For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSIJCNCJournal
Steganography is the art of hiding information in ways that prevent the detection of hidden messages. This
paper presentsa new method which randomly selects position in MP3 file to hide a text secret messageby
using Least Significant Bit (LSB) technique. The text secret message isused in start and ends locations a
unique signature or key.The methodology focuses to embed one bit, two bits, three bitsor four bits from
secret message into MP3 file by using LSB techniques. The evaluation and performancemethods are based
on robustness (BER and correlation), Imperceptibility (PSNR) and hiding capacity (Ratio between Sizes of
text message and MP3 Cover) indicators.The experimental results show the new method is more security.
Moreover the contribution of this paper is the provision of a robustness-based classification of LSB
steganography models depending on their occurrence in the embedding position.
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
It is mainly focused today to transfer the messages secretly between two communication parties. The message from the sender to receiver should be kept secret so that the information should not known by anyone. Secret is the important thing today. The technique that is used for secure communication is called as steganography and it means that to hide secret information into innocent data. Digital images are ideal for hiding secret information. An image containing a secret message is called a cover image. In this paper will discuss about secret transformation of audio messages. The audio messages are hidden inside a cover image so no one can hack the audio but the audio should be encrypted before hidden inside the image
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSIJCNCJournal
Steganography is the art of hiding information in ways that prevent the detection of hidden messages. This
paper presentsa new method which randomly selects position in MP3 file to hide a text secret messageby
using Least Significant Bit (LSB) technique. The text secret message isused in start and ends locations a
unique signature or key.The methodology focuses to embed one bit, two bits, three bitsor four bits from
secret message into MP3 file by using LSB techniques. The evaluation and performancemethods are based
on robustness (BER and correlation), Imperceptibility (PSNR) and hiding capacity (Ratio between Sizes of
text message and MP3 Cover) indicators.The experimental results show the new method is more security.
Moreover the contribution of this paper is the provision of a robustness-based classification of LSB
steganography models depending on their occurrence in the embedding position.
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
It is mainly focused today to transfer the messages secretly between two communication parties. The message from the sender to receiver should be kept secret so that the information should not known by anyone. Secret is the important thing today. The technique that is used for secure communication is called as steganography and it means that to hide secret information into innocent data. Digital images are ideal for hiding secret information. An image containing a secret message is called a cover image. In this paper will discuss about secret transformation of audio messages. The audio messages are hidden inside a cover image so no one can hack the audio but the audio should be encrypted before hidden inside the image
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and observed that the security of the secret message can be enhanced by random selection of the pixels for substitution in LSB steganography. Further the error metrics PSNR Peak Signal to Noise Ratio should be high and MSE Mean Square Error should be low indicating good quality re construction. Naveen Verma | Preeti Sondhi | Gargi Kalia "Review Paper on LSB Based Stegnography to Enhance Image Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25326.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/25326/review-paper-on-lsb-based-stegnography-to-enhance-image-security/naveen-verma
A PPT on Stegnography,
It describes the security of information via images by encrypting and decrypting it with the document.
Uses of different models and diagrams.
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and observed that the security of the secret message can be enhanced by random selection of the pixels for substitution in LSB steganography. Further the error metrics PSNR Peak Signal to Noise Ratio should be high and MSE Mean Square Error should be low indicating good quality re construction. Naveen Verma | Preeti Sondhi | Gargi Kalia "Review Paper on LSB Based Stegnography to Enhance Image Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25326.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/25326/review-paper-on-lsb-based-stegnography-to-enhance-image-security/naveen-verma
A PPT on Stegnography,
It describes the security of information via images by encrypting and decrypting it with the document.
Uses of different models and diagrams.
Here's the powerpoint of the presentation Nuts&Bold gave to the Museum Computer Network 2013 (#MCN2013).
The first part is all about our inspirations, the second one is the presentation of the process used for Variations, an entirely crowdsourced online exhibit, and the final part is about our current research.
Have fun and if you'd like more info connect yourself to our Facebook page www.facebook.com/nutsandbold.ca or linkedIn or twitter (@nutsbold) or contact us at info@nutsandbold.ca. We will be happy to talk to you some more about our process, the possibilities, etc.
Have fun and let us know what you thinker of the exhibit !
http://commissairesglaneurs.wix.com/variations
nutsandbold.ca
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
Steganography is the technique of hiding any secret information like password, data andimage behind any cover file. This paper proposes a method which is an audio-video crypto steganography system which is the combination of audio steganography and video steganography using advanced chaotic algorithm as the secure encryption method. The aim is to hide secret information behind image and audio of video file. Since video is the application of many audio and video frames. We can select a particular frame for image hiding and audio for hiding our secret data.4LSB substitution can be used for image steganography and LSB substitution algorithm with location selection for audio steganography. Advanced chaotic algorithm can be used for encryption and decryption of data and images. Suitable parameter of security and authentication such as PSNR value, histograms are obtained at both the receiver side and transmitter sides which are found to be identical at both ends. Reversible data hiding methods for both video and audio are also being mentioned. Hence the security of the data and image can be enhanced. This method can be used in fields such as medical and defence which requires real time processing.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
Several developments in the transfer of data through the internet make it easier to transfer the data faster and accurately to the destination. But in this, anyone can misuse and modify the critical information through hacking. Video steganography is a technique which is used to hide the message and to transfer the message inside a video. Video is an application of many frames of audio, text, and images. The segmentation is known as the advanced technology that provides rich information of an image. The purpose of this paper is to propose a new technique to hide the data using video steganography with the help of artificial intelligence and DWT. This paper focuses on analyzing the various video steganography techniques which were proposed for securing the data transmission. In this paper, artificial intelligence is applied in order to improve the integrity and security of data transfer. The performance of the proposed method is evaluated on the basis of Bit error, mean square error, and PSNR metrics. Shivani Gupta | Gargi Kalia | Preeti Sondhi ""Video Steganography using Discrete Wavelet Transform and Artificial Intelligence"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25067.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/25067/video-steganography-using-discrete-wavelet-transform-and-artificial-intelligence/shivani-gupta
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Similar to Enhancement of Data Hiding Capacity in Audio Steganography (20)
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Enhancement of Data Hiding Capacity in Audio Steganography
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 3 (Jul. - Aug. 2013), PP 30-35
www.iosrjournals.org
www.iosrjournals.org 30 | Page
Enhancement of Data Hiding Capacity in Audio Steganography
Sheelu1
1
(M. Tech (CSE) - Manav Rachna College Of Engineering, Faridabad, India)
Abstract: Nowadays, a lot of applications are Internet-based and demand of internet applications
requires data to be transmitted in a secure manner. Data transmission in public communication
system is not secure because of interception and improper manipulation by eavesdropper. So a
technique for secure transmission of messages called Steganography, which send the
messages in such a way that existence of the message is concealed. Audio Steganography is the
scheme of hiding the existence of secret information by concealing it into an audio file. In this paper
we will discuss how audio file can be used as carrier to hide the secret information. In this paper we
also proposed a system that will enhance the data hiding capacity in Audio Steganography using LSB
method. we will use last 4 LSB's instead of a single LSB , this will enhance the data hiding capacity of carrier
file.
Keywords: Steganography, Audio Steganography , Cover file, Stego file, key
I. Introduction
Steganography[1] is the technique of hiding secret information in a communication channel in such a
manner that the very existence of information is concealed. It is the science of “invisible” communication and
prevents an unintended recipient from suspecting that the data exists. Steganography is derived from the Greek
word steganos which means “Covered” and graphy means “Writing”, i.e. covered writing. Many different
carrier file formats can be used like Text, Images, and videos, but digital Images and Audios are the most
popular because of their frequency on the Internet.
The Steganography hides different types of data within a cover file. The resulting stego file also
contains hidden information, although it is virtually identical to the cover file. Steganography exploit human
perception; human senses are not trained to look for files that have information hidden inside of them, although
there are programs available that can do what is called Steganalysis (Detecting use of Steganography). The main
goal of Steganography is to communicate securely in a completely undetectable manner and to avoid drawing
suspicion to the transmission of a hidden data . It is not only prevents others from knowing the hidden
information, but it also prevents others from thinking that the information even exists. If a Steganography
method causes someone to suspect there is a secret information in a carrier medium, then the method has failed
II. Different File Formats Used as Carrier in Steganography:
The four main categories of file formats[2] that can be used as carrier in Steganography are:
I. Text
II. Images
III. Audio/ Video
IV. Protocol
Figure 1:Different carriers in Steganography
I. Text Steganography: Hiding information in text is the most important method of Steganography. The method
was to hide a secret message in every nth letter of every word of a text message. After booming of Internet and
different type of digital file formats it has decreased in importance. Text stenography using digital files is not
used very often because the text files have a very small amount of redundant data
.
2. Enhancement of Data Hiding Capacity in Audio Steganography
www.iosrjournals.org 31 | Page
II. Image Steganography: Images are used as the popular cover objects for Steganography. A message is
embedded in a digital image through an embedding algorithm, using the secret key. The resulting stego image is
send to the receiver. On the other side, it is processed by the extraction algorithm using the same key. During the
transmission of stego image unauthenticated persons can only notice the transmission of an image but can‟t
guess the existence of the hidden message.
III. Audio Steganography: Audio stenography is masking, which exploits the properties of the human ear to
hide information unnoticeably. An audible, sound can be inaudible in the presence of another louder audible
sound .This property allows to select the channel in which to hide information.
IV. Protocol Steganography: The term protocol Steganography is to embedding information within network
protocols such as TCP/IP. We hide information in the header of a TCP/IP packet in some fields that can be
either optional or are never used.
III. Audio Steganography
Audio Steganography[3] is the scheme of hiding the existence of secret information by concealing it
into another medium such as audio file. Thus embedding secret messages into digital sound is known as audio
Steganography. Audio Steganography methods can embed messages in WAV, AU, and even MP3 sound files.
The properties of the human auditory system (HAS) are exploited in the process of audio Steganography.
Auditory perception is based on the critical band analysis in the inner ear where a frequency-to-location
transformation takes place along the basilar membrane. The power spectra of the received sounds are not
represented on a linear frequency scale but on limited frequency bands called critical bands
3.1 Digital Audio
Digital audio[3] is discrete rather than continuous signal as found in analog audio. A discrete signal is
created by sampling a continuous analog signal at a specified rate. For example, the standard sampling rate for
CD digital audio is about 44 kHz.
Figure 2: Continuous analog sound wave is sampled to produce digital signal
Digital audio is stored in a computer as a sequence of 0's and 1's. With the right tools, it is possible to change the
individual bits that make up a digital audio file. Such precise control allows changes to be made to the binary
sequence that are not discernible to the human ear. In the digital domain, PCM (Pulse Code Modulation) is the
most straightforward mechanism to store audio. The analog audio is sampled in accordance with the Nyquest
theorem and the individual samples are stored sequentially in binary format. The wave file is the most common
format for storing PCM data and the WAVE file format is a subset of Microsoft's RIFF specification for the
storage of multimedia files. That‟s why .wav files have been used here for below mentioned experiments
3.2. The basic model of Audio Steganography
The basic model of Audio Steganography[4] consists of Carrier (Audio file), Message, Password,
Stego file. Carrier is also known as a cover-file, which conceals the secret information. Basically, the model for
Steganography is shown in Fig 3. Message is the data that the sender wishes to remain it confidential. Message
can be plain text, image, audio or any type of file. Password is known as a stego-key, which ensures that only
the recipient who knows the corresponding decoding key will be able to extract the message from a cover-file.
The cover-file with the secret information is known as a stego-file. Fig.3 shows the block diagram of a secure
steganographic system. Input messages can be images, texts, video, etc. The components of steganographic
system are:
3. Enhancement of Data Hiding Capacity in Audio Steganography
www.iosrjournals.org 32 | Page
Figure 3. A generic Steganography System
secret message: The secret message or information to hide.
audio file: An audio file which concealed the secret message.
stego file: A modified version of audio file that contains the secret message.
key: Additional secret data that is needed for the embedding and extracting processes and must be known to
both, the sender and the recipient
steganographic method: A steganographic function that takes audio file, secret message and key as parameters
and produces stego as output.
inverse of steganographic method: A steganographic function that has stego and key as parameters and
produces secret message as output. This is the inverse of method used in embeding process in the sense that the
result of the extracting process is identical to the input of the embedding process.
The embedding process embeds the secret message in the audio file. The result of the embedding function is
slightly modified version of audio file: the stego file. After the recipient has received stego file, he starts the
extracting process with the stego file and the key as parameters. If the key that is supplied by the recipient is
the same as the key used by the sender to embed the secret message and if the stego data the recipient uses as
input is the same data the sender has produces, then the extracting function will produce the original secret
message.
IV. Least Significant Bit (LSB) Encoding:
Least significant bit (LSB)[4] coding is the simplest way to embed information in a digital audio file,
which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the
hidden data. By substituting the least significant bit of each sampling point with a binary message, LSB coding
allows for a large amount of data to be encoded. In LSB coding, the ideal data transmission rate is 1 kbps per 1
kHz.
To extract a secret message from an LSB encoded sound file, the receiver needs access to the sequence
of sample indices used in the embedding process. Normally, the length of the secret message to be encoded is
smaller than the total number of samples in a sound file. One must decide then on how to choose the subset of
samples that will contain the secret message and communicate that decision to the receiver. One trivial
technique is to start at the beginning of the sound file and perform LSB coding until the message has been
completely embedded, leaving the remaining samples unchanged. This creates a security problem, however in
that the first part of the sound file will have different statistical properties than the second part of the sound file
that was not modified. One solution to this problem is to pad the secret message with random bits so that the
length of the message is equal to the total number of samples.
Figure 4 : Binary representation of decimal 149
The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit binary number
represents a value of 128 decimal. The LSB represents a value of 1. For example, to hide the letter "a" (ASCII
code 97, which is 01100001) inside eight bytes of a cover, you can set the LSB of each byte like this:
10010010
01010011
10011011
11010010
10001010
00000010
01110010
00101011
4. Enhancement of Data Hiding Capacity in Audio Steganography
www.iosrjournals.org 33 | Page
Fig 5 illustrates how the message 'HEY' is encoded using the LSB method. Here the secret information is
„HEY‟ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information
„HEY‟ and the audio file are converted into bit stream. The least significant column of the audio file is replaced
by the bit stream of sectet information „HEY‟. The resulting file after embedding secret information „HEY‟ is
called Stego-file.
Figure 5 . LSB coding example
There are two main disadvantages associated with the use of methods like LSB coding. The human ear is very
sensitive and can often detect even the slightest bit of noise introduced into a sound file, Second disadvantage
however, is that this is not robust. If a sound file embedded with a secret message using either LSB coding was
resample, the embedded information would be lost. Robustness can be improved somewhat by using a
redundancy technique while encoding the secret message. However, redundancy techniques reduce data
transmission rate significantly.
V. Proposed system
In the proposed system, I will use last 4 LSB's instead of single LSB. By this we can store more bits of
secret information in the single byte of carrier file. This will enhance the capacity of carrier file to conceal the
secret information as shown in the figure.
Figure 5 . Proposed system example
5. Enhancement of Data Hiding Capacity in Audio Steganography
www.iosrjournals.org 34 | Page
The Proposed system: The Proposed system is consist of following two phases
a) Sender side(Encoding process)
b) Receiver side(Decoding process)
5.1 Encoding Process on Sender Side (Secret Data Hiding)
Encoding process takes place at the sender side to hide the secret information. Here the carrier audio
file and secret information will be converted into bits and then bits of secret information will hideen in the last 4
LSB's of carrier audio file. The steps of encoding process are as follows:
1. Convert the audio file to binary format.
2. Hide the secret information into an audio or carrier file.
3. Remove noise from the stego file by using the filter.
4. Generate the key using the stego and the filtered file.
5. Key and the filtered file are send to the receiver.
Figure 7 . Process on sender side in the proposed system
5.2 Decoding Process on Receiver Side (Secret Data Extraction)
Decoding process will takes place at the receiver side to extract the secret information. Here the key
and filtered file are used to get the secret information. The steps of decoding process are as follows:
1. The receiver will decrypt the key .
2. The receiver will use the key to extract the stego file from the filtered file.
3. Receiver can extract the secret information from the extracted stego file.
Figure 8 . Process on receiver side in the proposed system
6. Enhancement of Data Hiding Capacity in Audio Steganography
www.iosrjournals.org 35 | Page
VI. Conclusion
Steganography not only prevents others from knowing the hidden information, but it also prevents
others from thinking that the information even exists. If a Steganography method causes someone to suspect
there is a secret information in a carrier medium, then the method has failed. Different file formats can be used
as carrier in Steganography. Embedding secret information in an audio file is usually a more difficult process
than embedding messages in other media. Audio Steganography methods can embed messages in WAV, AU,
and even MP3 sound files. As we will hide 4 bits of secret information in each byte of the carrier. This will
enhance the capacity of carrier and carrier will conceal a large amount of secret information. By this we can
send a large amount of secret information in a audio file
References
[1] Jammi Ashok, Y. Raju, S. Munishankaraiah, K. Srinivas " Steganography : An Overview" in International Journal of Engineering
Science and Technology Vol. 2(10), 2010, 5985-5992
[2] Pratap Chandra Mandal Modern "Steganographic technique: A survey" in International Journal of Computer Science & Engineering
Technology (IJCSET)
[3] Prof. Samir Kumar Bandyopadhyay and Barnali Gupta “LSB Modification and Phase Encoding Technique of Audio Steganography
Revisited” in International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 4, June 2012
[4] Jayaram P, Ranganatha H R, Anupama H S, " Information Hiding Using Audio Steganography – A Survey" in The International
Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011