different text file with varying text content sizes. In all the cases, SNR (Signal to Noise Ratio) and PSNR (Peak; Signal to Noise Ratio) area calculated. Figure 4 shows the original audio file before embedding the text content and Figure 5 shows the audio file after embedding the text content. The results show that the size of the audio file remains same even after embedding the secret message.

File Name

Size (Bytes)

PSNR

File Name

Size(Bytes)

PSNR

Text1

103

20.862

Text1

103

20.862

Text2

100

20.862

Text2

100

20.862

Text3

75

20.862

Text3

75

20.862

Text4

50

20.862

Text4

50

20.862

Table 1.PSNR value of 2nd LSB Position

Table 2.PSNR value of 4th LSB Position

V. Conclusion The proposed system is considered to be an efficient method for hiding text in audio files such that data can reach the destination in a safe manner without being modified. Using the method of embedding text in the 2th or 4th layer , PSNR values is same. So we can embed the data in the either position along with the encryption and decryption of the secret message using DES algorithm makes data more secure and transparency is minimized.

Kavyashree,IJRIT

362

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 359-363

Acknowledgment We are really thankful to the Almighty. We are also thankful HOD Prof. Shivakumar G.S, Dept. of computer science and Engineering SIT Mangalore. We also convey our thanks to my guide Asst.Prof Kavya Hegde and all the staff members of SIT for helping in the project.

REFERENCES [1]Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade,”An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution”International Journal of Computer Applications (0975 8887)Volume 77 No.13,September 2013 [2] Ajay.B.Gadicha1, AudioWave Steganography, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-1, Issue-5, November 2011 [3] A.Joseph Raphael,Dr.V Sundaram,”Cryptography and Steganography - A Survey” [4] Niels Provos and Peter Honeyman University of Michigan, ”Hide and Seek: An Introduction to Steganography” [5]Methods of Audio Steganography, Internet publication on www.Snotmonkey.com.

Kavyashree,IJRIT

363

A New Method to Hide the Data in Audio Using ...

The quality of the audio file after encoding remains unaffected. Symmetric key cryptographic algorithm, DES was also used to ensure greater security. Keywords: Steganography, Cryptography, Audio Steganography, LSB ,DES. 1. Introduction. In fact, most of today's application asks for authentication and secrecy of the data.

124KB Sizes 1 Downloads 148 Views

Recommend Documents

A New Method to Identify Individuals Using Signals ...
larger categories to form and lead to a broader generalisation and higher code .... Conference on Control, Automation, Robotics and. Vision, Singapore, pp.

Controlling Data Drop using Hybrid Track method in ...
other nodes for cooperation in routing and forwarding packets to the destination. Intermediate nodes might agree to forward the packets but actually drop or modify them because they are misbehaving. 4. PROPOSED SYSTEM. We proposed a new hybrid track

A New Shot Change Detection Method Using ...
Department of Electronic Engineering, Shanghai Jiao Tong University ..... Consumer Electronics, vol. 49, pp. ... Circuits and Systems for Video Technology, vol.

A new method for detecting causality in fMRI data ... - Semantic Scholar
Here, we briefly outline a new approach to data analysis, in order to extract both ..... central issues in uncovering how big networks of areas interact and give rise ...

Method and arrangement for data processing in a communication ...
Jan 19, 2011 - This invention relates to data processing in communication systems, and .... HoWever, this approach has a number of disadvantages: The controlling entity ... provides the advantages that the controlling entity does not need to store ..

The Finite Element Method and Applications in Engineering Using ...
The Finite Element Method and Applications in Engineering Using Ansys.pdf. The Finite Element Method and Applications in Engineering Using Ansys.pdf.

A new method for detecting causality in fMRI data of ... - Springer Link
This paper presents a completely data- driven analysis method that applies both independent components analysis (ICA) and the Granger causality test (GCT) ...

System and method to acquire audio data packets for recording and ...
Aug 24, 2006 - ABSTRACT. A signal monitoring apparatus and method involving devices for monitoring signals representing communications traf?c, devices for identifying at least one predetermined parameter by analyzing the context of the at least one m

A New Method to Describe Infant Looking
studying visual behavior during natural interactions in mobile infants. .... ing data presented a problem—how to relate eye ...... rails as tools in a locomotor task.

Iris Data Indexing Method Using Gabor ieee.pdf
Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Iris Data Ind ... abor ieee.pdf. Iris Data Ind ... abor ieee.pdf.

Method of converting audio data for a portable device and reproducing ...
Jun 29, 2009 - network, such as the Internet, are heavily encrypted through. Digital Right ... problems and/or disadvantages and to provide at least the advantages ... Additional advantages, objects, and features of the inven tion will be set forth i

Audio/video reproducing apparatus and method
Aug 3, 2006 - A particular advantage is provided by identifying the con tent of the ..... the interface 118 is a Wireless communications link. The interface 118 ...

Audio Patch Method in Audio Decoders-- MP3 and AAC
[26] QuickTime, http://www.apple.com.tw/quicktime. Figure 29: The ODG of the AAC tracks, ZBD audio, and ASP audio under 128k bit rate. Figure 30: The gain of ...

A New Data Representation Based on Training Data Characteristics to ...
Sep 18, 2016 - sentence is processed as one sequence. The first and the second techniques are evaluated with MLP, .... rent words with the previous one to represent the influence. Thus, each current input is represented by ...... (better disting

Applying the Apriori-based Graph Mining Method to Mutagenesis Data ...
The method was used to analyze mutagenicity data for 230 aromatic nitro compounds. ... occurring subgraph patterns from graph-structured data. Our recent study introduced algebraic graph theory to the framework of Basket Analysis. The method is calle

A New Method for Computing the Transmission ...
Email: [email protected], [email protected]. Abstract—The ... the transmission capacity of wireless ad hoc networks for three plausible point ...

A New Method of Estimating the Pollen Dispersal Curve ... - Genetics
perform the estimations for a single simulation repli- cate. For this reason, we performed a limited ...... should cover as many pairwise-distance classes as possi-.

The Incremental Funding Method - A Data Driven ...
into use cases, whereas in an XP environment,. MMFs are ... meaningful functional groups for delivery in single ..... for establishing staged payments. This is ...

A New Method of Estimating the Pollen Dispersal Curve ... - Genetics
perform the estimations for a single simulation repli- cate. For this reason, we performed a limited ...... should cover as many pairwise-distance classes as possi-.

A New Method for Computing the Transmission ...
the transmission capacity of wireless ad hoc networks for three plausible point ... no coordination, PCP used to model sensor networks where clustering helps in ...