Increasing the Hiding Capacity of Low-Bit Encoding Audio Steganography Using a Novel Embedding Technique

Similar documents
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

Security and protection of digital images by using watermarking methods

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Safer data transmission using Steganography

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

A Digital Audio Watermark Embedding Algorithm

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

Multimedia Document Authentication using On-line Signatures as Watermarks

International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

Figure1. Acoustic feedback in packet based video conferencing system

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

Basic principles of Voice over IP

Basics of Digital Recording

Modification Details.

Image Authentication Scheme using Digital Signature and Digital Watermarking

Practical Internet Steganography: Data Hiding in IP

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Multi-factor Authentication in Banking Sector

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Text Steganography in SMS

CDMA TECHNOLOGY. Brief Working of CDMA

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:

Performance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions

Introduction to Digital Audio

Digital Audio Compression: Why, What, and How

Alternative security architecture for IP Telephony based on digital watermarking

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

AN Application Note: FCC Regulations for ISM Band Devices: MHz. FCC Regulations for ISM Band Devices: MHz

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Experimental DRM Architecture Using Watermarking and PKI

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

International ejournals

WATERMARKING FOR IMAGE AUTHENTICATION

PCM Encoding and Decoding:

Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction

Audio Coding Algorithm for One-Segment Broadcasting

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

Digital Audio and Video Data

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

HD Radio FM Transmission System Specifications Rev. F August 24, 2011

A WEB BASED TRAINING MODULE FOR TEACHING DIGITAL COMMUNICATIONS

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Computer Network and Communication

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

DAB + The additional audio codec in DAB

DAB Digital Radio Broadcasting. Dr. Campanella Michele

encoding compression encryption

Video Conferencing Glossary of Terms

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT

The Analysis of DVB-C signal in the Digital Television Cable Networks

Multiplexing on Wireline Telephone Systems

MSB MODULATION DOUBLES CABLE TV CAPACITY Harold R. Walker and Bohdan Stryzak Pegasus Data Systems ( 5/12/06) pegasusdat@aol.com

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS

TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION

A Model-based Methodology for Developing Secure VoIP Systems

Implementing Digital Wireless Systems. And an FCC update

Broadband Video over Twisted Pair Cabling. By Paul Kish Director, IBDN Systems & Standards NORDX/CDT

CS263: Wireless Communications and Sensor Networks

A Concept of Digital Picture Envelope for Internet Communication

CHAPTER 1 INTRODUCTION

Revision of Lecture Eighteen

AN OVERVIEW OF IMAGE STEGANOGRAPHY

Non-Data Aided Carrier Offset Compensation for SDR Implementation

AUDIO CODING: BASICS AND STATE OF THE ART

A Secure Data Transmission By Integrating Cryptography And Video Steganography

Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles

Improved user experiences are possible with enhanced FM radio data system (RDS) reception

Technical Specifications for KD5HIO Software

Audio Analysis & Creating Reverberation Plug-ins In Digital Audio Engineering

Whitepaper n The Next Generation in Wireless Technology

Secret Communication through Web Pages Using Special Space Codes in HTML Files

MP3 Player CSEE 4840 SPRING 2010 PROJECT DESIGN.

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

The Phase Modulator In NBFM Voice Communication Systems

UNIVERSITY OF CALICUT

Real-Time DMB Video Encryption in Recording on PMP

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument

Sigma- Delta Modulator Simulation and Analysis using MatLab

Level 2 Development Training. Level 2 Development Training. Level 2 Development Training. Technical Overview

RF Measurements Using a Modular Digitizer

Evolution of Satellite Communication Systems

Analog Representations of Sound

New security and control protocol for VoIP based on steganography and digital watermarking

Four Wave Mixing in Closely Spaced DWDM Optical Channels

MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY

Digital Transmission of Analog Data: PCM and Delta Modulation

Online Voting System Using Three Factor Authentication

Teaching Convolutional Coding using MATLAB in Communication Systems Course. Abstract

Transcription:

World Applied Sciences Journal 2 (Mathematical Applications in Engineering): 79-83, 212 ISSN 1818-4952 IDOSI Publications, 212 DOI: 1.5829/idosi.wasj.212.2.mae.99926 Increasing the Hiding Capacity of Low-Bit Encoding Audio Steganography Using a Novel Embedding Technique R.F. Olanrewaju, Othman Khalifa and Husna binti Abdul Rahman @ Suliman Department of Electrical and Computer Engineering, Faculty of Engineering, International Islamic University Malaysia, 5728, Kuala Lumpur, Malaysia Abstract: The rapid growth of multimedia transmission leads to lose the owner identity of their products. Therefore, the demand to secure such input is crucial. In this paper, an overview of steganography and its technique applied is introduced. A data hiding within audio signals is studied. LSB technique is used and simulated result is presented. The result is characterized by robustness and high bit rate. It was shown that length of the embedded message (secret message) does not affect the stego signal audibility as long as it does not exceed the length of the original signal. Key words: Data hiding % Audio signal % Steganography % Least Significant Bit INTRODUCTION as steganography, from the Greek word stegano for "covered" and graphos "to write" is [2]. Steganography Transmission of digital information and data has or stego is an art of concealing communication in such tremendously increased ever than before. The availability a way that no one apart from the sender and intended and efficiency of global computer networks for the recipient knows there is a hidden message [3]. communication of digital information have accelerated Multimedia data hiding techniques have been the popularity of digital media. Digital images, video, developed a strong basis for steganography area with an audio and text have been revolutionized in the way they expanding number of applications like digital rights can be captured, stored, transmitted and manipulated management, covert communications, hiding executables and this gives rise to a wide range of applications in for access control and annotation [4]. In all application education, entertainment industries, economic fore scenarios given above, multimedia steganography casting,, medicine and the military and among other field techniques have to meet two basic requirements. The first [1]. Computers and networking facilities are becoming less prerequisite is perceptual transparency, for example cover expensive and more widespread. Creative approaches to object (object not containing any additional data) and storage, access and distribution of data have generated a stego object (object containing secret message) must be lot of benefits in all field of multimedia. Features such as perceptually indiscernible [5]. Then capacity of data rate distortion-free transmission, compact storage and easy to be embedded. Apart from capacity, all the stego editing have been the main drive for such success. application has need of algorithms that detect and decode However, unrestricted access to digital multimedia has hidden bits without access to the original multimedia virtually unprecedented opportunities to pirate sequence (blind detection algorithm) as well as copyrighted material. As a result, most of the work in robustness to attacks. Robustness to attacks is data hiding has been concentrated on hiding small application dependent. Some application requires a information such as copyright information or a watermark high robustness while others such as authentication in images, audio and video segments. This might application could be fragile in nature. The general information in multimedia object has become very active requirements, challenges and principles of hiding data in in recent years and the developed techniques have grown an audio are the same as those for embedding information and been improved a great deal. Data hiding is also known in a video [6]. Robustness of the hidden data, Corresponding Author: R.F. Olanrewaju, Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, 5728, Kuala Lumpur, Malaysia. Tel: +63 6196542, Fax: +6196 4463, E-mail: frashidah@iium.edu.my 79

techniques have been introduced required knowledge of signal processing techniques, Fourier analysis and area of high level mathematics. When developing a hiding method for audio, one of the first considerations is the likely environments the sound signal will travel between encoding and decoding [1]. The two main areas of modification to be considered are; the storage environment, or digital representation of the signal that will be used and second the transmission pathway the signal might travel [11] Fig. 1: Typical Block diagram of data hiding and retrieval.. Least Significant Bit (LSB): LSB coding is one of for instance, is a key requirement for successful the earliest techniques studied in the information embedding and retrieval of the data. Furthermore, hiding area of audio signal. The LSB watermark encoder standard signal processing operations, such as noise usually selects a subset of all available host audio removal and signal enhancement, must not result in samples chosen by a secret key. The substitution loss or degradation of the embedded information. In operation on the LSBs is performed on this subset, addition, for covert communication, the embedded where the bits to be hidden substitute the original bit information must resist with channel noise and values [4]. intentional attacks or jamming on the signal else a successful attack therefore consists of detecting the Advantages: Very high watermark channel bit rate and a existence of this communication. low computational complexity of the algorithm Background of Audio Steganography: The principle of Disadvantage: Low robustness against signal processing data hiding was adopted at the first International modification. Workshop on Information Hiding, Cambridge, U.K [7]. The terminology is illustrated in Figure 1. Parity Coding: One of the earlier works in audio data A data message is hidden within a cover signal hiding technique is parity. The parity coding method (object) in the block called embedder using a stego key, breaks a signal down into separate regions of samples and which is a secret parameter of a known hiding algorithm encodes each bit from the secret message in a sample [8]. The output or the embedded signal is called stego region s parity bit. If the parity bit of a selected region signal. The embedded message is recovered by using the does match the secret bit to be encoded, the process flips appropriate stego key in the block called extractor. There the LSB of one of the samples in the region. Thus, the are many types of cover objects (signal) that can be used sender has more of a choice in encoding the secret bit and as a carrier of the hidden message; audio video, text and the signal can be changed in a more unobtrusive fashion image. Nowadays data hiding in audio signal is one of the [12]. popular approaches. The idea of data hiding in audio signals comes from imperfection of human auditory Advantage: Very high watermark channel bit rate and a system known as audio masking. In the presence of a load low computational complexity of the algorithm signal (masker), another weaker signal may be inaudible, depending on spectral and temporal characteristics of Disadvantage: Low robustness against signal processing both masked signal and masker [9]. modification. Related Work: Information hiding technique is a new Phase Coding: The phase coding method works by kind of secret communication technology. Varieties of substituting the phase of an initial audio segment with a techniques for embedding information have been reference phase that represents the data. The phase of established. In much the same way most of the authors subsequent segments is adjusted in order to preserve the of the most journal papers mentioned that data hiding in relative phase between segments [13,14]. Phase coding, audio signals exploits imperfection of Human Auditory when it can be used, is one of the most effective coding System (HAS) known as audio masking. All the methods in term of the signal to perceived noise ratio. 8

When the phase relation between each frequency component is dramatically changed, noticeable phase dispersion will occur. However, as long as the modification of the phase is sufficiently small (sufficiently small depends on the observer; professional in broadcast radio can be detect modifications that are unperceivable to an average observer), an inaudible coding can be achieved [11]. Advantage: Robustness against signal modification Disadvantage: Low data transmission rate Spread Spectrum: In a normal communication channel, it is often desirable to concentrate the information in as narrow a region of the frequency spectrum as possible in order to conserve available bandwidth and to reduce power. The basic spread spectrum technique, on the other hand, is designed to encode a stream of information by spreading the encoded data across as much of the frequency spectrum as possible. This allows the signal reception, even if there is interference on some frequencies. While there are many variations on spread spectrum communication, we concentrate on Direct Sequence Spread Spectrum encoding (DSSS). The DSSS method spreads the signal by multiplying it by a chip, a maximal length pseudorandom sequence modulated at a known rate [11,12]. MATERIALS AND METHOD The proposed scheme uses text as the secret data to be hidden in the LSB of audio file taken as cover object because the size of the file is generally small compared to the size of the audio file in which it must be taken. In order to hide the secret data, we use wave audio file at 44.1 khz which have quality of sound characteristics. The method steps are as follow: C Receives the audio file in the form of bytes and converted into bit pattern. C Each character in the message is converted in bit pattern. C Replaces the LSB bit from audio with LSB bit from character in the message. Embedding Process: C Input the text that to be embedded and convert it into the binary. C Read the selected audio file and convert it into binary. C Encoding two binary data into the LSB part of the audio file. C Hide message in audio file. Advantage: Robustness against signal modification Disadvantage: Vulnerability to a time scale modification. Echo Hiding: In echo hiding, information is embedded in a sound file by introducing an echo into the discrete signal. Like the spread spectrum method, it too provides advantages in that it allows for a high data transmission rate and provides superior robustness when compared to the noise inducing methods. If only one echo was produced from the original signal, only one bit of information could be encoded. Therefore, the original signal is broken down into blocks before the encoding process begins. Once the encoding process is completed, the blocks are concatenated back together to create the final signal [8,15]. Advantage: High data transmission Disadvantage: Low robustness against signal processing modification. Fig. 2: Schematic Diagram of proposed embedding procedure Table 1: Samples of audio sound, side and SNR values SOUND SIZE (kb) SNR (db) Sound1 14.7 54.6 Sound2 42.2 55.3 Sound3 83. 55.6 Sound4 83. 58.7 Sound5 42.2 58.2 Sound6 82.3 54.5 Sound7 17.6 5.2 Sound8 11 4. Sound9 18.4 47.4 Sound1 42.2 54.7 81

Table 2: Embedded text and the SNR values TEXT 1.5 Signal -.5 Reference SNR = 54.7 db, SNR = 66.1 db seg -1 1.5 -.5-1 2 SNR (db) Husna 54.7 Husnaa 54.7 Husnaab 54.7 Husnaabc 54.7 Husnaabcd 54.7 Husnaabcde 54.7 Husnaabcdef 54.7 Husnaabcdefg 54.7 Experimental Result: The proposed LSB audio data hiding method was tested to 1 samples of sound. The SNR value between original audio and embedded audio signal was calculated. The text husna was used to hide in the all sample of sound and each sound has difference size. From result in table 1, it shows when the size of file is small the SNR value will drop this is an indication that availability space for embedding is not big if more bits are embedded, there could be distortion in the audio signal. The second experiment was tested with different length of text embedded in the same audio file. The objective of this experiment was to investigate whether the size of secret message will give effect to the SNR value. Sound1 was selected (42.2 kb). The length of the text was increase by factor of 1. From the result in Table 2, it shows that, there are no changes in SNR value when we increase the length of the text. Only when the size of secret message is larger than the audio signal, the embedding process cannot be performed. Figure 3 shows the shape of embedded signal, original signal and the frame SNR. While Figure 4 shows the GUI screen of shot the embedding process. Frame SNR 1-1 Time (s) Fig. 3: Stego Signal, Original Signal and the SNR frame. CONCLUSION In this paper the LSB methods have been introduced as a robust method of hiding data in audio signal. The main objective of hiding data in audio signal is to send the secret data in the safe manner. The method does not changed the size of file even after encoding process, thus our method is suitable for hiding any type of audio data and this method can be used for many applications. Further work is to improve the robustness of the algorithm. REFERENCES Fig. 4: Screen shot of embedding process 1. Boney, L., A.H. Tewfik and K.N. Hamdy, 1996. Digital watermarks for audio signals. Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems, pp: 473-48, 17-23 June. 2. Petrovic, R., J.M. Winograd, K. Jemili and E. Metois, 1999. Data hiding within audio signals. 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, 1: 88-95. 82

3. Olanrewaju, R.F., and A.A. Aburas, 28. 1. Cao, W., Y. Yan and S. Li, 29. Intensive Review on Digital Watermaking. Paper Bit Replacement Audio Watermarking Using Stereo Presented at the International Conference on Signals. International Conference on New Trends in Science And Technology, Penang, Malaysia. Information and Service Science, NISS '9, 4. Cvejic, N. and T. Seppanen, 25. pp: 63-66, June 3 29-July 2. Increasing robustness of LSB audio steganography 11. Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. by reduced distortion LSB coding. Journal of Techniques for data hiding. IBM systems journal, Universal Computer Science, 11(1): 56-65. 35(3.4): 313-336. 5. Cvejic, N. and T. Seppänen, 28. Digital audio 12. Meghanathan, N. and L. Nayak, 21. A review of watermarking techniques and technologies: the audio and video steganalysis algorithms. applications and benchmarks: Information Science Proceedings of the 48th Annual Southeast Regional Publishing. Conference. 6. Ansari, R., H. Malik and A. Khokhar, 24. 13. Chen, X.M., G. Doërr, M. Arnold and P.G. Baum, Data-hiding in audio using frequency-selective 211. Efficient coherent phase quantization for audio phase alteration. watermarking. IEEE International Conference on 7. Embedded, T., 1996. Information hiding terminology. Acoustics, Speech and Signal Processing (ICASSP), precedding of the First International Workshop, pp: 1844-1847, 22-27 May. Cambridge, U.K., May 3 ed by Ross Anderson. 14. Dong, X., M.F. Bocko and Z. Ignjatovic, 24. 8. Bandyopadhyay, S.K., D. Bhattacharyya, Data hiding via phase manipulation of audio signals. D. Ganguly, S. Mukherjee and P. Das, 28. 15. Dutta, P., D. Bhattacharyya and T. Kim, 29. A tutorial review on steganography Data Hiding in Audio Signal: A Review. International 9. Johnston, J. and K. Brandenburg, 1992. Journal of Database Theory and Application, Wideband coding-perceptual considerations for 2(2): 1-8. speech and music: New York: Dekker, pp: 19-14. 83