SlideShare a Scribd company logo
1 of 7
Download to read offline
Dalal, Khamael & Mohammed
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 135
A New Steganographic Method for Embedded Image
In Audio File
Dalal N. Hmood dal_scin81@yahoo.com
Computer Department/College of Science
University AL-Nahrain
Baghdad, 10001, Iraq
Khamael A. Khudhiar khamail_abbas@yahoo.com
Computer Department/College of Science
University AL-Nahrain
Baghdad, 10001, Iraq
Mohammed S. Altaei mohammedaltaie@yahoo.com
Computer Department/College of Science
University AL-Nahrain
Baghdad, 10001, Iraq
Abstract
Because secure transaction of information is increasing day by day therefore Steganography has
become very important and used modern strategies. Steganography is a strategy in which
required information is concealment in any other information such that the second information
does not change significantly and it appears the same as original. This work presents a new
approach of concealment encrypted mobile image in a audio file.The proposed work is replacing
two LSB of each byte in audio file and these bytes are choices as randomly location. It becomes
very difficult for intruder to guess that an image is hidden in the audio.
Keywords: Steganography,Encrypted, Wavelet,Quantization,LSB;
1. INTRODUCTION
In computer terms, steganography has evolved into the practice of hiding a message within a
larger one in such a way that others cannot discern the presence or contents of the hidden
message. In contemporary terms, steganography has evolved into a digital strategy of hiding a
file in some form of multimedia, such as an image, an audio file (like a .wav or mp3) or even a
video file[1]. Steganographic systems, can be divided into two categories, one is in which the very
existence of the message is kept secret, and non steganographic systems, in which the existence
of the message need not be secret[3].
The main goal of steganography is to communicate securely in a completely undetectable
manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep
others from knowing the hidden information, but it is to keep others from thinking that the
information even exists. If a steganography method causes someone to suspect the carrier
medium, then the method has failed [2].
This paper is an attempt uses an audio file as a cover media to hide an mobile image without
making noticeable changes to the file structure and contents of the audio file based on two Least
Significant Bit insertion method of the low part of the audio file, as it has been already proved that
modification of LSB creates a minimal change in the audio file format. Section 2 describes some
of the related work, Section 3 describes hiding Methodology, section 4 describes experiments
and results. Conclusions are explain in Section 5.
Dalal, Khamael & Mohammed
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 136
2. RELATED WORK AND CONTRIBUTION
Information hiding is the technology to embed the secret information into a cover data in a way
that keeps the secret information invisible. This paper presents a new steganographic method for
embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding
in audio and its comparison with simple Least Significant Bit insertion method of data hiding in
voiced audio.
Steganography has become great area of interest for researchers as need for secure transaction
of information is increasing day by day. Information may be text, image, audio or video.
Steganography is a technique in which required information is hided in any other information such
that the second information does not change significantly and it appears the same as original.
This paper presents a novel approach of hiding image in a video. The proposed algorithm is
replacing one LSB of each pixel in video frames. It becomes very difficult for intruder to guess
that an image is hidden in the video as individual frames are very difficult to analyze in a video
running at 30 frames per second. The process of analysis has been made more difficult by hiding
each row of image pixels in multiple frames of the video, so intruder cannot even try to unhide
image until he get full video.
In other paper taken an in-depth look on steganography by proposing a new method of Audio
Steganography. Emphasize will be on the proposed scheme of image hiding in audio and its
comparison with simple Least Significant Bit insertion method for data hiding in audio. The
contribution of present paper is segmenting audio file in two bands (low band and high band) and
used high band(unvoiced) for hidden encrypted image,and used a new approach for generate key
from encrypted image .In most paper use 1LSB but we used in this paper 2LSB.
3- PROPOSED METHODOLOGY
This proposed method to hide encrypted image in audio file (.wav) as shown in FIGURE 1
Algorithm for embedded image
Start
Input audio file (.wav)
Wavelet
Quantization for high band
Key generation
Dewavelet
End
Input Image
Gray image
Encrypted image
Dalal, Khamael & Mohammed
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 137
3.1 Encrypted Image
Message is the data that the sender wishes to remain it confidential. It can be plain text, other
image, or anything that can be embedded in a hit stream such as a copyright mark, a covert
communication, or AUDIO file.
After convert color image to gray image each byte in the image is converted into binary
representation. for an example if we are taking the first byte in the image equal 97 then “first
byte=“ 01100001 is stored in byte array. Because binary equivalent for 97 is 01100001, and then
used the rotate bits of image and randomly key that we choose between (0-255) such as 128 BY
using XOR operation to encrypted image, as shown in the FIGURE 2.
FIGURE 2 Encrypted Image
3.2 Generated Random Key From Encrypted Image
The best means of obtaining unpredictable random numbers is by measuring physical
phenomena such as radioactive decay, thermal noise in semiconductors, sound samples taken in
a noisy environment, and even digitized images of a lava lamp. However few computers (or
users) have access to the kind of specialized hardware required for these sources, and must rely
on other means of obtaining random data.
The term “practically strong randomness” is used here to represent randomness which isn’t
cryptographically strong by the usual definitions but which is as close to it as is practically
possible.Due to size constraints, a discussion of the nature of randomness, especially
cryptographically strong randomness, is beyond the scope of this work. A good general overview
of what constitutes randomness, what sort of sources is useful (and not useful), and how to
process the data from them, For example: - pixel value of image was 99
0 1 2 3 4 5 6 7
Rotate the bit
0 1 2 3 4 5 6 7
Implemented XOR between bits of pixel and bits after rotate
0 1 2 3 4 5 6 7
0 0 1 0 0 1 1 0
0 1 1 0 0 1 0 0
0 1 0 0 0 0 1 0
Input Image
Encrypted Image
Dalal, Khamael & Mohammed
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 138
2 0 0 1
The last stage finds the summation of two bits
The key= 2+0+0+1=3
0
Key= 2*)(
3
0
12*
2*
k
i
i
ij
jbyte∑ ∑=
+
=
k= --------------- (1)
1
The last stage using equ.1 to calculate key
3.3 Wavelet Transform:
The original sound signal is broken up into two parts low frequency and high frequency using
Wavelet Transform then used high frequency part to embedded encoded image.
Low frequency of High frequency of
Wavelets of audio file Wavelet of audio file
3.4 Least Significant Bit replacement (or coding)
Least significant bit (LSB) coding is the simplest way to embed information in a digital audio file.
By substituting the two least significant bit of each sampling point with a binary message, LSB
coding allows for a large amount of data to be encoded.LSB is the most simple and a straight
forward approach to embed or hide a message into a cover-audio [3]. The message is embedded
with sequence-mapping technique in the bit of a cover-audio. Although LSB hides the message in
such way that the humans do not perceive it, it is still possible for the opponent to retrieve the
message due to the simplicity of the technique. Therefore, malicious people can easily try to
extract the message from the beginning of the audio if they are suspicious that there exists secret
information that was embedded in the audio.
3.5-Getting Encrypted Image From Audio File
In this system using the reverse steps for the proposed Method for getting encrypted image and
then decrypted for getting the original image in which hiding in the audio file.
4. EXPERMINAT AND RESULT
Encrypted low resolution image with size(m×n) and hiding in audio file after processing illustrated
sequence above and shown result in Figures(2,3,4,5,6,7).
FIGURE 2: Encrypted Image
Input Image
Decrypted Image
LOW HIGH
Dalal, Khamael & Mohammed
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 139
FIGURE 3:Original wave
FIGURE 4:Wavelet of audio file
Low frequency high frequency
TABLE 1: Data of Wavelet of audio file before embedded encrypted image
original image gray image encrypted image
FIGURE 5: Encrypted Low Resolution image
FIGURE 6: Hiding image in audio file
Low frequency high frequency
TABLE 2: Data of Wavelet of audio file after embedded encrypted image
128 128 128 127 128 128 128 128 128 2 0 8 3 4 6 5 2 0 2 0 4
128 128 128 127 128 128 128 128 128 2 1 8 7 3 6 5 0 0 2 2 4
Dalal, Khamael & Mohammed
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 140
FIGURE 7: stego audio file
To measure the difference between the original cover and stego-audio we use the Peak Signal to
Noise Ration (PSNR), which expressed as the following equation [2,3]
PSNR=10Log10 MSE
2
255
……………………….. (2)
and Mean-Square Error (MSE) is defined as:-
MSE=
2
1
)(
1
∑=
′
−
M
J
JJ XX
M
……………………….. (3)
5. CONCLUSION
A new approach of embedding an image data into the audio file using LSB based Audio
Steganography has been successfully developed and implemented as discussed in this paper.
Proposed method is hiding encrypted image in random position based on encrypted byte of
image in low frequency of audio file using 2LSB algorithm .Better results are analyzed by both the
subjective listening testing i.e. Mean Opinion Score and Objective testing i.e. signal to noise ratio
graphs. Moreover, how the performance is affected by changing different bit positions has also
been reported in this work using (PSNR =61.863 and MSE=0.329). The main aim of this research
work was embedding of image into audio as a case of audio steganography. In test cases, the
image data has been successfully embedded and extracted from the audio file.
6. REFERENCES
[1] Jain Ankit, "Steganography : A solution for data hiding", Guru Nanak Dev Engineering
College, Ludhiana
[2] Pradeep Kumar Singh, and R.K.Aggrawal, "Enhancement of LSB based Steganography for
Hiding Image in Audio", International Journal on Computer Science and Engineering, Vol. 02,
No. 05, 2010, P 1652-P1658.
[3] MAZLEENA S., MOHD R. K., MUHALIM M. A., and SUBARIAH I., " INFORMATION HIDING
USING STEGANOGRAPHY", UNIVERSITI TEKNOLOGI MALAYSIA, 2003.
[4] Kriti Saroha and Pradeep Kumar Singh, "A Variant of LSB Steganography for Hiding Images
in Audio", International Journal of Computer Applications, Volume 11– No.6, December 2010.
[5] Kriti Saroha SOIT CDAC U.P., INDIA Pradeep Kumar Singh Department of Computer
Science ,KIETU.P., INDIA “A Variant of LSB Steganography for Hiding Images inAudio”
International Journal of Computer Applications (0975 – 8887)Volume 11– No.6, December
2010
[6] Dr Osamah Abdulgader Al-rababah,”A Steganography Method Based on Hiding secrete data
in MPEG/Audio Layer III*” College of Alkamel - Computer Department king Abdulaziz
university- 110Alkamel 21931 Jedda, Saudia Arabia, IJCSNS International Journal of
Computer Science and Network S 202 ecurity, VOL.10 No.7, July 2010
Dalal, Khamael & Mohammed
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 141
[7] Souvik Bhattacharyya and Gautam Sanyal, "Hiding Data in Images Using PCP", International
Journal of Computer and Information Engineering 3:3 2009.

More Related Content

What's hot

Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodHimanshu Bal
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Encrypted sensing of fingerprint image
Encrypted sensing of fingerprint imageEncrypted sensing of fingerprint image
Encrypted sensing of fingerprint imageDhirendraKumar170
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAlexander Decker
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...IAEME Publication
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELijcsit
 

What's hot (20)

Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Image encryption
Image encryptionImage encryption
Image encryption
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Encrypted sensing of fingerprint image
Encrypted sensing of fingerprint imageEncrypted sensing of fingerprint image
Encrypted sensing of fingerprint image
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hiding
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
 

Viewers also liked

企画突っ込み
企画突っ込み企画突っ込み
企画突っ込みbikeexplorer
 
Assignment 02 masks
Assignment 02 masksAssignment 02 masks
Assignment 02 masksLam Yu
 
Landscape project proposal
Landscape project proposalLandscape project proposal
Landscape project proposalLam Yu
 
ամանորի առաջին օրը
ամանորի առաջին օրըամանորի առաջին օրը
ամանորի առաջին օրըMark Hovsepyan
 
AAAResume wref 2016
AAAResume wref 2016 AAAResume wref 2016
AAAResume wref 2016 Alan Atherton
 
Մխիթար Սեբաստացի
Մխիթար ՍեբաստացիՄխիթար Սեբաստացի
Մխիթար ՍեբաստացիMark Hovsepyan
 
Мой любимый спорт
Мой любимый спортМой любимый спорт
Мой любимый спортmanushak
 
Նռան աղցան
Նռան աղցանՆռան աղցան
Նռան աղցանdavit9
 
RIWC_ Dr Tom Shakespeare - RI Sexuality Presentation
RIWC_ Dr Tom Shakespeare - RI Sexuality PresentationRIWC_ Dr Tom Shakespeare - RI Sexuality Presentation
RIWC_ Dr Tom Shakespeare - RI Sexuality PresentationMarco Muscroft
 
երվանդունիներ
երվանդունիներերվանդունիներ
երվանդունիներa-r-e-n-2004
 
Քիմիական և ֆիզիկական երևույթները մեր շրջապատում
Քիմիական և ֆիզիկական երևույթները մեր շրջապատումՔիմիական և ֆիզիկական երևույթները մեր շրջապատում
Քիմիական և ֆիզիկական երևույթները մեր շրջապատումtikoarzumanyan2004
 
Սարահարթ
ՍարահարթՍարահարթ
Սարահարթdavit9
 
RIWC David ruebain presentation
RIWC David ruebain presentationRIWC David ruebain presentation
RIWC David ruebain presentationMarco Muscroft
 
Sage summit presentation iigservices
Sage summit presentation iigservicesSage summit presentation iigservices
Sage summit presentation iigservicesEmil Yeritsyan
 
Աչք և տեսողություն
Աչք և տեսողությունԱչք և տեսողություն
Աչք և տեսողությունMark Hovsepyan
 

Viewers also liked (18)

RIWC_Dame Anne Begg
RIWC_Dame Anne BeggRIWC_Dame Anne Begg
RIWC_Dame Anne Begg
 
企画突っ込み
企画突っ込み企画突っ込み
企画突っ込み
 
RIWC_ Liz Sayce
RIWC_ Liz SayceRIWC_ Liz Sayce
RIWC_ Liz Sayce
 
Assignment 02 masks
Assignment 02 masksAssignment 02 masks
Assignment 02 masks
 
Landscape project proposal
Landscape project proposalLandscape project proposal
Landscape project proposal
 
ամանորի առաջին օրը
ամանորի առաջին օրըամանորի առաջին օրը
ամանորի առաջին օրը
 
AAAResume wref 2016
AAAResume wref 2016 AAAResume wref 2016
AAAResume wref 2016
 
Մխիթար Սեբաստացի
Մխիթար ՍեբաստացիՄխիթար Սեբաստացի
Մխիթար Սեբաստացի
 
Мой любимый спорт
Мой любимый спортМой любимый спорт
Мой любимый спорт
 
Նռան աղցան
Նռան աղցանՆռան աղցան
Նռան աղցան
 
RIWC_ Dr Tom Shakespeare - RI Sexuality Presentation
RIWC_ Dr Tom Shakespeare - RI Sexuality PresentationRIWC_ Dr Tom Shakespeare - RI Sexuality Presentation
RIWC_ Dr Tom Shakespeare - RI Sexuality Presentation
 
երվանդունիներ
երվանդունիներերվանդունիներ
երվանդունիներ
 
Քիմիական և ֆիզիկական երևույթները մեր շրջապատում
Քիմիական և ֆիզիկական երևույթները մեր շրջապատումՔիմիական և ֆիզիկական երևույթները մեր շրջապատում
Քիմիական և ֆիզիկական երևույթները մեր շրջապատում
 
Սարահարթ
ՍարահարթՍարահարթ
Սարահարթ
 
RIWC David ruebain presentation
RIWC David ruebain presentationRIWC David ruebain presentation
RIWC David ruebain presentation
 
Gestacao alto risco
Gestacao alto riscoGestacao alto risco
Gestacao alto risco
 
Sage summit presentation iigservices
Sage summit presentation iigservicesSage summit presentation iigservices
Sage summit presentation iigservices
 
Աչք և տեսողություն
Աչք և տեսողությունԱչք և տեսողություն
Աչք և տեսողություն
 

Similar to A New Steganographic Method for Embedded Image In Audio File

IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust ChannelsIRJET Journal
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyMonica Turner
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
 
B03208016
B03208016B03208016
B03208016inventy
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 

Similar to A New Steganographic Method for Embedded Image In Audio File (20)

A04020107
A04020107A04020107
A04020107
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
B03208016
B03208016B03208016
B03208016
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

A New Steganographic Method for Embedded Image In Audio File

  • 1. Dalal, Khamael & Mohammed International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 135 A New Steganographic Method for Embedded Image In Audio File Dalal N. Hmood dal_scin81@yahoo.com Computer Department/College of Science University AL-Nahrain Baghdad, 10001, Iraq Khamael A. Khudhiar khamail_abbas@yahoo.com Computer Department/College of Science University AL-Nahrain Baghdad, 10001, Iraq Mohammed S. Altaei mohammedaltaie@yahoo.com Computer Department/College of Science University AL-Nahrain Baghdad, 10001, Iraq Abstract Because secure transaction of information is increasing day by day therefore Steganography has become very important and used modern strategies. Steganography is a strategy in which required information is concealment in any other information such that the second information does not change significantly and it appears the same as original. This work presents a new approach of concealment encrypted mobile image in a audio file.The proposed work is replacing two LSB of each byte in audio file and these bytes are choices as randomly location. It becomes very difficult for intruder to guess that an image is hidden in the audio. Keywords: Steganography,Encrypted, Wavelet,Quantization,LSB; 1. INTRODUCTION In computer terms, steganography has evolved into the practice of hiding a message within a larger one in such a way that others cannot discern the presence or contents of the hidden message. In contemporary terms, steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file (like a .wav or mp3) or even a video file[1]. Steganographic systems, can be divided into two categories, one is in which the very existence of the message is kept secret, and non steganographic systems, in which the existence of the message need not be secret[3]. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. If a steganography method causes someone to suspect the carrier medium, then the method has failed [2]. This paper is an attempt uses an audio file as a cover media to hide an mobile image without making noticeable changes to the file structure and contents of the audio file based on two Least Significant Bit insertion method of the low part of the audio file, as it has been already proved that modification of LSB creates a minimal change in the audio file format. Section 2 describes some of the related work, Section 3 describes hiding Methodology, section 4 describes experiments and results. Conclusions are explain in Section 5.
  • 2. Dalal, Khamael & Mohammed International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 136 2. RELATED WORK AND CONTRIBUTION Information hiding is the technology to embed the secret information into a cover data in a way that keeps the secret information invisible. This paper presents a new steganographic method for embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method of data hiding in voiced audio. Steganography has become great area of interest for researchers as need for secure transaction of information is increasing day by day. Information may be text, image, audio or video. Steganography is a technique in which required information is hided in any other information such that the second information does not change significantly and it appears the same as original. This paper presents a novel approach of hiding image in a video. The proposed algorithm is replacing one LSB of each pixel in video frames. It becomes very difficult for intruder to guess that an image is hidden in the video as individual frames are very difficult to analyze in a video running at 30 frames per second. The process of analysis has been made more difficult by hiding each row of image pixels in multiple frames of the video, so intruder cannot even try to unhide image until he get full video. In other paper taken an in-depth look on steganography by proposing a new method of Audio Steganography. Emphasize will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method for data hiding in audio. The contribution of present paper is segmenting audio file in two bands (low band and high band) and used high band(unvoiced) for hidden encrypted image,and used a new approach for generate key from encrypted image .In most paper use 1LSB but we used in this paper 2LSB. 3- PROPOSED METHODOLOGY This proposed method to hide encrypted image in audio file (.wav) as shown in FIGURE 1 Algorithm for embedded image Start Input audio file (.wav) Wavelet Quantization for high band Key generation Dewavelet End Input Image Gray image Encrypted image
  • 3. Dalal, Khamael & Mohammed International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 137 3.1 Encrypted Image Message is the data that the sender wishes to remain it confidential. It can be plain text, other image, or anything that can be embedded in a hit stream such as a copyright mark, a covert communication, or AUDIO file. After convert color image to gray image each byte in the image is converted into binary representation. for an example if we are taking the first byte in the image equal 97 then “first byte=“ 01100001 is stored in byte array. Because binary equivalent for 97 is 01100001, and then used the rotate bits of image and randomly key that we choose between (0-255) such as 128 BY using XOR operation to encrypted image, as shown in the FIGURE 2. FIGURE 2 Encrypted Image 3.2 Generated Random Key From Encrypted Image The best means of obtaining unpredictable random numbers is by measuring physical phenomena such as radioactive decay, thermal noise in semiconductors, sound samples taken in a noisy environment, and even digitized images of a lava lamp. However few computers (or users) have access to the kind of specialized hardware required for these sources, and must rely on other means of obtaining random data. The term “practically strong randomness” is used here to represent randomness which isn’t cryptographically strong by the usual definitions but which is as close to it as is practically possible.Due to size constraints, a discussion of the nature of randomness, especially cryptographically strong randomness, is beyond the scope of this work. A good general overview of what constitutes randomness, what sort of sources is useful (and not useful), and how to process the data from them, For example: - pixel value of image was 99 0 1 2 3 4 5 6 7 Rotate the bit 0 1 2 3 4 5 6 7 Implemented XOR between bits of pixel and bits after rotate 0 1 2 3 4 5 6 7 0 0 1 0 0 1 1 0 0 1 1 0 0 1 0 0 0 1 0 0 0 0 1 0 Input Image Encrypted Image
  • 4. Dalal, Khamael & Mohammed International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 138 2 0 0 1 The last stage finds the summation of two bits The key= 2+0+0+1=3 0 Key= 2*)( 3 0 12* 2* k i i ij jbyte∑ ∑= + = k= --------------- (1) 1 The last stage using equ.1 to calculate key 3.3 Wavelet Transform: The original sound signal is broken up into two parts low frequency and high frequency using Wavelet Transform then used high frequency part to embedded encoded image. Low frequency of High frequency of Wavelets of audio file Wavelet of audio file 3.4 Least Significant Bit replacement (or coding) Least significant bit (LSB) coding is the simplest way to embed information in a digital audio file. By substituting the two least significant bit of each sampling point with a binary message, LSB coding allows for a large amount of data to be encoded.LSB is the most simple and a straight forward approach to embed or hide a message into a cover-audio [3]. The message is embedded with sequence-mapping technique in the bit of a cover-audio. Although LSB hides the message in such way that the humans do not perceive it, it is still possible for the opponent to retrieve the message due to the simplicity of the technique. Therefore, malicious people can easily try to extract the message from the beginning of the audio if they are suspicious that there exists secret information that was embedded in the audio. 3.5-Getting Encrypted Image From Audio File In this system using the reverse steps for the proposed Method for getting encrypted image and then decrypted for getting the original image in which hiding in the audio file. 4. EXPERMINAT AND RESULT Encrypted low resolution image with size(m×n) and hiding in audio file after processing illustrated sequence above and shown result in Figures(2,3,4,5,6,7). FIGURE 2: Encrypted Image Input Image Decrypted Image LOW HIGH
  • 5. Dalal, Khamael & Mohammed International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 139 FIGURE 3:Original wave FIGURE 4:Wavelet of audio file Low frequency high frequency TABLE 1: Data of Wavelet of audio file before embedded encrypted image original image gray image encrypted image FIGURE 5: Encrypted Low Resolution image FIGURE 6: Hiding image in audio file Low frequency high frequency TABLE 2: Data of Wavelet of audio file after embedded encrypted image 128 128 128 127 128 128 128 128 128 2 0 8 3 4 6 5 2 0 2 0 4 128 128 128 127 128 128 128 128 128 2 1 8 7 3 6 5 0 0 2 2 4
  • 6. Dalal, Khamael & Mohammed International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 140 FIGURE 7: stego audio file To measure the difference between the original cover and stego-audio we use the Peak Signal to Noise Ration (PSNR), which expressed as the following equation [2,3] PSNR=10Log10 MSE 2 255 ……………………….. (2) and Mean-Square Error (MSE) is defined as:- MSE= 2 1 )( 1 ∑= ′ − M J JJ XX M ……………………….. (3) 5. CONCLUSION A new approach of embedding an image data into the audio file using LSB based Audio Steganography has been successfully developed and implemented as discussed in this paper. Proposed method is hiding encrypted image in random position based on encrypted byte of image in low frequency of audio file using 2LSB algorithm .Better results are analyzed by both the subjective listening testing i.e. Mean Opinion Score and Objective testing i.e. signal to noise ratio graphs. Moreover, how the performance is affected by changing different bit positions has also been reported in this work using (PSNR =61.863 and MSE=0.329). The main aim of this research work was embedding of image into audio as a case of audio steganography. In test cases, the image data has been successfully embedded and extracted from the audio file. 6. REFERENCES [1] Jain Ankit, "Steganography : A solution for data hiding", Guru Nanak Dev Engineering College, Ludhiana [2] Pradeep Kumar Singh, and R.K.Aggrawal, "Enhancement of LSB based Steganography for Hiding Image in Audio", International Journal on Computer Science and Engineering, Vol. 02, No. 05, 2010, P 1652-P1658. [3] MAZLEENA S., MOHD R. K., MUHALIM M. A., and SUBARIAH I., " INFORMATION HIDING USING STEGANOGRAPHY", UNIVERSITI TEKNOLOGI MALAYSIA, 2003. [4] Kriti Saroha and Pradeep Kumar Singh, "A Variant of LSB Steganography for Hiding Images in Audio", International Journal of Computer Applications, Volume 11– No.6, December 2010. [5] Kriti Saroha SOIT CDAC U.P., INDIA Pradeep Kumar Singh Department of Computer Science ,KIETU.P., INDIA “A Variant of LSB Steganography for Hiding Images inAudio” International Journal of Computer Applications (0975 – 8887)Volume 11– No.6, December 2010 [6] Dr Osamah Abdulgader Al-rababah,”A Steganography Method Based on Hiding secrete data in MPEG/Audio Layer III*” College of Alkamel - Computer Department king Abdulaziz university- 110Alkamel 21931 Jedda, Saudia Arabia, IJCSNS International Journal of Computer Science and Network S 202 ecurity, VOL.10 No.7, July 2010
  • 7. Dalal, Khamael & Mohammed International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 141 [7] Souvik Bhattacharyya and Gautam Sanyal, "Hiding Data in Images Using PCP", International Journal of Computer and Information Engineering 3:3 2009.