Sie sind auf Seite 1von 29

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

CHAPTER 1
INTRODUCTION

Page | 1

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

1.1 BACKGROUND:
Steganography is the art and science of writing hidden messages in such a
way that no one apart from the intended recipient knows of the existence of the
message; this is in contrast to cryptography, where the existence of the message
itself is not disguised, but the content is obscured. The word Steganography is
of Greek origin and literally translated it means covered writing:
Steganos(covered) graphein (writing).With the advent of digital media,
steganography has come to include the hiding of digital information within
digital files.

1.2 RELEVANCE:
The information communicated comes in numerous forms and is used in many
applications. In a large number of these applications, it is desired that the
communication to be done in secrete. Such secrete communication ranges from
the obvious cases of bank transfers, corporate communications, and credit card
purchases, on down to a large percentage of everyday email. Steganography is
the ancient art of embedding a secret message into a seemingly harmless
message. Direct sequence spread spectrum method used to hide data in audio
file. Spread Spectrum method is known to be very robust, but as consequence
the cost very large implementation is relatively complex and the information
capacity is very limited.

Page | 2

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

1.3 LITERATURESURVEY :After going through many magazines and websites we got the idea aboutPerformance
Analysis of Audio Signal For Promoting Global Cyber Security Using Data Hiding
Techniques
On searching IEEE papers the following information is collected:
The paper entitled LSB Based Audio Steganography Method Based On Lifting
Wavelet.gives following information.
In this paper we present a novel method for digital audio steganography where
encrypted convert data is embedded into the wavelet coefficients of host audio signal. this
method avoid extraction error we use lifting wavelet transform. but this method is not robust.
It is very sensitive to any kind of filtering or manipulation of the stego audio. We calculated
hearing threshold in time domain and used it embedding threshold
The Paper entitled A Robust Digital Watermarking Scheme For Media Files (
IEEE2006) gives following information .

In this paper present a robust mechanism for digital watermarking in media files .
we have combined cryptographic and steganographic operation so that a violator can not
easily change the copyright information hidden inside the file. this method robust. but it is
difficult to implemented .
The Paper entitled Intelligent Processing : An Approch of audio steganography
(IEEE2011)
This paper provides implementation of two level encryption of user data combining
two areas of network security ,cryptography and steganography .the combination of LSB
techniques with XOR ing method is described in this paper ,whichgives additional level of
security. It gives great security . It is very sensitive to any kind of filtering or manipulation of
the stego audio.This paper can be used to increase the capacity as well as to improve the
confidentiality of audio steganography

Page | 3

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

The paper entitled Implementation of Direct Spread Spectrum steganography


on audio data gives information about the algorithm used for the basic steganography. This
paper basically focuses in the advantages of the Spread spectrum algorithm as well as the
advantages of the audio steganography. Various algorithms for audio steganography were
searched and studied.This paper explains the detail method for audio steganography. This
method proved very robust against audio manipulation and very safe with the resulting noise
is quite small but cost that take far more expensive than LSB method .Implementation is
relatively complex , and the information capacity is very limited. This Method used are audio
cropping ,audio inversion ,overwriting the information ,and changing the format

1.4 Motivation
Today, steganographic techniques are often used by copyright holders who wish to combat
privacy and theft. Images, video, and music can be encoded with information that can be
used to identify the work as being the property of an individual or corporation. These
encodings are often called watermarks. Watermarked media can be distributed on the internet
while allowing copyright holders to be able to maintain their intellectual property.
Commercially available watermarking technologies use robust techniques to encode
information that are resistant to a variety of attacks on the message. Such attacks may include
cropping or distorting the image, or modifying color information to destroy any hidden
information that could possibly exist in a given signal.Steganography has seen exponential
usage since the 1990s. Stego algorithm downloads are now available on the Internet as
shareware. Governments, military, businesses, and private citizens all over the world now
use steganography for security and privacy purpose. The music and movie industries
continually devise new material control methods such as earmarking early distribution of
movie screenings via steganography. In traitor tracing each copy of a given movie contains
a digital watermark with a unique serial number and the movie distributor knows to whom
each serial number has been delivered. When a copy becomes compromised, the movie
company only needs to extract the serial number from the copy in question and start tracing it
to the point of origin. In broadcast monitoring broadcast detectors are used to extract the

Page | 4

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

watermark of a given file or medium and report to the broadcasting events to notify the
owner or distributor of broadcast status (medium was played, time and date).

1.5 Problem Definition

Our project is an effort aimed at providing a secure means of communication hiding


the very fact that some sort of communication is taking place.

To develop software Steganography which will hide secrete data like text message in
audio,, with the help of secrete key.

In encoding process we must get the audio file back, such that, viewer of audio
should not come to know that data is hidden behind that audio file.

1.6 Scope and Objectives


Military communications system make increasing use of traffic security technique which,
rather than merely concealing the content of a message using encryption, seek to conceal its
sender, its receiver or its very existence. Similar techniques are used in some mobile phone
systems and schemes proposed for digital elections. Some of the techniques used in
steganography are domain tools or simple system such as least significant bit (LSB) insertion
and noise manipulation, and transform domain that involve manipulation algorithms and
audio transformation such as discrete cosine transformation and wavelet transformation.

The project has the following objectives:


1. To create a tool that can be used to hide data inside audio.
2. The tool should be easy to use, and should use a graphical user interface.
3. The tool should effectively hide a message using an audio and should be able to retrieve
this message afterwards.
4. The tool should take into account the original content, to theoretically more effectively
hide the message.
5. The tool should be able to provide some information as to the effectiveness of the hiding
i.e. it should be able to evaluate the degradation of audio.

Page | 5

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

1.7 Technical Approach


There are a number of software packages are available on the internet for the purpose
steganography on just about any software platform.
MP3 STEGO: - MP3 Stego is a steganographic tool that will hide information in MP3 files
during the compression process. The basic idea behind these systems is to substitute the
redundant parts of the cover object with the stego message. Steganography literally means
covered writing. Its goal is to hide the fact that communication is taking place. This is often
achieved by using

a (rather large) cover file and embedding the (rather short) secret

message into this file. The result is an innocuous looking file (the stego file) that contains the
secret message. Now, it is gaining new popularity with the current industry demands for
digital watermarking and fingerprinting of audio and video. There are three different aspects
in information-hiding systems contend with each other: capacity, security and robustness.
Capacity refers to the amount of information that can be hidden in the cover medium,
security to an eavesdroppers inability to detect hidden information and robustness to the
amount of modification the stego medium can withstand before an adversary can destroy the
hidden information. In the field of steganography, some terminology has been developed and
is as follows. The term cover is used to describe the original, innocent message, data,
audio, still, video and so on. The information to be hidden in the cover data is known as the
embedded ddata or secret data. The stegodata is the data containing both the cover
signal and the secrete information embedded using key. Logically, the process of putting
the hidden or embedded data, into the cover data, is sometimes known as embedding.
Occasionally, especially when referring to image steganography, the cover image is known
as the container.
. Also, the following tools are used: Hide4PGP
MP3Stego
JP-hide
GifshufflE
EzStego

Hide and Seek


Page | 6

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

CHAPTER 2
THEORETICAL DETAILS AND ANALYSIS

Page | 7

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

2.1 Introduction
The whole seminar report is divided into appropriate number of chapters. The brief
introduction of each chapter is described below.
.Chapter 1:In this chapter we are introducing our project through previous work, history
Relevance and literature survey.
Chapter 2: In this chapter theoretical details and analysis of project is discussed.
Section 2.2 introduction and discussion for steganography is given
Section 2.3 categories of steganography are given.
Section 2.4 Audio algorithm discussed.
Chapter 3: Flowcharts, algorithms and block diagrams of project is discussed.
Chapter 4: Results of project and discussion.
Chapter 5: In this chapter conclusions are discussed.
Chapter 6:Futurescope

2.2 STEGANOGRAPHY
Steganography is the practice of hiding private or sensitive information within something that
appears to be nothing out to the usual. Steganography is often confused with cryptology
because the two are similar in the way that they both are used to protect important
information. The difference between two is that steganography involves hiding information
so it appears that no information is hidden at all. If a person or persons views the object that
the information is hidden inside of he or she will have no idea that there is any hidden
information, therefore the person will not attempt to decrypt the information.
What steganography essentially does is exploit human perception, human senses are not
trained to look for files that have information inside of them, although this software is
available that can do what is called Steganography. The most common use of steganography
is to hide a file inside another file.

History of Steganography

Page | 8

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

Throughout history Steganography has been used to secretly communicate information


between people. Some examples of use of Steganography is past times are:
1. During World War 2 invisible ink was used to write information on pieces of paper so
that the paper appeared to the average person as just being blank pieces of paper.
Liquids such as milk, vinegar and fruit juices were used, because when each one of
these substances are heated they darken and become visible to the human eye.
2. In Ancient Greece they used to select messengers and shave their head, they would
then write a message on their head. Once the message had been written the hair was
allowed to grow back. After the hair grew back the messenger was sent to deliver the
message, the recipient would shave off the messengers hair to see the secrete
message.
3. Another method used in Greece was where someone would peel wax off a tablet that
was There are three different aspects in information-hiding systems contend with
each other: capacity, security and robustness. Capacity refers to the amount of
information that can be hidden in the cover medium, security to an eavesdroppers
inability to detect hidden information and robustness to the amount of modification
the stego medium can withstand before an adversary can destroy the hidden
information. In the field of steganography, some terminology has been developed and
is as follows
4. The term cover is used to describe the original, innocent message, data, audio, still,
video and so on. The information to be hidden in the cover data is known as the
embedded data or secrete data. The stego data is the data containing both the
cover signal and the secrete information embedded using key. Logically, the
process of putting the hidden or embedded data, into the cover data, is sometimes
known as embedding. Occasionally, especially when referring to image
steganography, the cover image is known as the container.

Page | 9

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

2.3FIVE CATEGORIES OF STEGANOGRAPHY


A) SUBSTITUTION SYSTEM
Substitution system steganography replaces redundant or unneeded bits of a cover with the
bits from the secret message. Several available steganography tools use the Least Significant
Bit (LSB) method of encoding the secret message. LSB works like this. In a digital cover
file, there is a tremendous amount of wasted or redundant space. It is this space that the
steganography program will take advantage of and use to hide another message (on the bit
level) within the digital cover.

B) TRANSFORM DOMAIN TECHNIQUES


The transform domain technique is also very effective, but is a little trickier to explain.
Basically, transform domain techniques hide message data in the transform space of a
signal .If youre saying to yourself, Huh? hold on and Ill explain. Every day on the
Internet, people send pictures back and forth, and most often they use a JPEG format. JPEGs
are interesting in that they compress themselves when they close. In order for this to take
place, they have to get rid of excess data (excess bits) that would otherwise prevent them
from Steganography and Application Password Crackers compressing. During compression,
a JPEG will make an approximation of itself to become smaller. This change transforms
space; thus, it can be used to hide information.
C) SPREAD SPECTRUM TECHNIQUES
In this section we briefly define two types of spread spectrum techniques: direct sequence
and frequency hopping .In direct sequence spread spectrum, the stream of information to be
transmitted is divided into small pieces, each of which is allocated to a frequency channel
spread across the spectrum. A data signal at the point of transmission is combined with a
higher data-rate bit sequence (also known as a chipping code) that divides the data according
to a spreading ratio. The redundant chipping code helps the signal resist interference and also
Page | 10

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

enables the original data to be recovered if data bits are damaged during transmission
.Frequency hopping is when a broad slice of the bandwidth spectrum is divided in many
possible broadcast frequencies. In general, frequency-hopping devices use less power and are
cheaper, but the performance of direct sequence spread spectrum systems is usually better
and more reliable.

D) DISTORTION TECHNIQUES
The distortion method of steganography creates a change in a cover object to hide
information .The secret message is recovered when the algorithm compares the changed

and or distorted cover with the original.


E) COVER GENERATION METHODS
Cover generation methods are probably the most unique of the five types. Typically, a
coverobject is chosen to hide a message in, but thats not the case here. A cover generation
method actually creates a cover for the sole purpose of hiding information. Spam Mimic is
an excellent example of a cover generation method.

TERMS RELATED TO STEGANOGRAPHY


Cover image - An image containing an embedded message.
Cypher text Refers to encrypted data.
Cryptography The art of protecting information by encrypting it into an unreadable
format, called cipher text. A secret key is used to decrypt the message into plain text.
Encryption The translation of data into a secret code.
Least significant bit (LSB)- The bit contributing the least value in a string of bits.
Lossless compression - For most types of data, lossless compression techniques can reduce
the space needed by only about 50%. No data is lost in the process. For greater compression,
one must use a lossy compression technique.

Page | 11

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

Lossy compression - Lossy compression technologies attempt to eliminate redundant or


unnecessary information. Some amount of data is lost in the process.
Plain text Refers to any message that is not encrypted - also called clear text.
Steganalysis The art of discovering and rendering useless covert messages.
Steganography - A means of overlaying one set of information ("message") on another (a
cover).
Stego audio - The result of combining the cover audio and the embedded message.
Stego text It is the result of applying some steganographic process to a plain text (not
necessarily encrypted).
TCP/IP - The Transmission Control Protocol / Internet Protocol is the standard protocol
suite used on the Internet.

A. DCT
DCT (discrete cosines transform) is used in JPEG compression. Embedding in DCT domain
is simply done by altering the DCT coefficients, for example by changing the least
significant bit of each coefficient. One of the limitation in DCT domain happened when 64
coefficients are equal to zero. Values will have an effect on the compression rate. So the
number of bit one could embed in DCT domain is less that the number of bits one could
embed by the LSB method. Also embedding capacity becomes dependent on the Image type
used in the case of DCT embedding. There are different methods for altering the DCT
coefficients that reviews of stego.

B: Frequency Domain
Another transform domain for embedding is frequency domain. They first decor relate the
image by scrambling the pixels randomly, which in effect whitens the frequency domain of
the image and increases the number of transform coefficients in the frequency domain thus
increasing the embedding capacity. Note the result is a salt and pepper image.

Page | 12

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

2.4Data Hiding in Audio Signal


2.4.1 Introduction
The fast improvement of the Internet and the digital information revolution caused major
changes in the overall culture. Flexible and simple-to-use software and decreasing prices of
digital devices (e.g. portable CD and mp3players, DVD players, CD and DVD recorders,
laptops, PDAs) have made it feasible for consumers from all over the world to create, edit
and exchange multimedia data. Broadband Internet connections almost an errorless
transmission of data helps people to distribute large multimedia files and make identical
digital copies of them. In modern communication system Data Hiding is most essential for
Network Security issue. Sending sensitive messages and files over the Internet are
transmitted in an unsecured form but everyone has got something to keep in secret. Audio
data hiding method is one of the most effective ways to protect your privacy.
A number of different cover objects (signals) can be used to carry hidden messages. Data
hiding in audio signals exploits imperfection of human auditory system known as audio
masking. In presence of a loud signal (masker), another weaker signal may be inaudible,
depending on spectral and temporal characteristics of both masked signal and masker
Masking models are extensively studied for perceptual compression of audio signals In the
case of perceptual compression the quantization noise is hidden below the masking threshold,
while in a data hiding application the embedded signal is hidden there. Data hiding in audio
signals is especially challenging, because the human auditory system operates over a wide
dynamic range. The human auditory system perceives over a range of power greater than one
billion to one and a range of frequencies greater than one thousand to one .Sensitivity to
additive random noise is also acute. The perturbations in a sound file can be detected as low
as one part in ten million (80 dB below ambient level).However, there are some holes
available. While the human auditory system has a large dynamic range, it has a fairly small
differential range. As a result, loud sounds tend to mask out quiet sounds .Additionally, the
human auditory system is unable to perceive absolute phase, only relative phase. Finally,
there are some environmental distortions so common as to be ignored by the listener in most
cases. Now we will discuss many of these methods of audio data hiding technology.

Page | 13

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

2.4.2 WAVE Files


Audio file format is a container format for storing audio data and metadata on a computer
system. There are three major groups of audio file format nowadays:

1] Uncompressed audio formats, [e.g., WAV]


2] Formats with lossless compression, [e.g., WMA]
3] Formats with lossy compression. [e.g., MP3]
Our design is based on uncompressed WAV audio format. WAV file format is a subset of
Microsofts RIFF specification for the storage of multimedia files. A RIFF file begins with a
file header followed by a sequence of data chunks. In fact, a WAV file is a RIFF file with a
signal WAV chunk. The signal WAV chunk is subdivided into two subchunks:[a] fmt
chunk specifies the data format with some audio metadata information, such as number of
channels, sample frequency rate, byte rate, and [b] block alignment. data chunk specifies
the data sample .
What is probably the most common format in use today is the WAVE format, usually marked
by the suffix .wav. WAVE files are actually a special case, for audio, of the RIFF format for
multimedia files. The RIFF format is a Microsoft standard. The full specification is contained
in the document Microsoft Multimedia Standards Update, Revision 3.0, April 15, 1994. The
RIFF format is a derivative of the Interchange Format Files format developed by Electronic
Arts.
There is also a slight variant of the RIFF format known as the RIFX format. RIFX differs
from RIFF in the endianess of integer data. RIFF data is required to be little-endian; RIFX
data is required to be big-endian. In all other respects RIFX format is identical to RIFF
format except for the fact that the magic number is RIFX rather than RIFF. The RIFF format
was developed for use with Intel processors. The RIFX format is an adaptation for Motorola
processors, which have the opposite endianness.
It is possible for standard-conforming WAVE files to be more complex. They may contain
multiple data chunks, and they may contain chunks of other types, such as play lists, cue lists,
padding (to cause the audio data to start at a specific location), and text containing
Page | 14

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

information about the origin of the file and the processing it has undergone. It is permissible
for WAVE files to include non-standard chunk types. Standard-conforming software will
simply skip over chunks that it does not know how to handle.

Here is the structure of the simplest standard-conforming WAVE file:


Bytes
4
4
4
4
4
2
2
4
4
2
2
4
4
N

Content
Magic number: RIFF/RIFX
WAVE chunk size = file size 8
WAVE identifier: WAVE
Format chunk identifier: fmt<space>
Format chunk size: 16
Sound format code
Number of channels
Sampling rate
Average data rate in bytes per second
Bytes per sample*
Bits per sample*
Chunk identifier: data
Chunk length in bytes: N
Audio data

Offset
0
4
8
12
16
20
22
24
28
32
34
36
40
44

Table 2.1 WAVE file format

Page | 15

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

CHAPTER 3
ALGORITHMS AND BLOCK DIAGRAM

Page | 16

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

3.1AUDIO STEGNOGRAPHY
3.1.2 ENCODER
1. Select available original .wav file at transmitter side.
2. Read the .wav audio file using wavread function. its samples amplitude value in
variable wave and frequency in fs.
3. Transform audio cover object in time domain into frequency domain .
4. Now information signal (message signal) convert into binary format.
5. Take PN sequence . frequency of PN sequence must be greater than frequency of
message signal .
6. Modulate message signal & PN sequence .length message signal must be equal to length
of PN sequence .output of modulators is message signal with noise.
7. After Transform message signal with noise in time domain into frequency domain .
8. Add the FFT of audio signal and FFT of message signal with noise.gives FFT of audio
signal containing message.
9. Take the IFFT of audio signal containing message and obtain stego audio . Stego audio
means combining the cover audio and the embedded message
10. Check parameters PSNR, MSE, BER.

3.1.2 DECODER
1. Select available stego .wav file at receiver side
2. Read the .wav audio file (stego audio)using wavread function. its samples amplitude
value in variable wave and frequency in fs.
3. Transform stego audio in time domain into frequency domain
4. Subtraction of stego audio of FFT and original audio of FFT. to obtain FFT message
signal with noise.
5. Take the IFFT of message signal with noise.
6. Then demodulate message signal with noise and same PN sequence . obtain original
message signal in binary format.
7. Convert binary format into character format .we obtain original message .

Page | 17

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

3.2.3 TRANSCEIVER GUI FOR AUDIO:


1. Press the get audio button to select audio file in which you want to hide secret data.
2. Enter the secret text data which you want to hide .
3.

Press play button to listen audio .

4. Enter the secret password .


5. Press the encode button to hide text in audio file .
6. Check PSNR ,BER ,MSE.
7. We get ENCODING DONE message.
8. Enter password.
9. Press DECODER button .
10. To obtain original audio and text.
11. Press the play audio button to check audio file.

Page | 18

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

3.3 BLOCK DIAGRAM :

MESSAGE

AUDIO
FILE

ENCODER

STGO
AUDIO

PN
SEQUENCE

RECOVER
AUDIO

DECODER

COMPUTER
FORENSICS

RECOVER
MESSAGE

Fig .Block diagram of Embedding and Extraction of secret data

Page | 19

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

CHAPTER 4
RESULTS AND DISCUSSION

Page | 20

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

4.1RESULTS:
Data security is provided by hiding secrete data behind cover audio file using
steganography technique and fake or original stego-audio is detected, using computer
forensic technique. We have worked on hiding text behind audio files extracted
from an WAV file using least spread spectrum method for audio steganography. We
have designed the software for the project in MATLAB

4.2

TRANSCEIVER FOR AUDIO FILE

Fig .Transceiver Gui for audio


Page | 21

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

4.3AUDIO STEGANOGRAPHY RESULTS:

Page | 22

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

4.6

ADVANTAGES

1. As human auditory system to recognize the change in audio is smaller than visual
system, we hide secrete text in audio file.
2. At receiver user has to enter the secret key which will be known to the intended user
only. This is more secure.
3. It also has user friendly GUI which is easy to handle.

4.7 APPLICATIONS
1. Used for the secure data transmission
2. Used in the business environment for transmitting the secret business plan
3. This software can be used by the scientists for transmitting secret chemical
Formula
4. Common man can use this software for keeping some secret documents like
passwords or confidential data
5. used for military areas.

Page | 23

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

CHAPTER 5
CONCLUSIN

Page | 24

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

CONCLUSION:Steganography is not intended to replace cryptography but rather to supplement it. If a


message is hidden with a steganographic method it provides an additional layer of protection
and reduces the chance of the hidden message being detected.

This method proved very robust against audio manipulation and very safe with the resulting
noise is quite small but cost that take far more expensive than LSB method .Implementation
is relatively complex , and the information capacity is very limited.
This Method used are audio cropping ,audio inversion ,overwriting the information ,and
changing the format

Page | 25

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

CHAPTER 6
FUTURE SCOPE

Page | 26

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

1. The emergence of the Internet and the World Wide Web has created new areas for
Steganography to expand to. The music industry can substantially gain from
Steganography in the form of Digital Watermarking. The music industry has lost
significant revenue due to a drop in sales. This drop has been correlated with the
increased exchange of music through peer to peer technologies such as KaZaa and
iMesh. Digital watermarking can be implemented to identify legitimately purchased
music from music that has not been acquired through legitimate channels. The music
industry can then use that data to implement controls to prevent those files from being
played. This will involve cooperation with software and hardware vendors to allow
only licensed files to be played
2. Steganography is more secure technique than any other data hiding techniques
available. Due to time and computing limitations, we could not explore all facets of
steganography and detection techniques. As you saw, we studied the power in our
pictures to test for hidden data. Another method which we were unable to explore was
to analyze the noise of the pictures. Adding hidden data adds random noise, so it
follows that a properly tuned noise detection algorithm could recognize whether or
not a picture had steganographic data or not.therefore continuous efforts have been
made to increase the robustness of steganographic images.

3. Individuals who want to protect their information and communication messages can
also use Steganography to augment existing encryption options. As hackers and other
individuals who want to get other individuals data get more sophisticated, the private
citizen needs to have more methods to protect themselves.
4. Terror organizations have access to the same technologies available to private
individuals. This in turn poses a challenge to governments and military commanders.
Steganography can provide terror organizations a vehicle in which to transmit
information unnoticed. Governments and military commanders are aware of this
situation and could in turn pose restrictions on the availability of advanced
technologies to its citizens. A technology such as Steganography fits very well with
the needs of terror organizations. However it is unclear as to what extent terrorists
have used or will use this technology.
5. The military that has been a major user of Steganography will continue to use it in
more advanced and complex methods. In a military operation the battlefield
commander must ensure that his commands are relayed in the most secure method
possible. In addition battle field intelligence must make its way from the front lines
back to the commander is an equally secure mechanism. The military has used both
cryptography and Steganography to protect its information. We foresee that this will
still continue to be the case, however digital Steganography is an area that the
military can further expand on.

Page | 27

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

REFERENCES:[1]

Rizky M. Nugraha Implemenation of Direct Sequence Spread spectrum

Steganography On Audio Data978-1-4577-0752-0/11$2011 IEEE

[2]

W. C. Kuo, L.C. Wuu, C.N. Shyi, S.H. Kuo, A Data Hiding Scheme with High

Embedding

Based

on

General Improving Exploiting Modification

Direction

Method,2009 Conference on Hybrid Intelligent Systems (HIS09), Aug. 2009, pp. 69-72.

[3] David Wheelers, Y. R. Wang, and C. C. Chang, Audio Steganography Using High
Frequency Noise Introduction, IIHMSP 2007. Third International Conference on Volume
1, Issue, 26-28 Nov. 2007 pp.497 500

[4] Wen-Chung Kuo,Jiin-Chiou Cheng, Chun-Cheng WangAudio Watermarking Techniques


Using Sinusoidal Pattern Based On Pseudo Random Sequence.2009 Fourth International
Conference on circuit and system, for the audio information.
[5]

Yuh-Ming Huang, Pei-WunJhanTwo Improved Data Hiding Schemes978-1-4244-

9306-7/112011 IEEE4th International Congress on Image and Signal Processing.

[6]

ZhengLing,ZhangBin,Fu LichenMulti-scale edge detection in the EMD domain using

the adaptive noise threshold -2011.

978-1-4577-1587-7/110 2011 IEEE2011

International Conference on Computer Science and Network Technology

[7]

QuZhiguo, Fu Yu, NiuXinxin, Yang Yixian, ZhangRuImproved EMD Steganography

with Great Embedding Rate and High Embedding Efficiency. 978-0-7695-3762-7/09


2009 IEEE DOI 10.1109/IIH-MSP.2009.290 348Fifth International Conference on Intelligent
Information Hiding and MultimediaSignal Processing.
Page | 28

TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

[8] Weiwei Liu, Yuewei Dai, ShiguoLianRobust Audio Steganography Using Direct
Sequence Spread Spectrum -2011.

978-0-7695-4559-2/11 2011 IEEEDOI

10.1109/MINES.2011.138Third International Conference on Multimedia Information


Networking and Security

[9]

Zheng Ling, Zhang Bin ,WangJiyeAdaptive Multi-Scale Edge Detection in the

EMD

Domain-2012978-0-7695-4789-3/12

2012

IEEEDOI

10.1109/ICCIS.2012.59Fourth International Conference on Computational and Information


Sciences.

[10]

HamzehHajizadeh, Ahmad Ayatollahi and SattarMirzakuchakiA New High

Capacity and EMD-based Image Steganography Scheme in Spatial Domain.-2013 9781-4673-5634-3/132013 IEEE

WIKIPEDIA, INTERNET.

Website:
1. Sonali Gupta, 2005, All about steganography, available at:
http://palisade.plynt.com/issues/2005apr/steganography

Page | 29

Das könnte Ihnen auch gefallen