SlideShare a Scribd company logo
1 of 36
MULTI-LEVEL AUDIO
STEGANOGRAPHY
Seminar Guide Presented by
1
Overview
 Steganography.
 Evolution.
 Basic Steganography Model.
 Encoding & Decoding.
 Related Works.
 Steganography Terms.
 Types of Steganography.
 Study of Multi-Level audio steganography.
 Future Scope.
 Conclusion.
 References.
2
Steganography
 Comes from Greek
- steganos = “covered”
- graphei = “writing”
 Also known as “covered writing”.
 Deals with hiding communicated data.
 Hiding one piece of data within another.
 Only recipient can identify the data using key.
3
Evolution
Watermarking
Cryptography
Steganography
4
Related Work
 Multi-Level Steganographic Algorithm for Audio
Steganography using LSB Modification .
 Multi-Level Steganography which defines a new concept
for hidden communication in telecommunication
networks .
 Audio Steganography using LSB Modification and Parity
Encoding Technique.
5
Basic Steganography Model
6
Encoding
• Prepare
cover data
Step1
• Encode
embedded
data with cover
data
Step 2
• Steganographic
data
Step 3
7
Decoding
• Steganographic
Data
Step1
• Decode
Plain info
Step 2
• Embedded
data
obtained
Step 3
8
Steganography Terms
 Carrier or Cover File - Original message is hidden
inside it .
 Stego-Medium - Medium in which the information is
hidden.
 Embedded or Payload - Information which is to be
hidden or concealed.
 Steganalysis - Process of detecting hidden information
inside a file.
9
Types of Steganography
1. Text/Document Steganography.
2. Image Steganography.
3. Audio Steganography.
4. Network / Protocol Steganography.
10
Text/Document Steganography
 The “carrier” is a text document.
 Data is hidden behind every nth letter.
 Three methods
1. Format based Method.
2. Random and statistical Method.
3. Linguistics Method.
11
Image Steganography
 Cover object is an Image.
 Pixel intensities are used.
 Three methods
1. Least Significant Bit Insertion.
2. Static Parsing Steganography(SPS).
3. Masking and Filtering.
12
Network / Protocol Steganography
 Hiding with the help of network protocols
 Example cover objects are :
TCP, ICMP, IP etc
 OSI layer network model can be used.
13
Audio Steganography
 Embedding secret messages into digital sound.
 WAV, AU, and MP3 sound files can be used.
 Human auditory system (HAS) are exploited.
 Methods of audio steganography are :
1. LSB coding .
2. Parity coding .
3. Phase coding.
14
LSB Coding
 LSB bit is used for data embedding.
 Using LSB increases the capacity
 And decreases the transparency.
 Advantages are :
- Low computational complexity
- Easier Implementation
- Variation in choosing LSB
15
LSB Encoding & Decoding
 Low bit encoder  Low bit decoder
16
Parity Coding
 Encode message in the parity bit region.
 Signal break down into separate region.
 Flipping to LSB is possible.
 Advantage :
- Sender has more of a choice in encoding.
17
Phase Coding
• HAS can’t recognize the phase change in audio signal.
• Encode phase of an audio segment with a data .
18
Multi-Level Steganography(MLS)
 Combination of two or more steganography methods.
 Consist of three levels :
1. Upper Level.
2. Middle Level.
3. Lower Level.
 Layering approach is used.
 Three messages can be transmitted .
19
Overview of MLS
 Mainly there are three permutations for MLS.
20
Permutation 1
21
Permutation 2
22
Permutation 3
23
Multi-Level Steganography(MSL)
 Stego audios is compared with PSNR graph.
 With help of two equations -
1. Mean Squared Error (MSE):
2. Peak Signal-to-Noise Ratio (PSNR):
24
Before & After Steganography
25
Comparison with PSNR Graph
 This hides three secret messages.
 No visible changes in graphs.
 Undetectability is achieved
 Hence high security.
26
Advantages
 Potential capability to hide existence of data.
 Hardness of detecting the hidden (i.e., embedded) data.
 Strengthening of the security of the encrypted data.
 Maintain clarity of audio signal.
27
Disadvantages
 If the all algorithms are known Leakage occurs.
 Password leakage also may occur.
28
 Confidential communication and secret data storing.
 Protection of data alteration.
 Access control system for digital content distribution.
 Media Database systems.
 Use by intelligence services.
Applications
29
Cryptography vs. Steganography
30
 The difference is in their goals...
- Cryptography: although encypted and unreadable, the existence
of data is not hidden.
- Steganography: no knowledge of the existence of the data .
Cryptography
cryptos
hidden
graphia
writing
Steganography
steganos graphia
covered writing
Watermarking vs. Steganography
 Goal of steganography
– Intruder cannot detect a message
 Goal of watermarking
– Intruder cannot remove or replace the message
31
Future Scope
 Further we can extend this approach by combining any
four techniques or more.
 By combining more techniques we can increase capacity
 The system becomes more secure towards detection.
32
Conclusion
 Based on three different techniques.
 Technique for hiding text data into digital audio files .
 Three secret messages can be hidden.
 Uses three traditional method of steganography
 Level based approach to reach the goal.
 The output stego object is very difficult to decode .
 Which makes this method successful in the world.
33
Reference
[1] Jasleen Kour, Deepankar Verma “ Steganography Techniques –A Review Paper “
Volume-3, Issue-5 ,2014
[2] Ramandeep Kaur ,Jagriti Bhatia ,Hardeep Singh,Rajesh Kumar
“Multilevel Technique to Improve PSNR and MSE in Audio Steganography “
Volume 103 – No.5, October 2014
[3] Nitasha, Nidhi Sood” Enhancing the Security of Multilevel Audio
Steganography” May - 2014
[4] Prof. Samir Kumar Bandyopadhyay and Barnali Gupta Banik: “Multi-Level
Steganographic Algorithm for Audio Steganography using LSB Modification
and Parity Encoding Technique”, Volume 1, Issue 2, July – August 2012.
[5] “audio steg: methods”, Internet publication on
http://www.snotmonkey.com/work/school/405/methods.html
34
35
36
QUERIES

More Related Content

What's hot

What's hot (20)

Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 

Similar to Multi-Level audio steganography

Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
IJRAT
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
Alexander Decker
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 

Similar to Multi-Level audio steganography (20)

HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSHIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
K0815660
K0815660K0815660
K0815660
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
 

More from ARYA TM (13)

Ftp
FtpFtp
Ftp
 
Dns
DnsDns
Dns
 
Process management
Process managementProcess management
Process management
 
Useradmin
Useradmin Useradmin
Useradmin
 
Webserver
WebserverWebserver
Webserver
 
Basic
BasicBasic
Basic
 
Crontab
CrontabCrontab
Crontab
 
package mangement
package mangementpackage mangement
package mangement
 
s3
s3s3
s3
 
AWS
AWSAWS
AWS
 
EBS elastic block store
EBS elastic block storeEBS elastic block store
EBS elastic block store
 
DevOps
DevOps DevOps
DevOps
 
Side final 2
Side final 2Side final 2
Side final 2
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 

Recently uploaded (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

Multi-Level audio steganography

  • 2. Overview  Steganography.  Evolution.  Basic Steganography Model.  Encoding & Decoding.  Related Works.  Steganography Terms.  Types of Steganography.  Study of Multi-Level audio steganography.  Future Scope.  Conclusion.  References. 2
  • 3. Steganography  Comes from Greek - steganos = “covered” - graphei = “writing”  Also known as “covered writing”.  Deals with hiding communicated data.  Hiding one piece of data within another.  Only recipient can identify the data using key. 3
  • 5. Related Work  Multi-Level Steganographic Algorithm for Audio Steganography using LSB Modification .  Multi-Level Steganography which defines a new concept for hidden communication in telecommunication networks .  Audio Steganography using LSB Modification and Parity Encoding Technique. 5
  • 7. Encoding • Prepare cover data Step1 • Encode embedded data with cover data Step 2 • Steganographic data Step 3 7
  • 8. Decoding • Steganographic Data Step1 • Decode Plain info Step 2 • Embedded data obtained Step 3 8
  • 9. Steganography Terms  Carrier or Cover File - Original message is hidden inside it .  Stego-Medium - Medium in which the information is hidden.  Embedded or Payload - Information which is to be hidden or concealed.  Steganalysis - Process of detecting hidden information inside a file. 9
  • 10. Types of Steganography 1. Text/Document Steganography. 2. Image Steganography. 3. Audio Steganography. 4. Network / Protocol Steganography. 10
  • 11. Text/Document Steganography  The “carrier” is a text document.  Data is hidden behind every nth letter.  Three methods 1. Format based Method. 2. Random and statistical Method. 3. Linguistics Method. 11
  • 12. Image Steganography  Cover object is an Image.  Pixel intensities are used.  Three methods 1. Least Significant Bit Insertion. 2. Static Parsing Steganography(SPS). 3. Masking and Filtering. 12
  • 13. Network / Protocol Steganography  Hiding with the help of network protocols  Example cover objects are : TCP, ICMP, IP etc  OSI layer network model can be used. 13
  • 14. Audio Steganography  Embedding secret messages into digital sound.  WAV, AU, and MP3 sound files can be used.  Human auditory system (HAS) are exploited.  Methods of audio steganography are : 1. LSB coding . 2. Parity coding . 3. Phase coding. 14
  • 15. LSB Coding  LSB bit is used for data embedding.  Using LSB increases the capacity  And decreases the transparency.  Advantages are : - Low computational complexity - Easier Implementation - Variation in choosing LSB 15
  • 16. LSB Encoding & Decoding  Low bit encoder  Low bit decoder 16
  • 17. Parity Coding  Encode message in the parity bit region.  Signal break down into separate region.  Flipping to LSB is possible.  Advantage : - Sender has more of a choice in encoding. 17
  • 18. Phase Coding • HAS can’t recognize the phase change in audio signal. • Encode phase of an audio segment with a data . 18
  • 19. Multi-Level Steganography(MLS)  Combination of two or more steganography methods.  Consist of three levels : 1. Upper Level. 2. Middle Level. 3. Lower Level.  Layering approach is used.  Three messages can be transmitted . 19
  • 20. Overview of MLS  Mainly there are three permutations for MLS. 20
  • 24. Multi-Level Steganography(MSL)  Stego audios is compared with PSNR graph.  With help of two equations - 1. Mean Squared Error (MSE): 2. Peak Signal-to-Noise Ratio (PSNR): 24
  • 25. Before & After Steganography 25
  • 26. Comparison with PSNR Graph  This hides three secret messages.  No visible changes in graphs.  Undetectability is achieved  Hence high security. 26
  • 27. Advantages  Potential capability to hide existence of data.  Hardness of detecting the hidden (i.e., embedded) data.  Strengthening of the security of the encrypted data.  Maintain clarity of audio signal. 27
  • 28. Disadvantages  If the all algorithms are known Leakage occurs.  Password leakage also may occur. 28
  • 29.  Confidential communication and secret data storing.  Protection of data alteration.  Access control system for digital content distribution.  Media Database systems.  Use by intelligence services. Applications 29
  • 30. Cryptography vs. Steganography 30  The difference is in their goals... - Cryptography: although encypted and unreadable, the existence of data is not hidden. - Steganography: no knowledge of the existence of the data . Cryptography cryptos hidden graphia writing Steganography steganos graphia covered writing
  • 31. Watermarking vs. Steganography  Goal of steganography – Intruder cannot detect a message  Goal of watermarking – Intruder cannot remove or replace the message 31
  • 32. Future Scope  Further we can extend this approach by combining any four techniques or more.  By combining more techniques we can increase capacity  The system becomes more secure towards detection. 32
  • 33. Conclusion  Based on three different techniques.  Technique for hiding text data into digital audio files .  Three secret messages can be hidden.  Uses three traditional method of steganography  Level based approach to reach the goal.  The output stego object is very difficult to decode .  Which makes this method successful in the world. 33
  • 34. Reference [1] Jasleen Kour, Deepankar Verma “ Steganography Techniques –A Review Paper “ Volume-3, Issue-5 ,2014 [2] Ramandeep Kaur ,Jagriti Bhatia ,Hardeep Singh,Rajesh Kumar “Multilevel Technique to Improve PSNR and MSE in Audio Steganography “ Volume 103 – No.5, October 2014 [3] Nitasha, Nidhi Sood” Enhancing the Security of Multilevel Audio Steganography” May - 2014 [4] Prof. Samir Kumar Bandyopadhyay and Barnali Gupta Banik: “Multi-Level Steganographic Algorithm for Audio Steganography using LSB Modification and Parity Encoding Technique”, Volume 1, Issue 2, July – August 2012. [5] “audio steg: methods”, Internet publication on http://www.snotmonkey.com/work/school/405/methods.html 34
  • 35. 35