Beruflich Dokumente
Kultur Dokumente
CHAPTER 1
INTRODUCTION
Page | 1
1.1 BACKGROUND:
Steganography is the art and science of writing hidden messages in such a
way that no one apart from the intended recipient knows of the existence of the
message; this is in contrast to cryptography, where the existence of the message
itself is not disguised, but the content is obscured. The word Steganography is
of Greek origin and literally translated it means covered writing:
Steganos(covered) graphein (writing).With the advent of digital media,
steganography has come to include the hiding of digital information within
digital files.
1.2 RELEVANCE:
The information communicated comes in numerous forms and is used in many
applications. In a large number of these applications, it is desired that the
communication to be done in secrete. Such secrete communication ranges from
the obvious cases of bank transfers, corporate communications, and credit card
purchases, on down to a large percentage of everyday email. Steganography is
the ancient art of embedding a secret message into a seemingly harmless
message. Direct sequence spread spectrum method used to hide data in audio
file. Spread Spectrum method is known to be very robust, but as consequence
the cost very large implementation is relatively complex and the information
capacity is very limited.
Page | 2
1.3 LITERATURESURVEY :After going through many magazines and websites we got the idea aboutPerformance
Analysis of Audio Signal For Promoting Global Cyber Security Using Data Hiding
Techniques
On searching IEEE papers the following information is collected:
The paper entitled LSB Based Audio Steganography Method Based On Lifting
Wavelet.gives following information.
In this paper we present a novel method for digital audio steganography where
encrypted convert data is embedded into the wavelet coefficients of host audio signal. this
method avoid extraction error we use lifting wavelet transform. but this method is not robust.
It is very sensitive to any kind of filtering or manipulation of the stego audio. We calculated
hearing threshold in time domain and used it embedding threshold
The Paper entitled A Robust Digital Watermarking Scheme For Media Files (
IEEE2006) gives following information .
In this paper present a robust mechanism for digital watermarking in media files .
we have combined cryptographic and steganographic operation so that a violator can not
easily change the copyright information hidden inside the file. this method robust. but it is
difficult to implemented .
The Paper entitled Intelligent Processing : An Approch of audio steganography
(IEEE2011)
This paper provides implementation of two level encryption of user data combining
two areas of network security ,cryptography and steganography .the combination of LSB
techniques with XOR ing method is described in this paper ,whichgives additional level of
security. It gives great security . It is very sensitive to any kind of filtering or manipulation of
the stego audio.This paper can be used to increase the capacity as well as to improve the
confidentiality of audio steganography
Page | 3
1.4 Motivation
Today, steganographic techniques are often used by copyright holders who wish to combat
privacy and theft. Images, video, and music can be encoded with information that can be
used to identify the work as being the property of an individual or corporation. These
encodings are often called watermarks. Watermarked media can be distributed on the internet
while allowing copyright holders to be able to maintain their intellectual property.
Commercially available watermarking technologies use robust techniques to encode
information that are resistant to a variety of attacks on the message. Such attacks may include
cropping or distorting the image, or modifying color information to destroy any hidden
information that could possibly exist in a given signal.Steganography has seen exponential
usage since the 1990s. Stego algorithm downloads are now available on the Internet as
shareware. Governments, military, businesses, and private citizens all over the world now
use steganography for security and privacy purpose. The music and movie industries
continually devise new material control methods such as earmarking early distribution of
movie screenings via steganography. In traitor tracing each copy of a given movie contains
a digital watermark with a unique serial number and the movie distributor knows to whom
each serial number has been delivered. When a copy becomes compromised, the movie
company only needs to extract the serial number from the copy in question and start tracing it
to the point of origin. In broadcast monitoring broadcast detectors are used to extract the
Page | 4
watermark of a given file or medium and report to the broadcasting events to notify the
owner or distributor of broadcast status (medium was played, time and date).
To develop software Steganography which will hide secrete data like text message in
audio,, with the help of secrete key.
In encoding process we must get the audio file back, such that, viewer of audio
should not come to know that data is hidden behind that audio file.
Page | 5
a (rather large) cover file and embedding the (rather short) secret
message into this file. The result is an innocuous looking file (the stego file) that contains the
secret message. Now, it is gaining new popularity with the current industry demands for
digital watermarking and fingerprinting of audio and video. There are three different aspects
in information-hiding systems contend with each other: capacity, security and robustness.
Capacity refers to the amount of information that can be hidden in the cover medium,
security to an eavesdroppers inability to detect hidden information and robustness to the
amount of modification the stego medium can withstand before an adversary can destroy the
hidden information. In the field of steganography, some terminology has been developed and
is as follows. The term cover is used to describe the original, innocent message, data,
audio, still, video and so on. The information to be hidden in the cover data is known as the
embedded ddata or secret data. The stegodata is the data containing both the cover
signal and the secrete information embedded using key. Logically, the process of putting
the hidden or embedded data, into the cover data, is sometimes known as embedding.
Occasionally, especially when referring to image steganography, the cover image is known
as the container.
. Also, the following tools are used: Hide4PGP
MP3Stego
JP-hide
GifshufflE
EzStego
CHAPTER 2
THEORETICAL DETAILS AND ANALYSIS
Page | 7
2.1 Introduction
The whole seminar report is divided into appropriate number of chapters. The brief
introduction of each chapter is described below.
.Chapter 1:In this chapter we are introducing our project through previous work, history
Relevance and literature survey.
Chapter 2: In this chapter theoretical details and analysis of project is discussed.
Section 2.2 introduction and discussion for steganography is given
Section 2.3 categories of steganography are given.
Section 2.4 Audio algorithm discussed.
Chapter 3: Flowcharts, algorithms and block diagrams of project is discussed.
Chapter 4: Results of project and discussion.
Chapter 5: In this chapter conclusions are discussed.
Chapter 6:Futurescope
2.2 STEGANOGRAPHY
Steganography is the practice of hiding private or sensitive information within something that
appears to be nothing out to the usual. Steganography is often confused with cryptology
because the two are similar in the way that they both are used to protect important
information. The difference between two is that steganography involves hiding information
so it appears that no information is hidden at all. If a person or persons views the object that
the information is hidden inside of he or she will have no idea that there is any hidden
information, therefore the person will not attempt to decrypt the information.
What steganography essentially does is exploit human perception, human senses are not
trained to look for files that have information inside of them, although this software is
available that can do what is called Steganography. The most common use of steganography
is to hide a file inside another file.
History of Steganography
Page | 8
Page | 9
enables the original data to be recovered if data bits are damaged during transmission
.Frequency hopping is when a broad slice of the bandwidth spectrum is divided in many
possible broadcast frequencies. In general, frequency-hopping devices use less power and are
cheaper, but the performance of direct sequence spread spectrum systems is usually better
and more reliable.
D) DISTORTION TECHNIQUES
The distortion method of steganography creates a change in a cover object to hide
information .The secret message is recovered when the algorithm compares the changed
Page | 11
A. DCT
DCT (discrete cosines transform) is used in JPEG compression. Embedding in DCT domain
is simply done by altering the DCT coefficients, for example by changing the least
significant bit of each coefficient. One of the limitation in DCT domain happened when 64
coefficients are equal to zero. Values will have an effect on the compression rate. So the
number of bit one could embed in DCT domain is less that the number of bits one could
embed by the LSB method. Also embedding capacity becomes dependent on the Image type
used in the case of DCT embedding. There are different methods for altering the DCT
coefficients that reviews of stego.
B: Frequency Domain
Another transform domain for embedding is frequency domain. They first decor relate the
image by scrambling the pixels randomly, which in effect whitens the frequency domain of
the image and increases the number of transform coefficients in the frequency domain thus
increasing the embedding capacity. Note the result is a salt and pepper image.
Page | 12
Page | 13
information about the origin of the file and the processing it has undergone. It is permissible
for WAVE files to include non-standard chunk types. Standard-conforming software will
simply skip over chunks that it does not know how to handle.
Content
Magic number: RIFF/RIFX
WAVE chunk size = file size 8
WAVE identifier: WAVE
Format chunk identifier: fmt<space>
Format chunk size: 16
Sound format code
Number of channels
Sampling rate
Average data rate in bytes per second
Bytes per sample*
Bits per sample*
Chunk identifier: data
Chunk length in bytes: N
Audio data
Offset
0
4
8
12
16
20
22
24
28
32
34
36
40
44
Page | 15
CHAPTER 3
ALGORITHMS AND BLOCK DIAGRAM
Page | 16
3.1AUDIO STEGNOGRAPHY
3.1.2 ENCODER
1. Select available original .wav file at transmitter side.
2. Read the .wav audio file using wavread function. its samples amplitude value in
variable wave and frequency in fs.
3. Transform audio cover object in time domain into frequency domain .
4. Now information signal (message signal) convert into binary format.
5. Take PN sequence . frequency of PN sequence must be greater than frequency of
message signal .
6. Modulate message signal & PN sequence .length message signal must be equal to length
of PN sequence .output of modulators is message signal with noise.
7. After Transform message signal with noise in time domain into frequency domain .
8. Add the FFT of audio signal and FFT of message signal with noise.gives FFT of audio
signal containing message.
9. Take the IFFT of audio signal containing message and obtain stego audio . Stego audio
means combining the cover audio and the embedded message
10. Check parameters PSNR, MSE, BER.
3.1.2 DECODER
1. Select available stego .wav file at receiver side
2. Read the .wav audio file (stego audio)using wavread function. its samples amplitude
value in variable wave and frequency in fs.
3. Transform stego audio in time domain into frequency domain
4. Subtraction of stego audio of FFT and original audio of FFT. to obtain FFT message
signal with noise.
5. Take the IFFT of message signal with noise.
6. Then demodulate message signal with noise and same PN sequence . obtain original
message signal in binary format.
7. Convert binary format into character format .we obtain original message .
Page | 17
Page | 18
MESSAGE
AUDIO
FILE
ENCODER
STGO
AUDIO
PN
SEQUENCE
RECOVER
AUDIO
DECODER
COMPUTER
FORENSICS
RECOVER
MESSAGE
Page | 19
CHAPTER 4
RESULTS AND DISCUSSION
Page | 20
4.1RESULTS:
Data security is provided by hiding secrete data behind cover audio file using
steganography technique and fake or original stego-audio is detected, using computer
forensic technique. We have worked on hiding text behind audio files extracted
from an WAV file using least spread spectrum method for audio steganography. We
have designed the software for the project in MATLAB
4.2
Page | 22
4.6
ADVANTAGES
1. As human auditory system to recognize the change in audio is smaller than visual
system, we hide secrete text in audio file.
2. At receiver user has to enter the secret key which will be known to the intended user
only. This is more secure.
3. It also has user friendly GUI which is easy to handle.
4.7 APPLICATIONS
1. Used for the secure data transmission
2. Used in the business environment for transmitting the secret business plan
3. This software can be used by the scientists for transmitting secret chemical
Formula
4. Common man can use this software for keeping some secret documents like
passwords or confidential data
5. used for military areas.
Page | 23
CHAPTER 5
CONCLUSIN
Page | 24
This method proved very robust against audio manipulation and very safe with the resulting
noise is quite small but cost that take far more expensive than LSB method .Implementation
is relatively complex , and the information capacity is very limited.
This Method used are audio cropping ,audio inversion ,overwriting the information ,and
changing the format
Page | 25
CHAPTER 6
FUTURE SCOPE
Page | 26
1. The emergence of the Internet and the World Wide Web has created new areas for
Steganography to expand to. The music industry can substantially gain from
Steganography in the form of Digital Watermarking. The music industry has lost
significant revenue due to a drop in sales. This drop has been correlated with the
increased exchange of music through peer to peer technologies such as KaZaa and
iMesh. Digital watermarking can be implemented to identify legitimately purchased
music from music that has not been acquired through legitimate channels. The music
industry can then use that data to implement controls to prevent those files from being
played. This will involve cooperation with software and hardware vendors to allow
only licensed files to be played
2. Steganography is more secure technique than any other data hiding techniques
available. Due to time and computing limitations, we could not explore all facets of
steganography and detection techniques. As you saw, we studied the power in our
pictures to test for hidden data. Another method which we were unable to explore was
to analyze the noise of the pictures. Adding hidden data adds random noise, so it
follows that a properly tuned noise detection algorithm could recognize whether or
not a picture had steganographic data or not.therefore continuous efforts have been
made to increase the robustness of steganographic images.
3. Individuals who want to protect their information and communication messages can
also use Steganography to augment existing encryption options. As hackers and other
individuals who want to get other individuals data get more sophisticated, the private
citizen needs to have more methods to protect themselves.
4. Terror organizations have access to the same technologies available to private
individuals. This in turn poses a challenge to governments and military commanders.
Steganography can provide terror organizations a vehicle in which to transmit
information unnoticed. Governments and military commanders are aware of this
situation and could in turn pose restrictions on the availability of advanced
technologies to its citizens. A technology such as Steganography fits very well with
the needs of terror organizations. However it is unclear as to what extent terrorists
have used or will use this technology.
5. The military that has been a major user of Steganography will continue to use it in
more advanced and complex methods. In a military operation the battlefield
commander must ensure that his commands are relayed in the most secure method
possible. In addition battle field intelligence must make its way from the front lines
back to the commander is an equally secure mechanism. The military has used both
cryptography and Steganography to protect its information. We foresee that this will
still continue to be the case, however digital Steganography is an area that the
military can further expand on.
Page | 27
REFERENCES:[1]
[2]
W. C. Kuo, L.C. Wuu, C.N. Shyi, S.H. Kuo, A Data Hiding Scheme with High
Embedding
Based
on
Direction
Method,2009 Conference on Hybrid Intelligent Systems (HIS09), Aug. 2009, pp. 69-72.
[3] David Wheelers, Y. R. Wang, and C. C. Chang, Audio Steganography Using High
Frequency Noise Introduction, IIHMSP 2007. Third International Conference on Volume
1, Issue, 26-28 Nov. 2007 pp.497 500
[6]
[7]
[8] Weiwei Liu, Yuewei Dai, ShiguoLianRobust Audio Steganography Using Direct
Sequence Spread Spectrum -2011.
[9]
EMD
Domain-2012978-0-7695-4789-3/12
2012
IEEEDOI
[10]
Capacity and EMD-based Image Steganography Scheme in Spatial Domain.-2013 9781-4673-5634-3/132013 IEEE
WIKIPEDIA, INTERNET.
Website:
1. Sonali Gupta, 2005, All about steganography, available at:
http://palisade.plynt.com/issues/2005apr/steganography
Page | 29