A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Similar documents
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Hiding Data in Wave Files

International Journal of Advance Research in Engineering, Science & Technology

A New Approach to Compressed Image Steganography Using Wavelet Transform

Secret Communication through Audio for Defense Application

Digital Image Steganography Using Bit Flipping

Optimizing Image Steganography using Genetic Algorithm

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

A Robust Audio Steganographic Technique based on Phase Shifting and Psycho acoustic Persistence of Human Hearing Ability

EFFECTS ON QUALITY IN AUDIO STEGANOGRAPHY HO MAN YEN

An Analysis of Various Techniques in Audio Steganography

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

EFFECTIVE USE OF STEGANOGRAPHY ON AUDIO WAVE AND SPY ANALYSIS

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method

Secured Way of Ciphering Text Using Audio Steganography

CHAPTER 3. Digital Carriers of Steganography

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Data Hiding in Video

Complex Encryption Methodology Based On Two Level Encryption Technique

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Jeff Hinson CS525, Spring 2010

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

Implementation of Random Byte Hiding algorithm in Video Steganography

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Breaking the OutGuess

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

Random Image Embedded in Videos using LSB Insertion Algorithm

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Image and Video Watermarking

Adaptive Pixel Pair Matching Technique for Data Embedding

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

A Study on Different JPEG Steganograhic Schemes

LSB Based Audio Steganography Using Pattern Matching

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

Networking Applications

AUDIOVISUAL COMMUNICATION

Secret Sharing in Audio Steganography

Steganography. Brent McClain Rob Carey

AUDIOVISUAL COMMUNICATION

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

Efficient & Secure Data Hiding Using Secret Reference Matrix

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Audio-coding standards

GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

International Journal of Computer Engineering and Applications,

Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu

Image Steganography (cont.)

Architectural Design of Multi Level Steganography System for Data Transmission

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Principles of Audio Coding

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

Perceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects.

Concealing Information in Images using Progressive Recovery

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

A Reversible Data Hiding Scheme for BTC- Compressed Images

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs

Audio-coding standards

KEYWORDS: Least Significant Bits(LSB),Discrete Cosine Tranform(DCT),H.264 AVC/SVC. INTRODUCTION Steganography is the science of hiding secret RESULT:

Enhanced LSB Based Audio Steganography

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Audio Watermarking using Empirical Mode Decomposition

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal.

University of Mustansiriyah, Baghdad, Iraq

Image Steganography Method Using Integer Wavelet Transform

Metamorphosis of High Capacity Steganography Schemes

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Steganography: A Security Model for Open Communication

CSCD 443/533 Advanced Networks Fall 2017

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

A Novel Information Security Scheme using Cryptic Steganography

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

Genetic algorithm for optimal imperceptibility in image communication through noisy channel

Fast Real-Time Hardware Engine for Multipoint Text Steganography

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS

The Steganography In Inactive Frames Of Voip

Appendix A. Definition of Terms

Perceptual Coding. Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

Multimedia Security: So What s the Big Deal?

A Flexible Scheme of Self Recovery for Digital Image Protection

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

Mpeg 1 layer 3 (mp3) general overview

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

INCREASED ROBUSTNESS OF LSB AUDIO STEGANOGRAPHY BY REDUCED DISTORTION LSB CODING

Transcription:

www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions Greater Noida, Uttar Pradesh 201308, India 2 Department of Information Technology, I.T.S-Management & IT Institute Ghaziabad, Uttar Pradesh 201007, India Abstract This paper is the study of various techniques of audio steganography using different algorithmis like genetic algorithm approach and LSB approach. We have tried some approaches that helps in audio steganography. As we know it is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. In steganography, the message used to hide secret message is called host message or cover message. Once the contents of the host message or cover message are modified, the resultant message is known as stego message. In other words, stego message is combination of host message and secret message. Audio steganography requires a text or audio secret message to be embedded within a cover audio message. Due to availability of redundancy, the cover audio message before steganography, stego message after steganography remains same. for information hiding. Keywords: Audio data hiding, phase coding, LSB,HAS 1. Introduction The fast improvement of the Internet and the digital information revolution caused major changes in the overall culture. Flexible and simple-to-use software and decreasing prices of digital devices (e.g. portable CD and mp3players, DVD players, CD and DVD recorders, laptops, PDAs) have made it feasible for consumers from all over the world to create, edit and exchange multimedia data. Broadband Internet connections almost an errorless transmission of data helps people to distribute large multimedia files and make identical digital copies of them. In modern communication system Data Hiding is most essential for Network Security issue. Sending sensitive messages and files over the Internet are transmitted in an unsecured form but everyone has got something to keep in secret. Audio data hiding method is one of the most effective ways to protect your privacy. Encoding secret messages in audio is the most challenging technique to use when dealing with Steganography. This is because the human auditory system (HAS) has such a dynamic range that it can listen over. To put this in perspective, the (HAS) perceives over a range of power greater than one million to one and a range of frequencies greater than one thousand to one making it extremely hard to add or remove data from the original data structure.the only weakness in the (HAS) comes at trying to differentiate sounds (loud sounds drown out quiet sounds) and this is what must be exploited to encode secret messages in audio without being detected. There are two concepts to consider before choosing an encoding technique for audio. They are the digital format of the audio and the transmission medium of the audio. There are three main digital audio formats typically in use. They are Sample Quantization, Temporal Sampling Rate and Perceptual Sampling. Sample Quantization which is a 16-bit linear sampling architecture used by popular audio formats such as (.WAV and. AIFF). Temporal Sampling Rate uses selectable frequencies (in the KHz) to sample the audio. The last audio format is Perceptual Sampling. This format changes the statistics of the audio drastically by encoding only the parts the listener perceives thus maintaining the sound but changing the signal. This format is used by the most popular digital audio on the Internet today in ISO MPEG (MP3). Transmission medium (path the audio takes from sender to receiver) must also be considered when encoding secret messages in audio.

www.ijcsi.org 403 2. Methods of hiding various types of information There are numerous methods used to hide information inside of Picture, Audio and Video files. The two most common methods are phase coding, LSB. 2.1 Phase coding Phase coding substitutes the phase of an initial audio segment with a reference phase that represents the hidden data. This can be thought of, as sort of an encryption for the audio signal by using what is known as Discrete Fourier Transform (DFT), which is nothing more than a transformation algorithm for the audio signal. Human Auditory System (HAS) can t recognize the phase change in audio signal as easy it can recognize noise in the signal. The phase coding method exploits this fact. This technique encodes the secret message bits as phase shifts in the phase spectrum of a digital signal, achieving an inaudible encoding in terms of signal-to- noise ratio. Phase coding addresses the disadvantages of the noise-inducing methods of audio steganography. Phase coding relies on the fact that the phase components of sound are not as perceptible to the human ear as noise is. Rather than introducing perturbations, the technique encodes the message bits as phase shifts in the phase spectrum of a digital signal, achieving an inaudible encoding in terms of signal-to-perceived noise ratio. Phase differences between adjacent segments are calculated. Phase shifts between consecutive segments are easily detected. In other words, the absolute phases of the segments can be changed but the relative phase differences between adjacent segments must be preserved. Therefore the secret message is only inserted in the phase vector of the first signal segment as follows: A new phase matrix is created using the new phase of the first segment and the original phase differences. Using the new phase matrix and original magnitude matrix, the sound signal is reconstructed by applying the inverse DFT and then concatenating the sound segments back together. To extract the secret message from the sound file, the receiver must know the segment length. The receiver can then use the DFT to get the phases and extract the information. One disadvantage associated with phase coding is a low data transmission rate due to the fact that the secret message is encoded in the first signal segment only. This might be addressed by increasing the length of the signal segment. However, this would change phase relations between each frequency component of the segment more drastically, making the encoding easier to detect. As a result, the phase coding method is used when only a small amount of data, such as a watermark, needs to be concealed. 2.2 Least Significant bit Phase coding is explained in the following procedure: The original sound signal is broken up into smaller segments whose lengths equal the size of the message to be encoded. A Discrete Fourier Transform (DFT) is applied to each segment to create a matrix of the phases and Fourier transform magnitudes. Least significant bit (LSB) coding is the simplest way to embed information in a digital audio file. By substituting the least significant bit of each sampling point with a binary message, LSB coding allows for a large amount of data to be encoded. Among many different data hiding techniques proposed to embed secret message within audio file, the LSB data hiding technique is one of the simplest methods for inserting data into digital signals in noise free environments, which merely embeds secret message-bits in a subset of the LSB planes of the audio stream.

www.ijcsi.org 404 This proposed system is to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safe manner. This proposed system will not change the size of the file even after encoding and also suitable for any type of audio file format. Encryption and Decryption techniques have been used to make the security system robust. Low-bit encoding embeds secret data into the least significant bit (LSB) of the audio file. The channel capacity is 1KB per second per kilohertz (44 kbps for a 44 KHz sampled sequence). This method is easy to incorporate. 3. LSB Coding Sampling technique followed by Quantization converts analog audio signal to digital binary sequence Fig. 3 Sampling of the Sine Wave followed by Quantization process. In this technique LSB of binary sequence of each sample of digitized audio file is replaced with binary equivalent of secret message. For example if we want to hide the letter A (binary equivalent 01100101) to an digitized audio file where each sample is represented with 16 bits, then LSB of 8 consecutive samples (each of 16 bit size) is replaced with each bit of binary equivalent of the letter A. 4. Genetic Algorithm Approach According to the figure above it shows, there are four main steps in this algorithm. 4.1 Alteration At the first step, message bits substitute with the target bits of samples. Target bits are those bits which place at the layer that we want to alter. This is done by a simple substitution that does not need adjustability of result be measured. 4.2 Modification In fact this step is the most important and essential part of algorithm. All results and achievements that we expect are depending on this step. Efficient and intelligent algorithms are useful here. In this stage algorithm tries to decrease the amount of error and improve the transparency. For doing this World Academy of Science, Engineering and Technolog stage, two different algorithms will be used. One of them that is more simple likes to ordinary techniques, but in aspect of perspicacity will be more efficient to modify the bits of samples better. Since transparency is simply the difference between original sample and modified sample, with a more intelligent algorithm, I will try to modify and adjust more bits and samples than some previous algorithms. If we can decrease the difference of them, transparency will be improved. There are two example of adjusting for expected intelligent algorithm below. Sample bits are: 00101111 = 47 Target layer is 5, and message bit is 1 Without adjusting: 00111111 = 63 (difference is 16) After adjusting: 00110000 = 48 (difference will be 1 for 1 bit embedding) Sample bits are: 00100111 = 39 Target layers are 4&5, and message bits are 11 Without adjusting: 00111111 = 63 (difference is 24) After adjusting: 00011111 = 31 (difference will be 8 for 2 bits embedding) 5. Verification In fact this stage is quality controller. What the algorithm could do has been done, and now the outcome must be verified. If the difference between original sample and new sample is acceptable and reasonable, the new sample will be accepted; otherwise it will be rejected and original sample will be used in reconstructing the new audio file instead of that Fig. 1 Approach Diagram

www.ijcsi.org 405 6. Reconstruction The last step is new audio file creation. This is done sample by sample. There are two states at the input of this step. Either modified sample is input or the original sample that is the same with host audio file. It is why we can claim the algorithm does not alter all samples or predictable samples. That means whether which sample will be used and modified is depending on the status of samples (Environment) and the decision of intelligent algorithm. 7. Literature Review and future scope In today s world, we often listen a popular term Hacking. Hacking is nothing but an unauthorized access of data which can be collected at the time of data transmission. With respect to steganography this problem is often taken as Steganalysis. Steganalysis is a process in which a steganalyzer cracks the cover object to get the hidden data. So, whatever be he technique will be developed in future, degree of security related with that has to be kept in mind. The majority of today s steganographic systems uses multimedia objects like image, audio, video etc as cover media because people often transmit digital pictures over email and other Internet communication. In a computer-based audio steganography system, secret messages are embedded in digital sound. The secret message is embedded by slightly altering the binary sequence of a sound file. Existing audio steganography software can embed messages in WAV, AU, and even MP3 sound files [22]. Embedding secret messages in digital sound is usually a more difficult process than embedding messages in other media, such as digital images. In order to conceal secret messages successfully, a variety of methods for embedding information in digital audio have been introduced. These methods range from rather simple algorithms that insert information in the similar to watermarks on actual paper and are sometimes used as digital watermarks. Masking images entails changing the luminance of the masked area. The smaller the luminance change, the less of a chance that it can be detected. Masking is more robust than LSB insertion with respect to compression, cropping, and some image processing. Masking techniques embed information in significant areas so that the hidden message is more integral to the cover image than just hiding it in the noise level. This makes it more suitable than LSB with, for instance, lossy JPEG images. We use a more powerful GA (Genetic Algorithm) based LSB (Least Significant Bit) Algorithm to encode the encrypted message into audio data. Here encrypted message bits are embedded into random and higher LSB layers, resulting in increased robustness against noise addition. On the other hand, GA operators are used to reduce the distortion. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well. 8. Conclusion In this paper we have introduced a robust method of imperceptible audio data hiding. This system is to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safe manner. This proposed system will not change the size of the file even after encoding and also suitable for any type of audio file format. Thus we conclude that audio data hiding techniques can be used for a number of purposes other than covert communication or deniable data storage, information tracing and finger printing, tamper detection. As the sky is not limit so is not for the development. Man is now pushing away its own boundaries to make every thought possible. So similarly these operations described above can be further modified as it is in the world of Information Technology. References [`1] Cvejic N. and Seppänen T. Increasing the capacity of LSB based audio steganography, Proc. 5th IEEE International Workshop on Multimedia Signal Processing, St. Thomas, VI, December 2002, pp. 336-338. [2] Westfeld A. and Pitzmann A. "Attacks on Steganographic Systems". Lecture Notes in Computer Science, vol. 1768, Springer-Verlag, Berlin, pp. 61-75, 2000. [3] Fridrich, Jessica and others. Steganalysis of LSB Encoding in Color Images. Proceedings of the IEEE International Conference on Multimedia First Author She is having experience of nine years in academics. She is working as Assistant Professor in Department of Information Technology at I.E.C, She has done M.Tech(IT). Second Author She is having experience of more than six years in academics. She is working as Assistant Professor in Department of Information Technology at I.T.S Mohan Nagar, She has published number of papers in proceedings

www.ijcsi.org 406 of national and international conferences and refereed journals. She has done M.Tech(IT),Msc(IT). She has received Best Faculty Award at I.T.S. Her research interest includes networking and databases.