Academia.eduAcademia.edu

Efficient Data Hiding Scheme Using Audio Steganography

Steganography is essentially a security system which is utilized to shroud the private or mystery information. This mystery information is inserted or hid in a manner that no other individual separated from the sender or beneficiary can seize it. Audio Steganography is a piece of steganography in which the spread media utilized is a sound document, by changing a data in an intangible way. The cryptographic strategies in audio steganography "scramble" messages so if caught, the messages can't be comprehended, while, inserting, "covers" a message to shroud its presence and concealing the way that a message is being sent out and out. Inserting is not expected to supplant cryptography but rather supplement it and it is a more perplexing system. Presently, because of the accessibility of repetition the first message before inserting and the stego message after extraction continues as before, in this manner keeping up its trustworthiness. Audio Steganography can ac...

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 03 | Mar-2016 p-ISSN: 2395-0072 www.irjet.net EFFICIENT DATA HIDING SCHEME USING AUDIO STEGANOGRAPHY Mohit Kulkarni1, Maitreyee Phatak2, Uma Rathod3 , Sudhir Prajapati4,, 1234 BE IT, Department of Information Technology, RMD Sinhgad School of Engineering, Pune, Maharashtra, India. Mrs.Shivganga Mujgond 5 5Assistant Professor, Department of Information Technology, RMD Sinhgad School of Engineering, Pune, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Steganography is essentially a security covered up in the spread media. The proposed system which is utilized to shroud the private or calculation, mystery information. This mystery information is Framework, is more secure and empowers proficient inserted or hid in a manner that no other individual private correspondence in the middle of sender and separated from the sender or beneficiary can seize it. recipient. The proposed calculation joins encryption Audio Steganography is a piece of steganography in and embedding. which the spread media utilized is a sound document, by changing a data in an intangible way. The cryptographic strategies in audio that is, Computerized Encryption Keywords : Steganography, Audio Steganography, Stego File, Cover Audio, Embedding. steganography "scramble" messages so if caught, the messages can't be 1. INTRODUCTION comprehended, while, inserting, "covers" a message to The word Steganography originates from the shroud its presence and concealing the way that a Greek word "Steganos" which implies secured composing. message is being sent out and out. Inserting is not Steganography is the procedure of concealing data such expected rather that its vicinity can't be distinguished. Steganography supplement it and it is a more perplexing system. conceals the information as well as shrouds the way that Presently, because of the accessibility of repetition the correspondence is occurring. The mystery data is encoded first message before inserting and the stego message in such a way, to the point that the very presence of the after extraction continues as before, in this manner data is disguised. Along these lines it can be said that, keeping up its trustworthiness. Audio Steganography steganography can be utilized to complete concealed can accomplish security, protection, privacy and trades. to supplant cryptography but information respectability. The information which is covered up can be a content document, sound or a picture. The current Slightest Critical Piece (LSB) procedure is one of the most straightforward methodologies for secure information exchange. This calculation has a noteworthy escape clause that it is Steganography uses interactive media content as host and installs mystery data that is imperceptible to any onlooker other than the planned beneficiary. Along these lines arranged sight and sound records can uninhibitedly appropriated over the web without raising suspicion, and is utilized by malignant gatherings to anything but difficult to split the messages that are © 2016, IRJET be ISO 9001:2008 Certified Journal Page 1701 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 03 | Mar-2016 p-ISSN: 2395-0072 www.irjet.net facilitate exercises, release mystery or very touchy data, recognizing the proprietor. Throughout the years, there and that's only the tip of the iceberg. have been numerous improvements in information stowing away, particularly as it relates to assurance of The principle motivation behind Steganography calculations is to stow away however much data inside of the spread media as could reasonably be expected. Consequently, for steganography calculations the tradeoff is between the measure of secretive data being inserted, regularly called as Stego information, and the affirmation that its vicinity and substance be undetected. computerized pictures. The spread or host is the medium in which the message is implanted and serves to shroud the vicinity of the message. This is likewise alluded to as the message wrapper. The stego picture ought to take after the spread picture under easygoing examination and investigation. For recouping the message, it likewise requires a deciphering key. Procedures that endeavor to The primary objective of Steganography is to insert data just in a perceptually immaterial way, for convey safely in a totally imperceptible way and to abstain example, LSB installing strategies, are helpless against from attracting suspicion to the transmission of a having the implanted information misshaped or quantized shrouded information. It is not to keep others from by lossy picture pressure. knowing the concealed data, however it is to keep others from suspecting that the data even exists. Steganographic calculation are known as most mystery and strong methods for installing shrouded data into the spread media without changing the nature of the host signal. The reason for steganography is hosting an undercover correspondence between two gatherings whose presence is obscure to a conceivable assailant, a fruitful assault comprises in recognizing the presence of this correspondence. Copy-right checking, rather than steganography, has the extra necessity of strength against 2. RELATED WORK DONE In the audio steganography, system won't change conceivable assaults. Security should be possible through the span of the record even in the wake of encoding lack of clarity, cover, concealing the area of installed data, furthermore suitable for a sound document design. spreading the shrouded data and so forth. In this way, Calculations utilized as a part of LSB insertion method are both verifiable point of reference and late development effortlessly decryptable. give us an extensive variety of instruments, which if connected keenly ought to be adequate to take care of the A brief depiction of how mix of cryptography and steganography to secure information while transmitting in greater part of the security issues that one needs to confront in current circumstances. system is given. On the off chance that the examination between various calculations such as AES, DES and RSA is A data theoretic model for steganography with done, AES calculation is observed to be more secure than latent foes is proposed. The contrast between detached others and less tedious. Some of the time the sound enemies and dynamic foes is clarified. A model of stego records might get tainted. framework is given wherein, sender changes spread content to contain an inserted message E utilizing a Information using so as to stow away should be mystery key K. The yield of the concealing procedure is the possible advanced images. One approach to secure the stego-content S. The collector must have the capacity to responsibility for computerized picture is to furtively recuperate from his insight into the stego-content S and install information in the substance of the picture from the key K. The passsive aggressor does not know © 2016, IRJET ISO 9001:2008 Certified Journal Page 1702 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 03 | Mar-2016 p-ISSN: 2395-0072 www.irjet.net whether sender sends true blue spread content C or stego- the compacted message and send the sound record. This content S containing shrouded message. key is same for sender and collector. On the collector's side, the recipient will get the sound record through the The data theoretic model and other measurable methodologies will at last be more helpful for determining proclamations about the security of data covering up. 3. PROPOSED METHOD system, then concentrate the information from the sound document with help of key, decompress it lastly unscramble the message to get it in its unique structure. At the sender's side, the first information experiences the With help of Audio Steganography method, we are stages like pressure, encryption and implanting in order to going to create one desktop application it will give high be secure and safe from the meddler or regardless of the security to the private information and it will likewise be possibility that the busybody seizes information, he can't useful for discharge correspondence between two users change over it in the first frame. Along these lines, the such as sender and beneficiary with the assistance of emit mixed, installed information is of no utilization to the key. Audio Steganography is a system used to transmit busybody, in this manner satisfying the rationale of the concealed data by adjusting a sound sign in a subtle undertaking. manner. Firstly, audio file will be encoded with help of key, 128bits. In the wake of scrambling the sound record, pressure will apply and sound document will pack under 24MB. Subsequent to handling, message inserting is done and after that it will be sent over the system to the planned collector. Beneficiary will take after the converse method to get unique message. In this system of audio steganography, some measure of commotion arrives when the information is implanted, the recurrence of clamor is changed by a few bits yet that change is extremely insignificant and it is quiet. Thusly, the sound record which is sent to the recipient will be of a decent quality and the collector will get the information productively. 3.1 SYSTEM ARCHITECTURE Fig shows the actual detailed representation of system architecture of Audio Steganography is given and Fig 1 : System Architecture how our project works right from the start till the end, with all the minute details. . Above all else, the sender 3.2 COMPONENTS OF PROPOSED SYSTEM chooses the data record which can be as sound, content or picture. The extent of the data message will be not exactly I. ENCRYPTION MODULE the span of spread sound record. This spread record must The encryption module is capable of encoding the be in .mp3 document format. Sender will encode the original data in the communication. It is used to scramble information with the assistance of key, where key size is text in a form which the normal person cannot read. Also, 128bit. In the spread sound document, sender will implant © 2016, IRJET ISO 9001:2008 Certified Journal Page 1703 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 03 | Mar-2016 p-ISSN: 2395-0072 www.irjet.net encryption is done with help of key where the key size for 4. EXPERIMENTS AND RESULTS our algorithm is of 128bits. After performing various experiments, the following observations are taken : II. EMBEDDING The carrier file should be strictly audio (.mp3) file format In embedding, the confidential data is embedded and the secret message may be of image or text file. or hidden in an audio file in such a way that it cannot be Here for our experimental scenario the carrier audio file visible to the third person. Embedding is the most is COVER.mp3 of 24 MB size . important step in audio steganography. When the data is For secret file (image or text), embedding, the frequency of noise is changed by some bits human ear. 1. for text – file format should be .txt III. STEGO FILE lossy ) but that is very negligible change and it is not audible to a 2 .for image- the input file should be .JPEG (provided it is Stego file is the processed file which the sender 3.for audio-cover file should be .mp3 sends through a network. The original data file, after being embedded becomes a stego file. This stego file is extracted from the audio file by the receiver to view the original message. IV. COMPRESSION Compression is done to reduce the size of the Fig 2: Carrier Audio File given file less than 24MB. It is commonly used in many applications for memory management. It is done by SECRETE MESSAGE sender. V. DECOMPRESSION Decompression is exactly opposite to compression. The decompression is done to view original data in its original size. VI. EXTRACTION MODULE It is done at receiver side. The receiver extracts Fig 3: Stego Audio File to be Transmitted the embedded data from audio (cover) file with help of The COVER file is COVER.mp3 of 4.20MB size. The secret key. image file is Joker.JPEG of 31.8KB size. The secret text file is Hello.txt of 20 KB size. Thus the carrier file must be VII. DECRYPTION MODULE greater than the secret message file. Decryption is the decoding of the scrambled data to its original form. © 2016, IRJET Various embedding techniques make noise while the data is being hidden. ISO 9001:2008 Certified Journal Page 1704 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 03 | Mar-2016 p-ISSN: 2395-0072 www.irjet.net 5. CONCLUSION Steganography particularly joined with cryptography, is a capable apparatus which empowers individuals to impart without conceivable meddlers not withstanding knowing there is a type of correspondence in any case. These strategies utilized as a part of the art of steganography have propelled a great deal over the previous hundreds of years, particularly with the ascent of PC period. The proposed strategy is a device which permits the client to install the content or picture or a sound record information in a spread media which is only a sound sign under a solitary stage. Fig 4: Comparison of Original cover Audio File and 6. ACKNOWLEDGEMENT We take this chance to thank our task guide Ms. Stego Audio File COMPARISON : Above figure shows the comparison Shivganga Mujgond and Head of the Department Ms. between original file before the secret data is embedded in Sweta Kale for their significant direction and for giving all it ,and the file after the secret data is embedded in it. the fundamental offices, which were basic in the finishing of this venture report. Cover File Secret Data Stego File File Format File COVER.mp3 Hello.txt We are likewise grateful to all the staff individuals COVER.mp3 Joker.JPEG the Department of Information Technology of RMD Sinhgad School of Engineering, Warje for Name from their profitable time, bolster, remarks, recommendations and influence. We might likewise want to thank the establishment for giving the required offices, Size 4.20MB 20KB 4.2OMB 31.8KB 4.20MB Internet access and imperative books. 7. REFERENCES [1] Table No.1 : While Embedding Data. Stego File Retrieved Hello.txt Pados, “Extracting IEEE transactions on information forensics and Cover File security VOL:8 NO:7,July 2013. [2] COVER.mp3 Kulhandjian, Dimitris Spread-Spectrum Hidden Data from Digital media”, secret data Name Michel COVER.mp3 B hagyashri Patil, Vrishali Chakkarwar, “Review of an Improved Audio Steganographic Technique over LSB through Random Based Approach” IOSR Journal(ISOR- Joker.JPEG JCE),VOL:9 Issue 1, Jan–Feb 2013. 4.20MB Size 24KB 4.20MB B.Padmavathi, S. Ranjitha Kumari, “A Survey on Performance Analysis of DES, AES and RSA Algorithm 190KB Table No.2 : After Retrieving Data © 2016, IRJET [3] along with LSB Substitution Technique”, International ISO 9001:2008 Certified Journal Page 1705 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 03 | Mar-2016 p-ISSN: 2395-0072 www.irjet.net Journal of Science and Research, Volume 2 Issue 4, April 2013. [4] Fahimeh Rezaei,Tao Ma et.l, “An anti-steganographic approach for removing secret information in digital audio data hidden by SS methods” IEEE transaction on system security symposium,978-1-4673-3122- 7/13/$31.00 ©2013 IEEE, 2013. [5] E.T. Lin and E.J. Delp, "A Review of Data Hiding in Digital Images," in Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference, PICS '99, Ed.pp. 274—278, April 1999. [6] F.A.P Peticolas, R.J. Anderson and M.G. Kuhn, “Information Hiding – A Survey”, in proceeding of IEEE, pp. 1062-1078, July 1999. [7] C. Cachin, “An Information-Theoretic Model for Steganography”, in proceeding 2nd Information Hiding Workshop, vol. 1525, pp. 306-318, May 1998. © 2016, IRJET ISO 9001:2008 Certified Journal Page 1706