Sie sind auf Seite 1von 4

International Journal of Scientific Research and Engineering Studies (IJSRES)

Volume 1 Issue 3, September 2014


ISSN: 2349-8862

Design And Development Of Embedded System Based Multimedia


Steganography

N. Spandana

Mr. M. Jagadeesh Babu

E.C.E.(M.N.E.)
M.I.T.S. Madanapalli, India

Associate Professor, E.C.E. M.I.T.S.

Abstract: Steganography is a method of hiding sent


messages in the cover media in all types of multimedia data
formats such as audio, image etc., In this project we deal
with Audio Steganography in which the data can be sent
without any suspension. Our embedded system uses ARM9
micro controller which is 32 bit controller. The main aim of
this project is to transfer a hidden data through audio files
safely without being visible to others. Here by using this
technique the data can be sent through the audio files
without being visible by encrypting and decrypting the data.
In order to encrypt and decrypt the data we use the
Polynomial Method. Polynomial Method is used for public
key encryption and it is used to transfer data secure. We use
Steganography
for
security
purpose.
By
using
Steganography the hidden media file can be sent very
accurately and very fast from the sender to the receiver.
There are many techniques based on Steganography. In this
paper we use the least significant Bit Steganography. It is
one of the techniques in which the least significant bit is
replaced by a data bit. We use MATLAB for coding purpose
and implementing it on 32 bit micro controller.

message that is proposed does not magnetize the curiosity to


itself as a purpose of analysis. The unbreakable noticeable
messages provoke interest and convict in the places where
ever the encryption is illicit. However the cryptography is a
process of defending the filling of the point and
Sreganography is alarmed with the reality of hiding as the
message is sent secretly along with hiding the contents of the
message.
The process of Steganography is shown below.
Cover
media

Stego
system
encoder

Secret
message

channel

Security
key

Keywords:- Steganography, Least significant Bit, Data


hiding.

I.

Secret
message

INTRODUCTION

Stego
system
decoder

A. STEGANOGRAPHY
The process of hiding a message, an image, or a file in
any media is known as Stganography. Here the media may be
either a plain text, an audio, or a video. The word
Steganography is derived from an Ancient Greek words
STEGANO and GRAPHIA. The word STEGANO means
covered and GRAPHIA means writing. Johannes
Trithemius was the first person to use this term. He used this
term first in his book known as Steganographia, which is a
thesis on Steganography as well as Cryptography. Basically
the messages that are hidden will appear either on images,
audio, or any cover text. Some of the achievements on
Steganography that do not have the type of security through
irrelevance, while the schemes of Steganography that are keydependent bond on to The Kerckhoffs principle. The main
plus of Steganography than cryptography is the secret
www.ijsres.com

Cover
media
Figure 1: Steganographic process
B. AUDIO STEGANOGRAPHY
In this work we deal with Audio Steganography. in this
process a message is hidden secretly in the audio. Generally in
Steganography cover media is used to hide the message. Here
in this case of Audio Steganography, the cover media is used
to hide the message and this message is known as encrypted
message. This encrypted message is based on either the public
Page 55

International Journal of Scientific Research and Engineering Studies (IJSRES)


Volume 1 Issue 3, September 2014
ISSN: 2349-8862
key or private key encryption algorithms. This two algorithms
can be differentiated in an easiest way that is to remember the
secrecy of message not only the contents but also the simple
existence of the message.
The figure below shows the generic Audio
Steganographic System.

EM
BED
D
AN
D
AU
DIO
PRO
CES
SIN
G

SE
CR
ET
DA
TA

NE
T
W
OR
K

K
E
Y

community. Due to this that all the hardware components can


be used with poise without fear as that any one the day the
vendor may stop the driver support for the product line. Linux
also supports a number of hardware architectures. No other
Operating systems provide this level of probability other than
this.
Typical architecture of an embedded linux system is
shown below.
APPLICATIONS

EM
BED
D
AN
D
AU
DIO
PRO
CES
SIN
G

LIBRARIES

Linux kernel
HIGH LEVEL ABSTRACTIONS

FILE
NETWORK
SYSTEMS PROTOCOLS

SE
CR
ET
DA
TA

LOW-LEVEL INTERFACE

HARDWARE
Figure 2: Generic Audio Steganographic System

II. OBJECTIVE OF THE PROJECT


The main aim of this project is to design a Steganography
system for audio files. This is a fine art of of hiding either a
text or an image or file in the other message, image or file.
Here a PC is used to check the output. In the output, that
appears on the screen there will be the secret message which is
hidden. And in order to perform the whole operation
Embedded systems is used. And the hardware that is used is
Raspberry pi board and the software tool used is Qt. The
operating systems that is used is Linux. These are all used in
the overall performance of the process. The main aim of this
project is to send the message through the audio files secretly.
And in order to encrypt or decrypt the file a key is used.

III. HARDWARE SUPPORT

Figure 3: Typical structure of an embedded Linux system

IV. BASIC HARDWARE SETUP OF A RASPBERRY


PI

Figure 4: Raspberry pi Board

Basically Linux supports different types of hardware


platforms and devices. This is known as Hardware support.
But up to now many number of vendors have not provided
linux drivers. Because of this an outside progress is generated,
but still a more progress is required. This is generated since a
number of drivers are executed and maintained by linux
www.ijsres.com

Raspberry pi was developed by Raspberry pi foundation


in the UK with the zeal of providing the teaching of basic
computer science in educational institutions. This raspberry pi
board is a credit card sized single board computer. It was
manufactured in two board configurations by licensed
manufactured deals along with RS components, Egoman and

Page 56

International Journal of Scientific Research and Engineering Studies (IJSRES)


Volume 1 Issue 3, September 2014
ISSN: 2349-8862
Network element 14 (PremierFarnell). These three companies
sell Raspberrypionline.

V. WORKING PRINCIPLE OF THE PROJECT


In this section the complete description is given on the
proposed system architecture. Here a Raspberry Pi board is
used as platform. Once all the devices are connected
successfully, then power up the device. And if once the device
is power up then the device starts booting from the flash, first
it loads the linux to the device and then initialize all the
drivers and the core kernel. After the kernel is initialized, it
first checks whether all the devices are working properly or
not. Then after it loads the file system and starts the startup
scripts for running necessary processes and daemons. Then
finally it starts the main application.
When the application starts running it first checks all the
devices and resources that it needs are available or not. Then
after it checks the connection with the devices and provides
control to the user.
The GUI that is used for the encryption has the following
options:
Cover the button for loading the COVER file from
the USB file browser.
Secret button for loading the secret file (that is to be
hidden) from the USB file browser.
Password field for entering the secret key of 8characters.
Output field for giving the result file name.
Stegano push button for embedding the data.
The embedding algorithm almost works as follows:
The Graphical User Interface for the decryption has
the next alternatives.
Browse button for giving path of encrypted file.
Encrypted file field for loading file name.
Password field for entering the secret key of 8characters.
Decrypt button for decrypting the hidden data.
On hiding the data file we need to go for encryption GUI
application. Click on the cover button in order to give the
cover data (visible data of .wav, .png and .jpg) format. Then
click on the secret button to load the data that is to be hidden
into the cover file. Give the secret key of (8-char) and
executable name in next field.
Now then by clicking on the Stegano button, the secret
file will be inserted into the cover data with AES algorithm
and the result will be stored as the output file name. As well as
for the decryption of the data, there is a need to mention the
encrypted file name and provide the eight character key
mentioned for the file. Then after that by clicking on the
decrypt button, the secret file will be extracted to USB path. In
this way we are implementing Audio and Image
Steganography system.
The experimental setup of the project is shown below.

www.ijsres.com

he pictorial representation of the step by step procedure that


appears on the screen of the PC is shown below. A text file of
11945 bytes is embedded into an audio file of 2079526 bytes
and the result is shown below.

VI. CONCLUSION
The project AUDIO STEGANOGRAPHY has been
successfully designed and tested. It has been developed by
integrating features of all the hardware components and
software used. Presence of every module has been reasoned
out and placed carefully thus contributing to the best working
of the unit. Secondly, using highly advanced ARM11 board

Page 57

International Journal of Scientific Research and Engineering Studies (IJSRES)


Volume 1 Issue 3, September 2014
ISSN: 2349-8862
(Raspberry Pi) and with the help of growing technology the
project has been successfully implemented.

REFERENCES
[1] Neil F.Johnson, Sushil Jajodia, Exploring Steganography;
Seeing the Unseen, Computer, vol.31, no 2,pp. 26-34,
feb.1998.
[2] R.Chandramouli, Nasir Memon, Analysis of LSB Based
Image Steganography Techniques Proc. IEEE ICIP 2001
pp 1019-1022.
[3] Li Zhi Sui Ai Fen , Detection of Random LSB Image
Steganography Techniques proc. IEEE 2004 pp 21132117.

www.ijsres.com

[4] Nedeljko Cvejic, Algorithms for audio watermaking and


Steganography, Oulu University Press, Oulu 2004, pp.4042.
[5] Ali Al-Haj, Ahmad Mohammadand Lama Bata, DWTBased Audio watermarking, The International Arab
journal of information technology, vol.8, No.3, july 2011,
pp.326-333.
[6] I.J.Cox, M.L.miller, J.A.Bloom, J.Fridricand Digital
water marking and Steganography, 2nd edition, Morgan
Kaufmann, 2008, pp.31.
[7] Y.K.Lee, L.H.Chen, High capacity image Steganography
model, proc.Inst.Elect.Eng. Vis. Image, Signal Processing
147 (3) (2000). Pp.288-294.

Page 58

Das könnte Ihnen auch gefallen