Sie sind auf Seite 1von 5

{\rtf1{\fonttbl {\f2 A;} {\f3 A;} {\f4 A;} {\f5 T;} {\f6 T;} {\f7 T;} {\f8 T;}

{\f9 T;} {\f10 T;} {\f11 T;} {\f12 T;} {\f13 T;} {\f14 T;} {\f15 T;} {\f16 T;} {\f17 T;} {\f18 W;} {\f19 A;} {\f20 A;} {\f21 T;} {\f22 C;} {\f1000000 Times New Roman;} }{\colortbl; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue255; \red0\green0\blue0; \red0\green0\blue255; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue0; }\viewkind1\viewscale100\paperw12240\paperh15840\par\pard\par\pard\ql \ul0\nosup ersub\cf1\f2\fs18 Journal of Theoretical and Applied Information Technology \par \pard\par\pard\ql \ul0\nosupersub\cf2\f3\fs18 2005 - 2009 JATIT. All rights rese rved. \par\pard\par\pard\ql \ul0\nosupersub\cf4\f5\fs18 www.jatit.org \par\pard\ par\pard\qc \ul0\nosupersub\cf7\f8\fs32 EFFICIENT METHOD OF AUDIO STEGANOGRAPHY BY MODIFIED LSB ALGORITHM AND STRONG ENCRYPTION KEY WITH ENHANCED SECURITY \ par\pard\par\pard\qc \ul0\nosupersub\cf8\f9\fs18 1\ul0\nosupersub\cf10\f11\fs20 R SRIDEVI, \ul0\nosupersub\cf8\f9\fs18 2\ul0\nosupersub\cf10\f11\fs20 DR. A DAMO DARAM, \ul0\nosupersub\cf8\f9\fs18 3\ul0\nosupersub\cf10\f11\fs20 DR. SVL.NARASI MHAM \ul0\nosupersub\cf9\f10\fs18 1\ul0\nosupersub\cf6\f7\fs20 Assoc. Prof., Dep artment of Computer Science and Engineering, JNTUCEH, Hyderabad \ul0\nosupersub\ cf9\f10\fs18 2\ul0\nosupersub\cf6\f7\fs20 Prof., Department of Computer Science and Engineering, JNTUCEH, Hyderabad \ul0\nosupersub\cf9\f10\fs18 3\ul0\nosupersu b\cf6\f7\fs20 Prof., School of Information Technology, JNTUH, Hyderabad \par\par d\par\pard\ql E-mail: \ul0\nosupersub\cf11\f12\fs20 sridevirangu@yahoo.com\ul0\

nosupersub\cf6\f7\fs20 , \ul0\nosupersub\cf11\f12\fs20 damadorama@gmail.com\ul0\ nosupersub\cf6\f7\fs20 ,\ul0\nosupersub\cf12\f13\fs18 \ul0\nosupersub\cf13\f14\ fs18 svlnarasimham@jntuh.ac.in \par\pard\par\pard\ql \ul0\nosupersub\cf10\f11\fs 20 ABSTRACT \par\pard\par\pard\qj \ul0\nosupersub\cf6\f7\fs20 In the curre nt internet community, secure data transfer is limited due to its attack made on data communication. So more robust methods are chosen so that they ensure secur ed data transfer. One of the solutions which came to the rescue is the audio Ste ganography. But existing audio steganographic systems have poor interface, very low level implementation, difficult to understand and valid only for certain aud io formats with restricted message size. \par\pard\par\pard Enhanced Audio S teganography (EAS) is one proposed system which is based on audio Steganography and cryptography, ensures secure data transfer between the source and destinatio n. EAS \par uses most powerful encryption algorithm in the first level of se curity, which is very complex to break. In the second level it uses a more power ful modified LSB (Least Significant Bit) Algorithm to encode the message into au dio. It performs bit level manipulation to encode the message. \par\pard\par\par d\qj The basic idea behind this paper is to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safer manner. Though it is well modulated software it has been limited to certain restrictions . The quality of sound depends on the size of the audio which the user selects a nd length of the message. Though it shows bit level deviations in the frequency chart, as a whole the change in the audio cannot be determined. \par\pard\par\pa rd\ql \ul0\nosupersub\cf10\f11\fs20 Keywords: \ul0\nosupersub\cf14\f15\fs20 Steg enography, LSB Method \par\pard\ul0\nosupersub\cf10\f11\fs20 1. INTRODUCTION\par \par \ul0\nosupersub\cf6\f7\fs20 Steganography is the practice of hiding informa tion \u8220?in plain sight\u8221?. This technique relies on a message being encoded and hidden in a transport layer in such a way as to make the existence of the message unknown to an observer. Importantly, the transport layer the carrier file - is not secret and can therefore be viewed by observers fro m whom the secret message itself should be concealed. The power of steganogra phy is in hiding the secret message by obscurity, hiding its existence in a nonsecret file. In that sense, steganography is different from cryptography, which involves making the content of the secret message unreadable while not preventi ng non-intended observers from learning about its existence1.Because the succ ess of the technique depends entirely on the ability to hide the message such th at an observer would not suspect it is there at all, the greatest effort must g o into ensuring that the message is invisible unless one knows what to loo k for. The way in which this is done will differ for the specific media that are used to hide the information. In each case, the value of a stegan ographic approach can be measured by how much information can be concealed in a carrier before it becomes detectable, each technique can thus be thoug ht of in terms of its capacity for information hiding. \par There are numero us methods used to hide information inside of Picture, Audio and Video files. Th e two most common methods are \ul0\nosupersub\cf10\f11\fs20 LSB (Least Significa nt Byte) \ul0\nosupersub\cf6\f7\fs20 and \ul0\nosupersub\cf10\f11\fs20 Injection . \par\pard\par\pard\ql \par\pard\paperw12240\paperh15840\par\pard\par\pard\par\ pard\par\pard\ql \ul0\nosupersub\cf1\f2\fs18 Journal of Theoretical and Applied Information Technology \par\pard\par\pard\ql \ul0\nosupersub\cf2\f3\fs18 2005 2009 JATIT. All rights reserved. \par\pard\par\pard\ql \ul0\nosupersub\cf4\f5\fs 18 www.jatit.org \par\pard\par\pard\ql \ul0\nosupersub\cf10\f11\fs20 2.EXISTING SYSTEM: \par\pard\par\pard{ \trowd\trautofit1\intbl{\ul0\nosupersub\cf6\f7\fs20 The existing Audio}\cell{\ul0\nosupersub\cf10\f11\fs20 Figure:Encoding}\cell {\trowd\trautofit1\intbl \cltxlrtb\clftsWidth1\cellx4320 \cltxlrtb\clftsWidth1\cellx8640 \row} system of

}\par\pard\par\pard\ql \ul0\nosupersub\cf6\f7\fs20 Steganography poses more rest

rictions on the choosing of audio files. User can select only wav files to enc ode. It supports water marking method to encode .It complexity arises when m ore message to be encoded. The message length is restricted to 500 charact ers. It doesn\u8217?t shows the variations occurred after encoding the message. The LSB algorithm in the existing system is not efficient because it hides the message in consecutive bytes received from audio files. \par\pard\par \pardThe disadvantages of existing system is \par \ul0\nosupersub\cf17\f18 \fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Selection of a udio formats is restricted to one. \par\pard\par\pard\ul0\nosupersub\cf17\f18\fs 20 \ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Non-Provision of encryption key \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0 \nosupersub\cf6\f7\fs20 Length of the message is limited to 500. \ul0\nosupers ub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Abs ence of frequency chart to show the \par variations. \par\pard\par\pard\u l0\nosupersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7 \fs20 Lack in good user interface. \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupersu b\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Consume much time to encode and \ par decode. \par\pard\par\pard\ql \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupers ub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Non-Provision of sending the fil e to the \par destination. \par\pard\par\pard\ql \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 User needs to under stand better to know \par the operations. \par\pard\par\pard{ \trowd\trautofit1\intbl{\ul0\nosupersub\cf10\f11\fs20 -}\cell{\ul0\nosupersub\cf 10\f11\fs20 Decoding\ul0\nosupersub\cf6\f7\fs20 is a process of retrieving the} \cell {\trowd\trautofit1\intbl \cltxlrtb\clftsWidth1\cellx4320 \cltxlrtb\clftsWidth1\cellx8640 \row} \trowd\trautofit1\intbl{\ul0\nosupersub\cf6\f7\fs20 These are the disadvantages in the}\cell \cell {\trowd\trautofit1\intbl \cltxlrtb\clftsWidth1\cellx4320 \cltxlrtb\clftsWidth1\cellx8640 \row} \trowd\trautofit1\intbl {}\cell{\ul0\nosupersub\cf6\f7\fs20 message from the audio.}\cell {\trowd\trautofit1\intbl \cltxlrtb\clftsWidth1\cellx4320 \cltxlrtb\clftsWidth1\cellx8640 \row} }\par\pard\par\pard\ql existing system which can be overcome by the proposed sys tem. \par\pard\par\pard\ql Figure:Decoding \par\pard\par\pard\ql \ul0\nosupersub \cf10\f11\fs20 3.PROPOSED SYSTEM: \par\pard\par\pard \ul0\nosupersub\cf6\f7\f s20 Enhanced Audio Steganography is a method of hiding the message in the audio file of any formats. EAS provides an easy way of implementation of mechanisms wh en compared with audio steganography. Apart from the encoding and decoding in Audio steganography, EAS contain extra layers of encryption and decrypt ion. The four layers in EAS are: \par \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupe rsub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Encoding \par\pard\par\pard\qj \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6 \f7\fs20 Decoding \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Encryption \ul0\nosupersub\cf17\f18\fs20 \ul0\nosu persub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Decryption \par\pard\par\pa

rd{ \trowd\trautofit1\intbl{\ul0\nosupersub\cf10\f11\fs20 -}\cell{\ul0\nosupersub\cf 10\f11\fs20 Encoding\ul0\nosupersub\cf6\f7\fs20 is a process of hiding the}\cel l {\trowd\trautofit1\intbl \cltxlrtb\clftsWidth1\cellx4320 \cltxlrtb\clftsWidth1\cellx8640 \row} \trowd\trautofit1\intbl {}\cell{\ul0\nosupersub\cf6\f7\fs20 message in the audio.}\cell {\trowd\trautofit1\intbl \cltxlrtb\clftsWidth1\cellx4320 \cltxlrtb\clftsWidth1\cellx8640 \row} }\par\pard\par\pard{ \trowd\trautofit1\intbl{\ul0\nosupersub\cf10\f11\fs20 Modified}\cell{\ul0\nosupe rsub\cf10\f11\fs20 LSB(Least Significant}\cell{\ul0\nosupersub\cf10\f11\fs20 Bit)}\cell {\trowd\trautofit1\intbl \cltxlrtb\clftsWidth1\cellx2880 \cltxlrtb\clftsWidth1\cellx5760 \cltxlrtb\clftsWidth1\cellx8640 \row} }\par\pard\par\pard\ql Algorithm\ul0\nosupersub\cf6\f7\fs20 is used to encode t he message into audio. It performs bit level manipulation to encode the me ssage. The following steps are \par\pard\par\pard\ql \par\pard\paperw12240\paper h15840\par\pard\par\pard\ql \ul0\nosupersub\cf1\f2\fs18 Journal of Theoretical a nd Applied Information Technology \par\pard\par\pard\ql \ul0\nosupersub\cf2\f3\f s18 2005 - 2009 JATIT. All rights reserved. \par\pard\par\pard\ql \ul0\nosupersu b\cf4\f5\fs18 www.jatit.org \par\pard \ul0\nosupersub\cf6\f7\fs20 a.\ul0\nosup ersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Receives the audio file in th e form of bytes and converted in to bit pattern. b.\ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Each character in the message is conve rted in bit pattern. c.\ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs2 0 Replaces the LSB bit from audio with LSB bit from character in the message. \par \ul0\nosupersub\cf10\f11\fs20 Powerful encryption algorithm\ul0\nosupersu b\cf6\f7\fs20 is used to encrypt the message before encoding for further sec urity purpose. The following steps is used to\par\par a. Adding all ASCII values of characters in\par\par b. Converting the sum into bit pattern c. Performing l ogical operation to the bit\par\par d. Adding to the encoded character. \par For more security enhancement the encoding is done only when the byte which is rece ived from\par\par 254 or 255.This selection of \ul0\nosupersub\cf10\f11\fs20 3.3 Encoding: \ul0\nosupersub\cf6\f7\fs20 particular bytes for encoding will red uce the lack in quality of audio after encoding. It can be proved by seeing the frequency chart indicating the deviations happened after encode. Thought it has more than shows bit level deviations in the chart as a whole the change in th e audio cannot be determined.\par\par The basic idea behind this is to provide a good, efficient method for hiding the data from hackers and sent to the d estination in safe manner. Though it is well modulated software it has been limited to certain restrictions. The quality of sound depends on the size of the audio by which the user selects and length of the message.\par\par using pu blic key. \ul0\nosupersub\cf10\f11\fs20 3.4 Decoding: \ul0\nosupersub\cf6\f7\fs2 0 1) Size of file is not changed after encoding. 2) Since it is bit level manipu lation the sound variations cannot be determined by any current\par\par The pro posed system over consecutive comes all the restrictions made on the existing

systems. It provides good looking environment to user .It also provide the user to give secret key for encryption. The length of message is more message. than t he existing system, and provides frequency chart to see the variations after enc oding. The \ul0\nosupersub\cf10\f11\fs20 3.5 Encryption: \ul0\nosupersub\cf6\f7\ fs20 quality of the audio doesn\u8217?t change variably. It cannot detect the la ck in quality of sound. The encryption key can be any combination of chara cters, symbols, numbers. The key which is used for encoding is also used for dec oding .This is a secret key where the both user have to agree\par\par \ul0\nosup ersub\cf10\f11\fs20 3.2 The advantages of proposed system is \par \ul0\nos upersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs20 Different Audio formats are supported by the system. by one in the message, be fore encoding. \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0 \nosupersub\cf6\f7\fs20 Provision of encryption key and performs simpl e encryption algorithm. \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs 20 \ul0\nosupersub\cf6\f7\fs20 The encryption key is modified by a strong al gorithm to get a new key, which is used to encrypt the message. So even if the key is known for an intruder, he cannot break the code with that key. \ul0\n osupersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf6\f7\fs2 0 Presence of frequency chart to show the variations that helps the us er to determine. \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ ul0\nosupersub\cf6\f7\fs20 Consumption of time to encode and decode is reduced . \ul0\nosupersub\cf17\f18\fs20 \ul0\nosupersub\cf18\f19\fs20 \ul0\nosupersub\cf 6\f7\fs20 Provision of sending the file to the destination is given so that after encoding the user can send the file by giving destination IP addre ss.\par\par The audio file contains set of bytes. For \par e.g. take an audio fi le which play for 10 secs. It\par\par 60,000 bytes. Each byte is received an d checked if the received byte is 254 or 255.If it is byte 255 or 254, encoding is done. \par So for one character to encode we need eight 254 or 255 bytes. O ne character is hidden in consecutive eight 254 or 255 bytes.In order to mark th e end of message, the LSB bit of next eight consecutive 254 or 255 bytes which c omes after all the messages have encoded are replaced \par 1.Before encodi ng, message is encrypted\par\par The encoded file is decoded to get the \par message .The message is decoded first and then decrypted by the public k ey. The eight\par\par 254 or 255 bytes are taken and decrypted with the publ ic key. This decrypted byte have value less than 128.So if the value is 255 afte r decrypted then it is said to be end of\par\par The user allowed entering the p ublic key/shared key in any combination of numbers, symbols and characters. The key contains set of characters. All characters are converted to ASCII value and add all the ASCII value to get single number. And that single number is con verted to bit pattern and by simple logical operation (XOR) you can get a sing le number less than 128.It is a new private key .It is added to the characters o ne \par\pard\par\pard\ql \par\pard\ul0\nosupersub\cf999999\f1000000 \pard\fs32 ATTENTION!\fs24\par \par TRIAL LIMITATION - ONLY 3 SELECTED PAGES MAY BE CONVERTED PER CONVERSION.\par \par PURCHASING A LICENSE REMOVES THIS LIMITATION. TO DO SO, PLEASE CLICK ON THE FOLL OWING LINK:\par{\field{\*\fldinst{HYPERLINK "http://www.investintech.com/purchas ea2e.html"}}{\fldrslt{\cf1\ul http://www.investintech.com/purchasea2e.html}}}}

Das könnte Ihnen auch gefallen