Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech Department of Computer Science, BGIET Sangrur India) (Asst Prof. of CSE Department BGIET Sangrur India) ABSTRACT - In this proposed system of audio providers on the World Wide Web which is used for steganography we have implemented a new scheme hiding the data in the digital media etc [1]. based on mel frequency components. The mel In information hiding, the information is embedded in frequency cepstrum coefficients are used for finding digital media that is distributed and can be used. the unique feature audio data in audio file. The Information hiding differs from the crypgraphy in returned features provide us with highly robust and which only authorized user can access the information high end features with low invariance. We have used and that can be easily decrypted as compared this property of MFCC in order detect high information hiding [1]. bandwidth free space location in the sound data and Information Hiding has becomes an important role in a have embedded the encrypted watermark image data several application such as digital audio, video and in these MFCC components. The proposed scheme images that are hidden in other data protect from the works increase the PSNR values and reduce the unauthorized user [1]. error rate of hiding the data in the image and thus II. improves the sound quality and makes it look original. STEGANOGRAPHY Steganography is the form of coverting the data in The effect of MFCC is positive as the watermark another data such as cover medium by using the extracted from this proposed scheme shows high various correlation the original watermark and also the steganographic methods whereas crypgraphy converts the data in encrypted from resistance wards various attacks has also been i.e. cipher text. Generally, we apply the steganography improved, the attacks degrade the watermark due method where the crypgraphy is not effective []. high payload or bigger watermark size, the probability The aim of steganography is sending the information of extraction of watermark or steganograph data secretly between the sender and recipient [3]. becomes higher. Terms used in Steganography: - Keywords Steganography, Information hiding, Cover file: - is also known as carrier file or envelope Audio Steganography, MFCC which contains the hidden text such as human voice speech, music signal with different duration are gathered I. []. INTRODUCTION Data hiding plays an important role for security Stego key: - is a key which is used for embedding the purposes like in military areas or marketing strategies. data []. Information hiding is a type of steganography which Embeddor: is a block that embeds the data in the converts the data in digital media such as image, cover file []. text, audio and video. In terms of privacy, information Stego signal: - after embedding the data in the cover hiding is used that provides the anonymous for content object, it is called stego signal. It is not possible 1
Journal Science ISSN: 39-7157, 015 ISSN: 39-7157, 1 015 differentiate between the cover signal and stego signal Extracr/ Detecr: - is a block that extracts the data []. from the cover file []. Fig 1 Terms are used in steganography III. are hidden in the digital audio file. The secret AUDIO STEGANOGRAPHY Audio Steganography is the method of embedding the messages are embedded by replacing the binary information in sound files like wav file. In computer sequence of the audio file. The formats of audio based audio steganography system, private messages steganography are wav, au and mp3 sound [5]. Fig Secret message behind MP3 There are three main digital audio formats typically in views. It maintains the sound but the signal is changed. use: - Today, this format is used on the internet [6]. 1. Sample Quantization: - is a 16-bit linear sampling architecture which is used by most popular audio IV. formats such as.wav [6]. TECHNIQUES of AUDIO STEGANOGRAPHY. Temporal Sampling: - uses only few selectable There are various different techniques that have been frequencies e.g. 8 khz, 9.6 khz, 10 khz, 1 khz, 16 used for hiding the secret data in audio signals such khz,.05 khz and.1 khz. sample the audio. In that an unauthorized user cannot able detect that this selected part of the frequency range, sampling rate message. The techniques are: puts an upper bound. So the higher sampling rate, higher Parity Coding: - Parity coding is used as a robust will be the usable data space [6]. audio steganographic method. In this method, splits 3. Perceptual Sampling: - it changes the properties of the signal in the different samples instead of the the audio carefully by encoding only the parts the user decomposing the signal in the discrete samples and then hides each bit of private data within the parity bit.
Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 When the parity bit of the given areas does not match than choice embed the secret data. Figure illustrates with the data bit be embedded, they it flips one of the parity coding process [7]. the bit of the LSB. So the sender can choose more Fig 3 Parity coding LSB (Least Significant Bit) Coding: - LSB information across the frequency spectrum of the audio algorithm is used replaces the least significant bit signal. This is similar a system which uses an with some bytes of the cover object so as embed the implementation of the LSB that spreads the message number of bytes which contains the secret message bits randomly over the entire sound file. However, [7]. unlike LSB coding, the Spread Spectrum method Echo Hiding: Echo hiding technique embeds secret spreads the secret information over the frequency information in a sound file by introducing an echo in spectrum of the sound file using a code which is the discrete signal. Echo hiding has advantages of independent of the actual signal. As a result, the final providing a high data transmission rate and superior signal occupies a bandwidth which is more than what is robustness when compared other methods [7]. actually required for transmission [7]. Spread Spectrum: - In audio steganography, the basic spread spectrum (SS) method attempts spread secret 3
Journal Science ISSN: 39-7157, 015 ISSN: 39-7157, 1 015 Jisna Anny, Sobin c.c and Sherly A.P, [10] in 01 V. LITERATURE REVIEW Fatiha Djebbar, Beghdad Ayad, Karim Abed Meraim proposes the various techniques for hiding the and Habib Hamam [8] in 01 describes the review of information. In audio steganography, audio is used as a comparative study of digital audio steganography cover media. The most common method are used for the technology. In this proposed scheme, the author audio steganography are temporal domain and transform describes the current digital audio steganographic domain techniques. The main focus on this paper is techniques and can be calculate their performance review the audio steganography in wavelet domain. For depends on robustness, security and hiding capacity the effective wavelet masking scheme, lifting scheme indicars. Another contribution of this paper is can also be used in a future work. The major drawback provide the classification of steganographic techniques of the wavelet domain is generate the high data when embedding process occurs. The technique of quality at the receiver end. The extraction process can digital audio steganography is also implemented in also be affected by even making a little change in the this paper. In this proposed system, digital audio values of the host coefficients. So, the wavelet domain steganography should also aim on better data quality at the receiver techniques and approaches are end. compared. Advantages and disadvantages of the digital audio steganography techniques are also discussed in this paper show their capabilities R.Valarmathi, M.Sc., M.Phil and G.M. Kadhar Nawaz ensure the secure communications. Also, comparisons M.C.A., Ph.D, [11] in Jan 01 describes the reviews between the different techniques are shown in this of both the techniques i.e. crypgraphy and paper. steganography. By combination of both techniques, the information is converted in encrypted form by Rimba Whidiana Ciptasari, Kyung-Hyune Rhee and using a software and then covert the encrypted Kouichi Sakurai [9] in 01 describes the combination information within an image or any kind of media of encryption and secret sharing technology which with the use of the stego key. To increases the security provides the various ownership protection schemes. In of the embedded information, both the techniques are ownership protection area, author describes the audio used. The various characteristics of the steganographic watermarking depends on the visual crypgraphy. In algorithms are defined in this paper. The most widely this proposed system, we just focus on constructing an characteristics audio ownership protection scheme increase the algorithms are transparency, capacity and robustness. used for audio steganographic security by using the discrete wavelet transform and discrete cosine transform, visual crypgraphy, and VI. PROBLEM FORMULATION digital timestamps. This method is providing the better The system used a high data embedding without robustness of the proposed scheme. In this paper, it considering the overall change in bit rate due can mostly used for the audio ownership protection change in pitch of the sound file for the parameters of scheme both an embedding, bpm of the sound file, compression intentional and incidental disrtions. The trade-off format. Also the length of the sound file is not can be reduced between the data payload and two considered as a parameter. other for superior properties such robustness as against imperceptibility and robustness while maintains the quality of the audio VII. signal. OBJECTIVES To hide the data securely without affecting the speech/sound quality the perception level. The
Journal Science ISSN: 39-7157, 015 ISSN: 39-7157, 1 015 change occurring in the signal is reduced with the letting the users know about the secret hidden data. embedding of another data in the original data. Noise is reduced due change in of bit rate in REFERENCES the audio file. The structural quality of the sound file [1] Ravi Saini and Rajkumar Yadav, A New Data Hiding Method is increased with the reference the original file and Using Pixel Position and Logical and Operation, also increases the correlation of the sound file. To Computer and Electronics Research, Volume 1, 1, June 01 improve the robustness against attacks, bit error rate [] Vipula Madhukar Wajgade and Dr. Suresh Kumar, Enhancing and also improves the peak signal--noise ratio which Data Security Using Video Steganography, is used determine the quality of the stego image Emerging Technology and Advanced Engineering, Volume 3,, after embedding the secret data. April 013 [3] Krupali V. Deshmukh and Prof. Gyankamal J. Chhajed, A Steganographic Method for Data Hiding in Binary Image using VIII. PROPOSED METHODOLOGY Edge based Grids, Int.J.Computer Technology & Applications,Vol 5 (),1369-137, 01 Reading all the given sound files in a data set. Divide it in the blocks Extracting the features of the sound or speech Research in Computer Science and Management Studies, Volume 1, file by performing the Mel Feature Space Based, ISSN: 31-778, Sep 013 spectrum decomposition. [5] Nishu Gupta and Mrs. Shailja, A Practical Three Layered [] Burate D.J. and M. R. Dixit, Performance Improving LSB Audio Steganography Technique, Advance Approach of Data Hiding Using Audio Steganography, Perform the data encryption by using fuzzy Advanced Research in Computer and Communication based coding in fuzzy logic generar that is a Engineering, Vol. 3, 7, 01 MATLAB [6] Neha Gupta and Nidhi Sharma, Hiding Image in Audio using ol Using block by block DWT and LSB, Computer Applications, embedding of the data Volume 81, No, November 013 Calculating mean of the sound file Extract the embedded data bits from the sound Hiding Using Audio Steganography A Survey, The file by using Mel frequency based data-bit Multimedia & Its Applications (IJMA), Volume 3, No.3, extraction 011 [7] Jaya ram P, Ranganatha H R and Anupama HS, Information [8] Fatiha Djebbar, Beghdad Ayad, Karim Abed Meraim and Habib Calculate the different parameters like SNR, Hamam, Comparative study of digital audio steganography PSNR, MSE values techniques, EURASIP Journal on Audio, Speech and Music Calculate tal correlation of the extracted data- Processing, 01, 01:5 bits. [9] Rimba Whidiana Ciptasari, Kyung-Hyune Rhee and Kouichi Sakurai, An enhanced audio ownership protection scheme based on Find robustness against attacks visual crypgraphy, EURASIP Journal on Information Security, 01:, 01 IX. CONCLUSION [10] Jisna Anny, Sobin c.c and Sherly A.P, Audio Steganography in Wavelet Domain A Survey, Computer As steganography is an important issue as it deals with Applications, Volume 5 No.13, 01 encryption and data security we need a scheme which [11] R.Valarmathi, M.Sc., M.Phil and G.M. Kadhar Nawaz M.C.A., covers our audio data in such a way as increase the Ph.D, Information Hiding Using Audio Steganography with encryption capability and decrease the destruction of Encrypted Data, Advanced Research in the original data. We have a proposed system for Computer and Communication Engineering, Volume 3, 1, January 01 dealing with steganography in audio files with DCT infused data embedding or data hiding so as improve the fidelity of the hidden data in ensure the complete transparency of the original data and not 5