Beruflich Dokumente
Kultur Dokumente
Sounak Lahiri
B.Tech
Department of Electronics and
Communication Engineering
Institute of Engineering and
Management, Kolkata
16
International Journal of Computer Applications (0975 8887)
Volume 140 No.2, April 2016
D.M. Ballesteros L, J.M. Moreno A, 2012, [4] proposed a Data hiding using echo has three parameters; that is, decay
method that utilizes the Frequency Masking concept with rate, offset and initial amplitude [12]. The initial amplitude is
sorting of the wavelet coefficients of the payload by used to determine the cover audio amplitude. Decay rate helps
performing indirect LSB substitution for embedding speech to determine the echo function to be made and offset gives the
signals into speech signals. It has four steps: decomposition distance between the echo and the cover signal data points.
and pre-scaling by transforming the decimal coefficients of There is a representation of the concept of the parameters
the signals to a binary representation by the Discrete Wavelet shown in Figure-2.
Transform (DWT), then sorting the wavelet coefficients of the
payload and then indirect LSB substitution for embedding.
Finally, the output is reconstructed from the signals by
applying the inverse wavelet transform.
K.P.Adhiya, S.A. Patil, 2012, [3, 5], proposed a method in
which each audio sample is converted into bits, followed by
the embedding of textual information in it. In the embedding
process, first the payload is converted into its equivalent
binary. The last 4 bits of this binary is taken into consideration
and redundancy check of the binary code is performed to
check the prefix for either 0 or 1 whichever is used.
H.I. Shahadi, R. Jidin and W.H. Way, 2014, [6] proposed an
approach that uses Integer-to-Integer Lifting Wavelet
Transform (Int2Int LWT) and Least Significant Bits (LSBs) Figure 2 - The Echo hiding parameters.
substitution. It analyzes each cover frame (4-samples) by
using 2-levels of Haar Int2Int LWT and generates an adaptive The encoding process:-
key (stego-key) that is used for embedding data. The first 12-
1. At first, the payload message vector and the carrier audio
bits from the payload are inserted in the first 6 LSBs after the
is taken as input.
Starting Depth (SD) from the first and second coefficients of
the first detail sub-band, respectively. The reminder 4-bits 2. The message vector is converted to its equivalent binary
from the payload are inserted in the first 4 LSBs after the SD form. For any image payload, the pixel values are
from the coefficients of the second detail sub-band. The individually converted to its binary form. For text
output stego frame is constructed by performing inverse of 2- messages, the ASCII values of the letters are converted to
levels Haar Int2Int LWT after converting all sub-bands to their equivalent binary form.
decimal.
3. The carrier audio is first sampled at around 44 KHz (to
N. Gupta and Ms. N. Sharma, 2014, [7] proposed a system reduce distortion due to echo addition) and then
that improves robustness and security by using the concept of fragmented using 2D- Discrete Haar wavelet transform.
Discrete Wavelet Transform and Least Significant Bit. The The coefficient matrices of cA, cD, cH and cV are
method emphasizes on the scheme of image hiding in audio. obtained.
The approach compares it with simple LSB insertion method
for data hiding in audio. 4. The length of the carrier coefficients after wavelet
transform and the length of the payload are used to
M. P. Jain and Prof. V. Trivedi, [8], proposed a method that generate a pseudorandom sequence which has a maximum
compares coefficients in the Discrete Cosine Transform value equal to the length of the carrier coefficients and a
domain. Two Coefficients of a segment are compared and period value greater than the length of the binary
payload bits are embedded, accordingly. It segments the cover sequence. The initial value of the sequence is taken to
audio into parts and then performs DCT on each part to give start from 3000 (obtained experimentally).
two outputs; one a DC signal having highest power and lowest
frequencies and the others are AC signals with decreasing 5. Embedding process
power from lowest to highest frequencies. This method The length of the message is placed at the 100th
presents high capacity and high stego-signal quality. position of the coefficient vector (e.g. cD) in use.
3. PROPOSED METHOD The values of the pseudorandom sequence give the
The proposed algorithm uses echo hiding technique to hide positions for embedding on the carrier audio. For
the payload message signal in the audio signal being used as every position, the value at that position and its
17
International Journal of Computer Applications (0975 8887)
Volume 140 No.2, April 2016
corresponding position, from any of the coefficient HS1 then a 1 was sent and hence, a one is placed in the
vectors (cA, cD cH, cV) is taken to form a vector A. output message vector.
The message vector is now checked. For zero the The process it repeated for the entire length of the
vector A is passed through filter H0 and for one, it is message vector, to obtain the output.
passed through filter H1, to form a vector B. The
values of the vector B are placed in the coefficient 6. Finally, the output is now converted back to the form in
vector (cA, cD, cH, cV) at positions of two greater which it was sent (image, text, etc.).
than the corresponding position given by the pn
sequence.
The filter functions are given as
H0(z)= 1+0.5 1 (3)
H1(z)=1+0.25 2 (4)
The process is repeated for all values of the message
vector.
6. The final coefficient vectors are now taken and inverse
2D- Discrete Haar wavelet transform is performed to
obtain the final stego signal which contains the embedded
payload signal.
Figure 4 Block Diagram of the Decoding Process
4. RESULTS
The proposed algorithm was coded and tested using
MATLAB (R2014a). A few audio signals were used to act as
the cover signal. For the payloads, first a random binary
sequence was used to check the correctness of the design,
followed by a text message and a grayscale image message.
The SNR and PSNR values are calculated using the equations
given below. The comparison is done on the cover audio
signal and the final output stego signal.
The SNR is calculated using the formula [3]:-
2
=1 ( ())
SNR=10*10 (5)
=1 [ ()]2
18
International Journal of Computer Applications (0975 8887)
Volume 140 No.2, April 2016
0.2
The plot of the output signal after embedding can be shown as
0.1 follows, in Figure 8.
0.2
0
0.1
-0.1
0
-0.2
0 5 10 15
-0.1
4
x 10
Figure 5- Plot of cD coefficients of Test Audio 3 -0.2
0 5 10 15
4
0.03 x 10
Figure 8- Plot of cD coefficients of output after embedding
Amplitude Values
message
0.02
Similarly, for the output signal, the close up look of the signal
coefficients in the same region can be given as shown in
0.01 Figure 9. It can be seen that, the coefficient values of cD
matrix changes after the embedding process. The same
0 segment of the matrix has been shown in both Figure 6 and
Figure 9. After embedding the message signal, the amplitude
-0.01 at the first two positions remains the same and the consecutive
2968 2970 2972 2974 position amplitudes change because of embedding the filtered
Positions values. This illustrates the embedding process for a single bit
of message. The process is exactly the same, for the whole
Figure 6- A segment of the plot of cD coefficients of message vector.
TestAudio 3 before embedding
0.03
A part of a message sequence can be shown as follows, in
Amplitude Values
Figure 7. 0.02
1
0.01
0
0.5
-0.01
2968 2970 2972 2974
Positions
0 Figure 9- A segment of the plot of cD coefficients of
0 50 100 150
stego signal after embedding
Figure 7- Section of a message sequence showing the first
150 bits (e.g. - Random Binary Sequence) Comparing Figure 5 and Figure 8, it can be analyzed that
there is very small difference between the coefficient vectors
For every test carrier audio and test message sequence, a before and after the encoding process. This is because the
coefficient is chosen and the spectrum of both the input and echo effect does not become prominent when the audio signal
the output signals are checked. Very low variation of the is sampled at frequencies greater than 1 KHz. Now, the SNR
signal is observed, which suggests that the method is efficient and PSNR values are observed for both the approximation
and immune to variations in channel noise. coefficients (cA) or low frequencies and the detail coefficient
(cD) or the high frequencies. The output SNR and PSNR
values are given as follows in Table.1.
19
International Journal of Computer Applications (0975 8887)
Volume 140 No.2, April 2016
Table 1 SNR and PSNR values for embedding the data in the test audio signals for both cA and cD coefficients
cA cD
CARRIER SIGNAL
CAPACITY(bits)
AUDIO AVERAGE AVERAGE
AVERAGE SNR AVERAGE SNR
PSNR PSNR
20
International Journal of Computer Applications (0975 8887)
Volume 140 No.2, April 2016
The variation of SNR and PSNR, for cA coefficients can be positions increases efficiency and preserves the secrecy of the
illustrated with the help of the following graph as shown in information being transmitted from one point to another,
Figure 10. because the pseudorandom sequence that is generated is
unique to the encoder - decoder pair. Therefore, the
90 information in the stego signal cannot be easily decoded
without the equivalent matching decoder. Hence, the system
80 as a whole, has more efficiency and is immune to noise, while
70 preserving secrecy of message during transmission.
60
6. REFERENCES
50 [1] Sumeet Gupta, Dr. Namrata Dhanda,2015, Audio
AVERAGE Steganography Using Discrete Wavelet Transformation
40
SNR (DWT) & Discrete Cosine Transformation (DCT),
30 IOSR Journal of Computer Engineering (IOSR-JCE), e-
20 AVERAGE ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue
PSNR 2, Ver. V (Mar Apr. 2015), PP 32-44
10
0 [2] Piotr Porwik, Agnieszka Lisowska,2004, The Haar
Wavelet Transform in Digital Image Processing:Its
TEST TEST TEST TEST Status and Achievements, Machine GRAPHICS & VI
AUDIOAUDIOAUDIOAUDIO SION vol . 13, n o. 1/2, 2004, p p .79-98
1 2 3 4
[3] Ali M. Meligy, Mohammed M. Nasef, Fatma
T.Eid,2015, An Efficient Method to Audio
Figure 10 Variation of SNR and PSNR for cA Steganography based on Modification of Least
coefficients Significant Bit Technique using Random Keys, I. J.
Computer Network and Information Security, 2015, 7,
Similarly, the variations for cD coefficients are shown in 24-29
Figure 11, below.
[4] D. M. Ballesteros L and J. M. Moreno , Highly
160 transparent steganography model of speech signals using
Efficient Wavelet Masking Expert Systems with
140 Applications, vol .39, 2012.
120
[5] K.P.Adhiya and S.A. Patil,Hiding Text in Audio
100 UsingLSB Based Steganography, Information and
80 KnowledgeManagement, Vol 2-No.3, 2012.
AVERAGE
60 SNR [6] H.I. Shahadi, R. Jidin and W.H. Way, Lossless Audio
40 Steganography based on Lifting Wavelet Transform and
AVERAGE Dynamic Stego Key,, Indian Journal of Science and
20 Technology, Vol 7-No. 3, March 2014.
PSNR
0
[7] N. Gupta and Ms. N. Sharma, Dwt and Lsb Based
Audio Steganography, International Conference on
Reliability, Optimization and Information Technology
(ICROIT), Feb 6-8 2014.
[8] M. P. Jain, Prof.V. Trivedi Effective Audio
Steganography by using Coefficient Comparison in DCT
Figure 11 Variation of SNR and PSNR for cD Domain, International Journal of Engineering Research
coefficients & Technology (IJERT), Vol. 2, Issue 8, August 2013.
21
International Journal of Computer Applications (0975 8887)
Volume 140 No.2, April 2016
ON AUDIO MEDIA, INDUSTRI Vol. 11 No. 1 : 1-9 Information Hiding, International Journal of Computer
ISSN 1693-0533 Science & Engineering Survey (IJCSES) Vol.4, No.6,
December 2013
[13] Jisna Antony, Sobin c. C,Sherly A. P, Audio
Steganography in Wavelet Domain A Survey, [15] Radomir S. Stankovi_c a, Bogdan J. Falkowski, The
International Journal of Computer Applications (0975 Haar wavelet transform: its status and achievements,
8887) Volume 52 No.13, August 2012 Elsevier, Computers and Electrical Engineering 29
(2003) 2544
[14] C.P.Sumathi, T.Santanam and G.Umamaheswari, A
Study of Various Steganographic Techniques Used for
IJCATM : www.ijcaonline.org 22