Enhanced LSB Based Audio Steganography

Similar documents
Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

Secret Communication through Audio for Defense Application

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Application of Data Hiding in Audio-Video Using Advance Algorithm

Hiding Data in Wave Files

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

International Journal of Advance Research in Engineering, Science & Technology

Secret Sharing in Audio Steganography

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

International Journal of Computer Engineering and Applications,

An Analysis of Various Techniques in Audio Steganography

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Random Image Embedded in Videos using LSB Insertion Algorithm

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

A Proposed Method for Cryptography using Random Key and Rotation of Text

Efficient Image Steganography Using Integer Wavelet Transform

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

Jeff Hinson CS525, Spring 2010

Digital Image Steganography Techniques: Case Study. Karnataka, India.

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

Efficient & Secure Data Hiding Using Secret Reference Matrix

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

LSB Based Audio Steganography Using Pattern Matching

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME

Analysis of Cryptography and Pseudorandom Numbers

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Image Steganography (cont.)

A Framework to Reversible Data Hiding Using Histogram-Modification

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

Implementation of Random Byte Hiding algorithm in Video Steganography

Assignment 9 / Cryptography

Complex Encryption Methodology Based On Two Level Encryption Technique

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

ABSTRACT I. INTRODUCTION

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

Appendix A. Definition of Terms

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3

International Journal of Advance Engineering and Research Development

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

NETWORK SECURITY & CRYPTOGRAPHY

Delineation of Trivial PGP Security

Proposal for Scrambled Method based on NTRU

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector

Security. Communication security. System Security

Architectural Design of Multi Level Steganography System for Data Transmission

Data Hiding in Audio-Video using Anti Forensics Technique for Secret Message and Data in MP4 Container

CREATING AN IMAGE USING ENCRYPTED SENSITIVE WORDS

A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS

II. LITERATURE SURVEY

Computers and Security

Code Ninjas: Introduction to Computer Science. Macomb Science Olympiad Presented by Swati Dharia Shane Storks

International Journal of Recent Engineering Research and Development (IJRERD) ISSN: Volume 03 Issue 04 April 2018 PP.

Distributed Steganography

Steganography using MATLAB

Effect of Audio Steganography based on LSB insertion with Image Watermarking using AVI video

ELECTRONICS DEPARTMENT

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

A Reversible Data Hiding Scheme for BTC- Compressed Images

Secured Way of Ciphering Text Using Audio Steganography

Secure Communication With Lossless Data Compression Using Dpd Encoding

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm

Analysis of Steganography as a Security Technique

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

Science & Technology (DCRUST), Sonepat

Cryptographic Concepts

A Robust Audio Steganographic Technique based on Phase Shifting and Psycho acoustic Persistence of Human Hearing Ability

Review On Secrete Sharing Scheme for Color Image Steganography

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A New Compression Method Strictly for English Textual Data

IMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION

A Combined Encryption Compression Scheme Using Chaotic Maps

I. INTRODUCTION. Manisha N. Kella * 1 and Sohil Gadhiya2.

CHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION

Steganography Methods on Text, Audio, Image and Video: A Survey

VHDL CODE FOR SINGLE BIT ERROR DETECTION AND CORRECTION WITH EVEN PARITY CHECK METHOD USING XILINX 9.2i

ANALYSIS OF AES ENCRYPTION WITH ECC

Vol. 1, Issue VIII, Sep ISSN

CPSC 467b: Cryptography and Computer Security

Cryptography Lesson Plan

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

1 Achieving IND-CPA security

Uses of Cryptography

A New Approach to Compressed Image Steganography Using Wavelet Transform

Transcription:

Enhanced LSB Based Audio Steganography Prof.Dighe Mohit dighe.mohit@gmail.com Miss. Kavade Priyanka kavade.priyanka@gmail.com Mr. Raje Lakhan lakhan2030@gmail.com Miss.Harale prajakta harale.prajakta15@gmail.com Mr. Dubhalkar Eknath eknath2690@gmail.com Mr. Shelar Keshav kss.sonu@gmail.com Abstract In day to day life information security has become very important phenomenon of our life. Hiding a information is an essential part information security. Due to hackers data transmission in public communication system is not secure. So the most powerful solution for this problem is an audio steganography. Existing systems have low implementation power, poor interface, it was not easy to understand and it has restricted message size. We implement Enhanced LSB Based Audio Steganography system which ensures secure data transfer between the source and destination. Encryption and Decryption technique are use in our system which is very complex to break. LSB coding is one of the earliest techniques of hiding the information in audio. Our paper mainly focuses hiding a data in an 8-bit audio file. By graphical representation we prove the results are time-efficient and effective. Keywords- MOS, LSB, AES, Steganography. H I. INTRODUCTION ave you ever wanted to hide secret information from your family, friends, or government? If yes, then you have to learn about STEGANOGRAPHY. In Steganography technique third party can t recognize the hidden secret information from the cover media objects like Audio, Image and video. The audio file which consists of hidden information is known as Audio steganography.the Audio Steganography method embed secret information in WAV sound files. The WAV media is much easier to handle in order to hide information and extract information because it includes redundant, unnecessary and unnoticed data spaces. The size of the information is generally quite small compared to the size of the media in which it must be hidden. We implement system that an audio file is used as a cover object to hide textual secret information without affecting the content of audio file and its structure. Since degradation in the perceptual quality of the cover object may leads to a noticeable change which may leads to the failure of objective of steganography. We implement the proposed system using symmetric cryptography because cryptography is an extra layer of security and it help on adding randomness in information to be hidden with our methods. Term Steganography and cryptography are closely related. Scrambling of information is done in Cryptography which cannot be understood. Hiding of information is done by Steganography which cannot be seen by anyone. Architecture of system consist of following blocks : i. Cover Object: For hiding secret information we are using Audio as cover object. Just by listening or without using any detection tools we cannot detect information present in audio file. ii. Secret Message: It is nothing but an original piece of information which is used to send the information to destination. Figure.1 System Architecture of Audio Steganography www.ijltemas.in Page 119

iii. Key: Key is used to do embedding process information with cover audio file. Encryption Key and Decryption Key are two types of key used in audio Steganography. iv. STEGO Object: The output of the embedding process is STEGO object which hide secret information in cover audio file according with which technique or method used. v. Encrypted: Encryption is nothing but converting original information into a cipher text. Secret key is also input for encryption process. vi. Decrypted: Decryption is nothing restoring the plaintext from the cipher text. The key which is used for Encryption is also use for decryption process. vii. Embedding Process: Embedding process is also known as encoding. In this, it takes secret information, cover audio and encryption key as input. Information is embedding in audio according to technique or method used. viii. Extracting process: Extracting process is also known as decoding. In this, it takes STEGO signal as input and extracts hidden information from it by using decryption key to retrieved original secret information. WAV audio file. This technique allows large amount of information to be encoded So LSB of binary sequence of each sample of WAV audio File is replaced with binary equivalent of information. In our system to increase security level we take help of cryptography algorithm. Steps To Hide Secret Information Using LSB Are: Step 1: Audio file Convert them into bit stream. Step 2: Each character in the secret information Convert into bit stream. Step 3: LSB bit of audio file replace with LSB bit of character in the secret information. B. LOCATION TO WRITE First of all we have to skip the header of the WAVE file. The actual size of the header is 44 bytes. Before writing skip the headers 44 bytes and start the encoding of message bits from the very next byte. Before encoding message, encode the Size information in the audio file. Basically 8 bytes will be enough to store message size, so encode these 8 bytes in subsequent 64 bytes of audio file after the header bits. II. EXISTING SYSTEM The existing systems of audio steganography consist with four techniques: i. Phase Coding ii. Spread Spectrum iii. Echo Hiding All these technique have restrictions of size of message; have very low level implementation and poor interface. Following were some disadvantages of existing system: i. In phase coding, only first signal segment of Secret message is encoded, so low data transmission rate offers. ii. In Spread spectrum coding, while maintaining a high level of robustness. Moderate data transmission rate offers but introduce noise into a sound file. iii. In Echo hiding technique, mix of echoes noticeable which increases the risk for detection. III. PROPOSED SYSTEM A. LEAST SIGNIFICANT BIT (LSB) TECHNIQUE With reference to literature survey of audio steganoraphy, the least significant bit (LSB) technique gives effective results hence we consider it for our implementation.lsb coding is one of the modern techniques of hiding the information in Figure. 2 Encoding Address Space Now you can encode the message in audio file till the message is completely encoded. if the audio file size is large you don t have to worry, because the remaining bits are kept unchanged so that audio quality is kept intact as much as possible. C. ENCRYPTION AND ENCODING Actually the cryptography technique is used to make the message unreadable even if the encoded message is detected. This is the second layer of security. For Encryption purpose AES is used which is unbreakable up till now. It is a Symmetric cryptography technique. It is the most secure encryption algorithm. This can be implemented by using the JCA package of java. www.ijltemas.in Page 120

After the message is encrypted then it can be encoded into Audio file after the encoding of size bits. Encoding is a process of hiding the message in the audio. Figure. 3 Encoding STEP 1: Encode (). STEP 2: Declare audio bytes, text bytes, output bytes as bytes and text length long. int j=0; STEP 3: Copy audio file header. For (i=0 to 44) Output bytes[i] =audio bytes[i]; STEP 4: write length of text to output file For (i=45 to 45+64) Output bytes[i]= convert(audio bytes[i],bit set(text length)); STEP 5: Write text to audio Output bytes[i] = convert (audio bytes[i], bitset(text bytes[j++])) D. DECODING AND DECRYPTION On receiving the encoded Audio file the receiver has to first decode the message so he has to skip first 44 bytes and then read the next 64 bytes to get the exact size of message file. On reading the message size, using counter only that amount of LSB bits can be extracted starting from 108 locations, since the message is encoded from that location onwards. Once the counter is reached to zero the decoding process stops and passes the extracted information to the decrypting block. For the exact decryption of the message the receiver should know the key which was used to encrypt the message, this is because AES is a symmetric cryptographic algorithm. After the successful decryption the original message is displayed to user or it is stored back in the file. Decoding is a process of retrieving the message from the audio. ii. STEP 1: Decode () For Decoding: STEP 2: Declare audio bytes, text bytes, output bytes as bytes and text length long. int j=0; STEP 3: for (i=45 to 45+64) Text length= convert(byte set(audio bytes[i])); Text bytes[j++]= convert(bytetset(audio bytes[i])); STEP 4: Recover Secret message. IV. EXPERIMENTAL RESULTS The carrier file should be strictly audio (.wav) file format and the secret information may be text file. And here for our experimental scenario the carrier audio file is TEST.wav of 215 KB size and the secret text file is INPUT.TXT of 1.57 KB size. In our system, at transmitter side secret text file is embedded in carrier audio file and at the receiver side it recovered back as shown in the following graphical Figure. Figure. 4 Decoding E. ALGORITHM USED i. For Encoding: Figure. 5 Original Audio File (Test.Wav) www.ijltemas.in Page 121

Figure. 6 Original Secret Information (INPUT.txt) Figure. 10 Encoding Process time VS Size of data Figure. 7 Embedded Audio File (Stego File) As Shown Figure 10, This graph represent encoding process in which X-axis consist with size of data and y-axis consist time required for encoding data.as in our figure 10kb data require 10 seconds for encoding so as further this graph represent liner increment in both size as well as time. Encoding require more time to encode given data. Figure.8 Recovered Message Figure 5 shows the carrier audio file Test.wav representation. Figure 6 shows the secret text file that to be embedded in that carrier audio file. Figure 7 shows the stego audio file after embedding the secret text file. Figure 8 shows the recovered secret text files at the receiver side. The results are taken as screen shots using audacity tool. Figure. 9 Hiding capacity of with increasing size As Shown Figure 9, In Our System as you knows we are using 256Bit capacity of data in which 32KB data is hide. As capacity of data increases the hidden capacity also increases so our Graph represent increases the hidden capacity of the data. Figure. 11 Decoding process time VS Size of data As Shown Figure 11, Above graph represent the decoding ratio of time verses size of data in which X-axis consist with size of data and y-axis consist time required for decoding data. In above graph represent us that10kb data require only 5 seconds for decoding process while for encoding process it require more time than decoding process. Result shows 100% correct extraction of the embedded text. And there is no major difference in the signal representation so it ensures the security. V. CONCLUSION In this paper, we implement enhance audio steganography system by using LSB Coding and cryptographic key algorithms to make security system robust. In our system we used enhance version of the LSB technique which gives high embedding capacity and it can be retrieved without any loss in transmission. So our system is efficient for hiding the data from hackers. Hence, this system is well efficient for transmission of digital data via internet or other communication systems. It proves that our system gives best results that satisfying steganography concept. www.ijltemas.in Page 122

REFERENCES [1] Swati A.Patil, K. P.Adhiya, Hiding Text in Audio Using LSB Based Steganography in Information and Knowledge Management ISSN- Vol 2, No.3, 2012. [2] Bandyopadhyay Barnali, Prof. Samir Kumar,Gupta Banik, LSB Modification and Phase Encoding Technique of Audio Steganography Revisited, in International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 4,June 2012. [3] Bankar Priyanka R.,Patil Komal K., Katariya Vrushabh R., Sanghavi Mahesh R., Shashikant M. Pingle, AUDIO STEGANOGRAPHY USING LSB in 1st International Conference on Recent Trends in Engineering & Technology, Mar 2012. [4] Vittapu Sravan kumar, Budda Lavanya, Combination of Cyphertext and Audio Steganography Technique for Secrete Communication in International Journal of Emerging Technology and Advanced Engineering,ISSN 2250-2459,Volume 2, Issue 12, December 2012. [5] M. R.Dixit, Burate D.J, Performance Improving LSB Audio Steganography Technique, in International Journal of Advance Research in Computer Science and Management Studies Volume 1, Issue 4, September 2013. [6] P. Ramesh Yadav, K. Padmapriya,V. Usha Shree, Hiding Data in Audio Using Audio Steganography in International Journal of Computer Applications in Engineering Sciences,VOL I, ISSUE II,JUNE 2011. [7] Vikas Bhagasara, Navnath S. Narwade, Mahesh Kanthali, Rushikesh Pilwar, Enhanced Data Hiding Model in Audio to Ensure Secrecy, in International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 9,March 2013. Biswajita Datta, Samir Kumar Bandyopadhyay, Higher LSB Layer Based Audio Steganography Technique, in IJECT vol 2,Issue 4, octdec-2011. www.ijltemas.in Page 123