11-11-2016, 11:03 AM
1468420814-PDF1.pdf (Size: 240.25 KB / Downloads: 8)
ABSTRACT
Today’s large demand of internet applications requires data to be transmitted in a secure manner. Data
transmission in public communication system is not secure because of interception and improper
manipulation by eavesdropper. So the attractive solution for this problem is Steganography, which is the art
and science of writing hidden messages in such a way that no one, apart from the sender and intend
recipient, suspects the existence of the message, a form of security through obscurity. Audio steganography
is the scheme of hiding the existence of secret information by concealing it into another medium such as
audio file. In this paper we mainly discuss different types of audio steganographic methods, advantages and
disadvantages.
KEYWORD
Steganography, Cryptography, Audio Steganography, LSB.
1. INTRODUCTION
In cryptography, the structure of a message is scrambled to make it meaningless and unintelligible
unless the decryption key is available. It makes no attempt to disguise or hide the encoded
message. Basically, cryptography offers the ability of transmitting information between persons in
a way that prevents a third party from reading it. Cryptography can also provide authentication for
verifying the identity of someone or something [3].
In steganography does not alter the structure of the secret message, but hides it inside a cover
image so that it cannot be seen. A message in a cipher text, for instance, might arouse suspicion
on the part of the recipient while an “invisible” message created with steganographic methods
will not. In other word, steganography prevents an unintended recipient from suspecting that the
data exists. In addition, the security of classical steganography system relies on secrecy of the
data encoding system. Once the encoding system is known, the steganography system is defeated
[4, 1].
The following points can be attributed to the renaissance of steganography
i. Government ban on digital cryptography. Individuals and companies who seek confidentiality
look to steganography as an important complementary since combining cryptography and
steganography can help in avoiding suspicion and protect privacy.
The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011
87
ii. The increased need to protect intellectual property rights by digital content owners, using
efficient watermarking.
iii. The trend towards electronic communications and humans desire to conceal messages from
curious eyes. With rapid advancement in technology, steganographic software is becoming
effective in hiding information in image, video, audio or text files
Emb: The message to be embedded.
Cover: The data in which emb will be embedded.
Stego: A modified version of cover that contains the embedded message emb.
Key: Additional secret data that is needed for the embedding and extracting processes and must
be known to both, the sender and the recipient.
fE: A steganographic function that has cover, emb and key as parameters and produces stego as
output.
FE-1: A steganographic function that has stego and key as parameters and produces emb as
output. FE-1 is the inverse function of fE in the sense that the result of the extracting process fE-1
is identical to the input E of the embedding process fE.
The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011
88
The embedding process fE embeds the secret message E in the cover data C. The exact position
(S) where E will be embedded is dependence on the key K. The result of the embedding function
is slightly modified version of C: the stego data C’. After the recipient has received C’ he starts
the extracting process fE-1 with the stego data C’ and the key K as parameters. If the key that is
supplied by the recipient is the same as the key used by the sender to embed the secret message
and if the stego data the recipient uses as input is the same data the sender has produces (i.e., it
has not been modified by an adversary), then the extracting function will produce the original
secret message E.
2. OVERVIEW OFAUDIO STEGANOGRAPHY
The word steganography comes from the Greek Steganos, which means covered or secret and -
graphy means writing or drawing. Therefore, steganography means, literally, covered writing.
Steganography is the art and science of hiding secret information in a cover file such that only
sender and receiver can detect the existence of the secret information [3]. A secret information is
encoded in a manner such that the very existence of the information is concealed.
The main goal of steganography is to communicate securely in a completely undetectable manner
[4] and to avoid drawing suspicion to the transmission of a hidden data [5]. It is not only prevents
others from knowing the hidden information, but it also prevents others from thinking that the
information even exists. If a steganography method causes someone to suspect there is a secret
information in a carrier medium, then the method has failed [6,8].
The basic model of Audio steganography consists of Carrier (Audio file), Message and Password.
Carrier is also known as a cover-file, which conceals the secret information.
Basically, the model for steganography is shown in Fig 3. Message is the data that the sender
wishes to remain it confidential. Message can be plain text, image, audio or any type of file.
Password is known as a stego-key, which ensures that only the recipient who knows the
corresponding decoding key will be able to extract the message from a cover-file. The cover-file
with the secret information is known as a stego-file.
AUDIO STEGANOGRAPHIC METHODS
There have been many techniques for hiding information or messages in audio in such a manner
that the alterations made to the audio file are perceptually indiscemible. Common approaches
include [7, 12]:
3.1 LSB CODING
A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the
least significant bit in some bytes of the cover file to hide a sequence of bytes containing the
hidden data. That's usually an effective technique in cases where the LSB substitution doesn't
cause significant quality degradation, such as in 24-bit bitmaps.
In computing, the least significant bit (LSB) is the bit position in a binary integer giving the units
value, that is, determining whether the number is even or odd. The LSB is sometimes referred to
as the right-most bit, due to the convention in positional notation of writing less significant digit
further to the right. It is analogous to the least significant digit of a decimal integer, which is the
digit in the ones (right-most) position.
PHASE CODING
The phase coding technique works by replacing the phase of an initial audio segment with a
reference phase that represents the secret information. The remaining segments phase is adjusted
in order to preserve the relative phase between segments. In terms of signal to noise ratio, Phase
coding is one of the most effective coding methods. When there is a drastic change in the phase
relation between each frequency component, noticeable phase dispersion will occur. However, as
long as the modification of the phase is sufficiently small, an inaudible coding can be achieved [4,
19]. This method relies on the fact that the phase components of sound are not as perceptible to
the human ear as noise is.
Phase coding is explained in the following procedure:
a. Divide an original sound signal into smaller segments such that lengths are of the same size
as the size of the message to be encoded.
b. Matrix of the phases is created by applying Discrete Fourier Transform (DFT).
c. Calculate the Phase differences between adjacent segments.
d. Phase shifts between adjacent segments are easily detectable. It means, we can change the
absolute phases of the segments but the relative phase differences between adjacent
segments must be preserved. So the secret information is inserted only in the phase vector of
the first signal segment
ECHO HIDING
Echo hiding technique embeds secret information in a sound file by introducing an echo into the
discrete signal. Echo hiding has advantages of providing a high data transmission rate and
superior robustness when compared to other methods. Only one bit of secret information could be
encoded if only one echo was produced from the original signal. Hence, before the encoding
process begins the original signal is broken down into blocks. Once the encoding process is done,
the blocks are concatenated back together to create the final signal [
PROPOSED WORK
Here we will discuss the disadvantages of the previous procedure and how those are different
with present method. The main disadvantages associated with the use of existing methods like
echo hiding, spread spectrum and parity coding are, human ear is very sensitive to noise and it
can often detect even the slightest bit of noise introduced into a sound file and another problem is
robustness.
Phase coding has main disadvantage of low data transmission rate because of the fact that the
secret message is encoded only in the first signal segment. Hence this method is used only when a
small amount of data needs to be transferred.
Among different information hiding techniques proposed to embed secret information within
audio file, Least Significant Bit (LSB) coding method is the simplest way to embed secret
information in a digital audio file by replacing the least significant bit of audio file with a binary
message. Hence LSB method allows large amount of secret information to be encoded in an audio
file.
Steps to hide secret information using LSB are:
a. Covert the audio file into bit stream.
b. Convert each character in the secret information into bit stream.
c. Replace the LSB bit of audio file with the LSB bit of character in the secret information.
This proposed method provides greater security and it is an efficient method for hiding the secret
information from hackers and sent to the destination in a safe and undetectable manner. This
proposed system also ensures that the size of the file is not changed even after encoding and it is
also suitable for any type of audio file format.
5. AUDIO STEGANOGRAPHIC APPLICATIONS
Audio data hiding can be used anytime you want to hide data. There are many reasons to hide
data but most important is to prevent unauthorized persons from becoming aware of the existence
of a message. In the business world Audio data hiding can be used to hide a secret chemical
formula or plans for a new invention [9, 17].
Audio data hiding can also be used in the non commercial sector to hide information that
someone wants to keep private. Terrorists can also use Audio data hiding to keep their
communications secret and to coordinate attacks. In the project ARTUS1 which aims to embed
animation parameters into audio and video contents [10]. Data hiding in video and audio, is of
interest for the protection of copyrighted digital media, and to the government for information
systems security and for covert communications [21, 18]. It can also be used in forensic
applications for inserting hidden data into audio files for the authentication of spoken words and
other sounds, and in the music business for the monitoring of the songs over broadcast radio.
6. CONCLUSION
In this paper we have introduced a robust method of imperceptible audio data hiding. Thus we
conclude that audio data hiding techniques can be used for a number of purposes other than covert communication or deniable data storage, information tracing and finger printing, tamper
detection. As the sky is not limit so is not for the development. Man is now pushing away its own
boundaries to make every thought possible. So similarly these operations described above can be
further modified as it is in the world of Information Technology