Beruflich Dokumente
Kultur Dokumente
ABSTRACT
I. INTRODUCTION
Steganography is an art and a science of communicating
in a way, which hides the existence of the
communication. It is also called as covered writing,
because it uses a cover of a message for sending any
important secret message [3]. Steganography serves as a
means for private, secure and sometimes malicious
communication. Steganography is the art to hide the
very presence of communication by embedding the
secret message into the innocuous looking cover media
objects, such as images using the human's visual, aural
redundance or media objects' statistical redundance.
Steganography is a powerful tool which increases
security in data transferring and archiving. In the
steganographic scenario, the secret data is first concealed
within another object which is called cover object, to
form stego object and then this new object can be
transmitted or saved. Using different techniques, we can
send secret data in the form of an image, a music file or
even a video file by embedding it into the carrier,
forming a stego signal. At the receivers end, the secret
data can be recovered from the stego signal using
different algorithms [3].
III.
AUDIO
TECHNIQUES
STEGANOGRAPHY
A. An Overview:
www.ijaert.org
www.ijaert.org
Audio Cover
Signal
Segmentation
Wavelet
Decomposition
Coefficient
Selection
Message
Embedding
Reconstruction
Audio Stego
Signal
Secret
Message
Encryption
www.ijaert.org
1. Processed samples
2. Unprocessed samples.
The size of processed samples is depending on the size
of message bits. If the size of message bit is N then The
Processed samples are consist of N*2^L samples. Where
L is decomposition level. the rest samples is called
unprocessed samples, Next the processed part is
partitioned into segments of size same as size of
message bits that is N segments; each segment has
length of Z samples.
EXRACTING ALGORITHM
The extraction process is illustrated in Figure 5. The
extraction process is divided into blocks stego
segmentation,
wave
decomposition,
Coefficient
selection, Message extraction and reverse encryption.
The Quantization parameter Q needs to be the same that
is used during encryption.
Audio Stego
Signal
Segmentation
Wavelet
Decomposition
Coefficient
Selection
Message
Extraction
Reverse
Encryption
Secret
Message
y(i), i 1,..N .
www.ijaert.org
10
SNRseg
M
M 1
log
m 0
Nm N 1
10
i Nm
x 2 (i )
x(i ) y (i ) 2
SNR 10 log 10
(i )
i 1
x(i) y (i)
i 1
SNR(db)
a.wav
45
b.wav
40
0.5 1.5 2.5 3.5
c.wav
Data Rate(KBPS)
www.ijaert.org
SNR in (db)
40
39
38
37
36
35
34
33
32
31
db 30
29
28
27
26
25
24
23
22
21
20
a.wav
AWGN (DB)
BER
35
54.34
30
48.65
34.65
33.45
33.43 28.56
28.32
27.65
0.01
b.wav
c.wav
25
44.56
35
52.43
30
50.56
25
48.42
35
53.65
30
48.32
25
46.55
0.02
a.wav
25.92
25.56
25.16
b.wav
c.wav
0.03
Value
of Pfor
and
Q
Figure 8 Comparison
graph
different
cover signals
with respect to SNR on different Threshold T
Fig 9 shows a comparison graph of different cover signal
with respect to Processing Time on different values of T
for fixed capacity ( about 200 word/sec) and Z = 8
samples. The comparison showed the clearly superiority
of the proposed scheme over the conventional DWT
scheme in high embedded capacity, the SNR is above 25
dB in our algorithm while it is in range of 21 dB in
conventional DWT scheme for different data type
message
Processing Time
3
2.86
2.72
2.5
2.45 2.54 2.372.28
2.24
2
Second 2.11
2.15
1.5
a.wav
b.wav
1
(4,5) (3,6) (2,7)
c.wav
Value of P and Q
VI. CONCLUSION
www.ijaert.org
REFERENCES
[1] Zaidoon Kh. AL-Ani, A.A.Zaidan, B.B.Zaidan and
Hamdan. O. Alanazi, Overview: Main Fundamentals for
Steganography, journal of computing, volume 2, issue 3,
march 2010, issn 2151-9617.
[2] Sos S. Agaian, David Akopian and Sunil A. DSouza
TWO
ALGORITHMS
IN
DIGITAL
AUDIO
STEGANOGRAPHY
USING
QUANTIZED
FREQUENCY
DOMAIN
EMBEDDING
AND
REVERSIBLE INTEGER TRANSFORMS 1Non-linear
Signal Processing Lab, University of Texas at San
Antonio, Texas 78249, USA.
[3] Ashwini Mane, Gajanan Galshetwar, Amutha Jeyakumar,
DATA
HIDING
TECHNIQUE:
AUDIO
STEGANOGRAPHYUSING
LSB
TECHNIQUE
International Journal of Engineering Research and
Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012,
pp.1123-1125
[4] Neil Jenkins, Jean Everson Martina, Steganography in
Audio Anais do IX Simpsio Brasileiro em Segurana da
Informao e de Sistemas Computacionais page: 269278,2007
www.ijaert.org