SlideShare a Scribd company logo
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
136 
Audio Steganography Using Modified LSB Method 
Jithu Vimal1, Ann Mary Alex2 
1 PG Scholar, Dept.of Electronics and Communication Engineering, Mar Baselios College of Engg & 
Technology, Trivandrum, India. 
2 Assistant Professor, Dept. of Electronics and Communication Engineering, Mar Baselios College of Engg & 
Technology, Trivandrum, India. 
Email: jithulmc@gmail.com1 , amyl.alex@gmail.com2 
Abstract-: In the current internet scenario, secure data transmission is limited due to its attack made on data 
communication. So more robust methods are required to ensure secure data transmission. One solution to the 
above problem is Steganography. Audio steganography is concerned with hiding information in a cover (host) 
audio signal in an imperceptible way. Hidden information is retrieved from the cover audio using a key similar 
to the one that was employed during the hiding phase. Least Significant Bit (LSB) modification technique is the 
most simple and efficient technique used for audio steganography. But conventional LSB technique have poor 
interface, difficult to understand and valid only for certain audio formats with restricted message size. The 
objective is to design an audio steganography scheme which is used to hide data in an audio file in such a way 
that the data hiding point or sample point is randomly selected so that with every new embedding process the 
position of sample point changes and thereby increasing the confidentiality of the secret message. 
Index Terms- Steganography; Audio Steganography; LSB technique 
1. INTRODUCTION 
In today’s fast growing demand of internet 
applications secure data transmission is very 
important. Techniques such as cryptography are being 
used on a large scale for transmitting information 
secretly. Steganography is a new approach of 
providing secure data transmission. The term 
steganography is derived from two greek words, 
“stegano” means “secret” and “graphy” means 
“writing”. So steganography literally means secret 
writing. Steganography is the art and science of 
writing hidden messages in such a way that only the 
sender and intended recipient suspects the existence 
of the message. 
Audio Steganography hides the secret message in 
an audio signal called cover audio. Once the secret 
message is embedded in the cover audio, the resulting 
message is called stego message and stego message is 
transmitted to the receiver side. 
For any audio steganographic technique to be 
implementable it needs to satisfy three conditions [1]: 
Capacity means the amount of secret information 
that can be embedded within the host message 
Transparency evaluates how well a secret 
message is embedded in the cover audio 
Robustness measures the ability of secret 
message to withstand against attacks 
Section 2 describes the related work for Least 
Significant Bit (LSB) method. An audio 
steganographic system is briefed in section 3. Section 
4 presents the system architecture. Experimental 
Results and conclusions are presented in section 5 and 
6 respectively. 
2. RELATED WORK 
Audio steganography is an active research area these 
days. 
Different techniques have been used to achieve the 
same goals. One of the earliest technique is LSB 
modification [2]. 
In LSB method consecutive LSB’s in each sample 
of cover audio is replaced with secret message bit. 
LSB method is very easy to implement but have low 
robustness. However, conventionally single bit is 
being used, but changing more than one bit in a 
sample has no differentiable change in the properties 
of the host message [3]. This increases the capacity of 
the technique but might also increase the amount of 
noise in the stego message [4]. 
In [5], an audio steganographic system that 
provides improved security is proposed. To achieve 
this, dual layer randomization approach is used. First 
layer of randomization is achieved by randomly 
selecting the byte number or samples. An additional 
layer of security is provided by randomly selecting the 
bit position at which embedding is done in the 
selected samples. Using this proposed algorithm the 
transparency and robustness of the steganographic 
technique is increased. 
In [6] the problems faced by substitution technique 
and solution to the problems are discussed. The main 
problem is low robustness against attacks. In 
conventional LSB method secret message is 
embedded in the least significant bit. This method is 
more vulnerable to attack. So by embedding message 
in bits other than LSB more security can be achieved. 
More robustness can be achieved if message is 
embedded into deeper bits. But the problem is that as 
one move into the MSBs the host audio signal gets
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
1st MSB 2nd MSB Secret Message Bit 
137 
Fig 1. Steganographic System 
Secret 
Message 
altered. This problem can be solved by an intelligent 
algorithm which embeds the message bits in the MSB 
and alter other bits to decrease the error. 
3. BLOCK DIAGRAM 
The basic block diagram of a steganographic system 
is shown in Fig 1. The secret message to be 
transmitted is hidden inside a cover file. Cover file 
could be images, videos or audio. A stego key is also 
used to provide security. Using a suitable embedding 
algorithm secret message is embedded into the carrier 
object. The resultant file is called stego file and this 
stego file is transmitted to the receiver side. At the 
receiver side stego file is decoded using the stego key 
to extract the secret message. In the case of an audio 
steganographic system cover file is an audio file. 
4. SYSTEM ARCHITECTURE 
The system architecture consists of two different 
layers to fight against steganalysis; character encoding 
and modified LSB method. As shown in Fig 2, the 
message transmitted by Bob will pass through 
character encoding and modified LSB method layers 
before it is transmitted over the network. On the 
receiver side, the same operations are performed but 
in reverse order. However, the capacity of a 
steganographic technique is also important; the 
system architecture focuses more on security of secret 
messages which are related to transparency and 
robustness parameters of the steganographic 
technique 
Fig 2. System Architecture 
4.1. Character encoding 
Character encoding is used to map characters to bits 
and bits to characters in the reverse operation. On the 
transmitter side, the secret message is in the form of 
characters. These characters are converted to bits 
before they are embedded in the cover audio. Usually 
a standard character encoder like the ASCII 
(American Standard Code for Information 
Interchange) encoders is used. But ASCII coder 
leaves a system which is more vulnerable to 
steganalysis than a custom defined encoder. Custom 
character encoders are not only less vulnerable to 
steganalysis but it also help in achieving compression, 
resulting in increased capacity. A possible custom 
character encoding is Huffman coding. A Huffman 
character encoder is proposed by Dr. David A. 
Huffman in 1952. Here the Code word lengths are no 
longer fixed like ASCII; Code word lengths vary and 
will be shorter for the more frequently used 
characters. Huffman coding is a lossless coding 
scheme with an efficient compression ratio. A 
codeword is assigned to all possible characters that 
can occur in the secret message [7]. 
4.2. Modified LSB method 
The conventional LSB method is quite vulnerable to 
steganalysis. It embeds the secret message bits in 
fixed LSBs and any intruder who detects bit 
modification pattern can easily retrieve the secret 
message. In an 8 bits sample of a cover audio, 
changing the first, second or third LSB of any sample 
of the audio doesn't result in a detectable change, but 
the fourth LSB change becomes detectable Therefore, 
one or multiple bits from three LSBs can be used to 
embed a secret message. 
Modified LSB Method proceeds in two steps: bit 
selection and sample selection. Since any of the three 
LSBs can be used to hide the secret message bit, 
every sample used different LSB to hide the secret 
message bit. LSB selection is done by making use of 
first two MSBs of the same sample. Table 1 shows the 
bit selection mapping. 
Table 1. Bit Selection Mapping 
0 0 1st LSB 
0 1 1st LSB 
1 0 2nd LSB 
1 1 3rd LSB 
Sample selection is done to provide more 
randomness by randomly selecting the samples. Every 
samples of the cover audio will not contain the secret 
message bit. Randomness is controlled by selecting 
the first three MSBs of the selected sample. Table 2 
shows the sample selection mapping. Let the first 
secret message bit is embedded in sample i, then the 
Secret 
Message Stego Key 
Embedding 
Algorithm 
Carrier 
Digital 
Object 
Stego File 
Detector 
Algorithm 
Stego Key 
Sender 
(Bob) 
Receiver 
(Alice) 
Character Encoding Character Decoding 
Modified LSB Method 
(Message Embedding) 
Modified LSB Method 
(Message Extraction) 
Network
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
138 
sample containing the next secret message bit depends 
on first three MSBs of sample i [8]. 
Table 2. Sample Selection Mapping 
5. RESULTS AND DISCUSSION 
The objective is to design an audio steganographic 
system that provides more security by introducing 
randomness. Here randomness is achieved in two 
phases: one by random bit selection and another by 
random sample selection. The text message to be 
transmitted is embedded in an audio file and that 
stego audio file is transmitted to the receiver. While 
embedding text message in an audio file, the structure 
of input audio file must be preserved. If the audio 
structure has changed then the unintended recipient 
can detect the existence of communication. Fig 4 and 
Fig 5 shows the audio before steganography and after 
steganography respectively. 
Fig 4. Audio before Steganography 
Size of audio file=175 KB 
Length=2 seconds 
Secret Message is ‘india is my country’ 
Size of secret message=19*8=152 bytes 
Fig 5. Audio after Steganography 
6. CONCLUSIONS 
In this paper an approach to increase the 
confidentiality of secret message is proposed. As 
compared to conventional LSB method the proposed 
method embeds the data in variable LSBs depending 
on the MSBs of cover audio samples. Also there is an 
increase in capacity due to the use of Huffman coding. 
Inorder to provide more capacity multiple bits of the 
selected samples can be used to hide the secret 
message. This can be solved in future work 
ACKNOWLEDGEMENTS 
We would like to thank the almighty for giving us the 
strength to work on this subject and coming up with 
this paper. We are grateful to our families for 
supporting us and praying for us. We would like to 
express our gratitude towards the professors of Mar 
Baselios College of Engineering and Technology for 
their valuable guidance. We are also thankful to all 
those who directly or indirectly helped us in making 
this paper a reality. 
REFERENCES 
[1] S.S. Divya, M. Ram Mohan Reddy, “Hiding text 
in audio using multiple LSB steganography and 
provide security using cryptography”, 
International journal of Scientific and 
Technology Research,vol. 1, issue 6, july 2012 . 
[2] Walter Bender, Daniel Gruhl, Norishige 
Morimoto, Anthony Lu, “Techniques for Data 
Hiding”, IBM Systems Journal, vol. 35, pages: 
313-316. 
[3] Nedeljko cvejic, Tapio Seppanen, “Increasing 
the capacity of LSB-based audio 
steganography”, 2002 IEEE Workshop on 
Multimedia Signal Processing, pages: 336-338. 
[4] Kaliappan Gopalan, Qidong Shi, “Audio 
Steganography Using Bit Modification- A 
Tradeoff on Perceptability and Data Robustness 
for Large Payload Audio Embedding”, 19th 
1st MSB 2nd MSB 3rd MSB Sample 
containing next 
secret message 
bit 
0 0 0 i+8 
0 0 1 i+7 
0 1 0 i+6 
0 1 1 i+5 
1 0 0 i+4 
1 0 1 i+3 
1 1 0 i+2 
1 1 1 i+1
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
139 
International Conference on Computer 
Communications and Networks, pages: 1-6. 
[5] Lovey Rana, Saikat Banerjee, “Dual Layer 
Randomization in Audio Steganography Using 
Random Byte Position Encoding” , International 
Journal of Engineering and Innovative 
Technology, Volume 2, Issue 8, February 2013 
[6] Mazdak Zamani et.al , “A Secure Audio 
Steganography Approach”, International 
Conference for Internet Technology and Secured 
Transactions 2009. 
[7] Muhammad Asad, “Text Steganography Using 
Huffman Coding”, International Conference on 
Intelligent and Information Technology 2010, 
Volume: 1, Pages: 445 - 447. 
[8] Muhammad Asad, Junaid Gilani ,Adnan Khalid, 
“ An enhanced least Significant bit modification 
technique for audio steganography”, 2011 
International conference on Computer Networks 
and Information Technology, pp. 143-147

More Related Content

What's hot

Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
IRJET Journal
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
IJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK
DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORKDICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK
DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK
AJIT M KARANJKAR
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
 
Steganography
SteganographySteganography
Steganography
Kirthan S Holla
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on text
IJCNCJournal
 
Ijrdtvlis11 140006
Ijrdtvlis11 140006Ijrdtvlis11 140006
Ijrdtvlis11 140006
Ijrdt Journal
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
IJNSA Journal
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
csandit
 
Psychoacoustic Approaches to Audio Steganography
Psychoacoustic Approaches to Audio SteganographyPsychoacoustic Approaches to Audio Steganography
Psychoacoustic Approaches to Audio Steganography
Cody Ray
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Method
ijtsrd
 
K0815660
K0815660K0815660
K0815660
IOSR Journals
 
H42045359
H42045359H42045359
H42045359
IJERA Editor
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
Tejas_srinivas
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
Aishwarya Korde
 

What's hot (19)

Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK
DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORKDICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK
DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Steganography
SteganographySteganography
Steganography
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on text
 
Ijrdtvlis11 140006
Ijrdtvlis11 140006Ijrdtvlis11 140006
Ijrdtvlis11 140006
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
Psychoacoustic Approaches to Audio Steganography
Psychoacoustic Approaches to Audio SteganographyPsychoacoustic Approaches to Audio Steganography
Psychoacoustic Approaches to Audio Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Method
 
K0815660
K0815660K0815660
K0815660
 
H42045359
H42045359H42045359
H42045359
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 

Viewers also liked

Paper id 24201458
Paper id 24201458Paper id 24201458
Paper id 24201458
IJRAT
 
Paper id 252014139
Paper id 252014139Paper id 252014139
Paper id 252014139
IJRAT
 
Paper id 23201417
Paper id 23201417Paper id 23201417
Paper id 23201417
IJRAT
 
Paper id 25201444
Paper id 25201444Paper id 25201444
Paper id 25201444
IJRAT
 
Paper id 26201476
Paper id 26201476Paper id 26201476
Paper id 26201476
IJRAT
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
IJRAT
 
Paper id 24201463
Paper id 24201463Paper id 24201463
Paper id 24201463
IJRAT
 
Paper id 24201471
Paper id 24201471Paper id 24201471
Paper id 24201471
IJRAT
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
IJRAT
 
Paper id 212014136
Paper id 212014136Paper id 212014136
Paper id 212014136
IJRAT
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
IJRAT
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
IJRAT
 
Paper id 27201447
Paper id 27201447Paper id 27201447
Paper id 27201447
IJRAT
 
Paper id 212014103
Paper id 212014103Paper id 212014103
Paper id 212014103
IJRAT
 
Paper id 252014137
Paper id 252014137Paper id 252014137
Paper id 252014137
IJRAT
 
Paper id 24201478
Paper id 24201478Paper id 24201478
Paper id 24201478
IJRAT
 
Paper id 24201486
Paper id 24201486Paper id 24201486
Paper id 24201486
IJRAT
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
IJRAT
 
Paper id 21201457
Paper id 21201457Paper id 21201457
Paper id 21201457
IJRAT
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
IJRAT
 

Viewers also liked (20)

Paper id 24201458
Paper id 24201458Paper id 24201458
Paper id 24201458
 
Paper id 252014139
Paper id 252014139Paper id 252014139
Paper id 252014139
 
Paper id 23201417
Paper id 23201417Paper id 23201417
Paper id 23201417
 
Paper id 25201444
Paper id 25201444Paper id 25201444
Paper id 25201444
 
Paper id 26201476
Paper id 26201476Paper id 26201476
Paper id 26201476
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
Paper id 24201463
Paper id 24201463Paper id 24201463
Paper id 24201463
 
Paper id 24201471
Paper id 24201471Paper id 24201471
Paper id 24201471
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
 
Paper id 212014136
Paper id 212014136Paper id 212014136
Paper id 212014136
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
 
Paper id 27201447
Paper id 27201447Paper id 27201447
Paper id 27201447
 
Paper id 212014103
Paper id 212014103Paper id 212014103
Paper id 212014103
 
Paper id 252014137
Paper id 252014137Paper id 252014137
Paper id 252014137
 
Paper id 24201478
Paper id 24201478Paper id 24201478
Paper id 24201478
 
Paper id 24201486
Paper id 24201486Paper id 24201486
Paper id 24201486
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Paper id 21201457
Paper id 21201457Paper id 21201457
Paper id 21201457
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
 

Similar to Paper id 25201451

Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
International Journal of Science and Research (IJSR)
 
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHYADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
csandit
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
IJECEIAES
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
Dr. Amarjeet Singh
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
EECJOURNAL
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
ijma
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
IRJET Journal
 
Ijetr042105
Ijetr042105Ijetr042105
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
IOSRJECE
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET Journal
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
ijtsrd
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
ARYA TM
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
IJCNCJournal
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
IOSR Journals
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSHIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
IJCNCJournal
 

Similar to Paper id 25201451 (20)

Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
 
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHYADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSHIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
 

More from IJRAT

96202108
9620210896202108
96202108
IJRAT
 
97202107
9720210797202107
97202107
IJRAT
 
93202101
9320210193202101
93202101
IJRAT
 
92202102
9220210292202102
92202102
IJRAT
 
91202104
9120210491202104
91202104
IJRAT
 
87202003
8720200387202003
87202003
IJRAT
 
87202001
8720200187202001
87202001
IJRAT
 
86202013
8620201386202013
86202013
IJRAT
 
86202008
8620200886202008
86202008
IJRAT
 
86202005
8620200586202005
86202005
IJRAT
 
86202004
8620200486202004
86202004
IJRAT
 
85202026
8520202685202026
85202026
IJRAT
 
711201940
711201940711201940
711201940
IJRAT
 
711201939
711201939711201939
711201939
IJRAT
 
711201935
711201935711201935
711201935
IJRAT
 
711201927
711201927711201927
711201927
IJRAT
 
711201905
711201905711201905
711201905
IJRAT
 
710201947
710201947710201947
710201947
IJRAT
 
712201907
712201907712201907
712201907
IJRAT
 
712201903
712201903712201903
712201903
IJRAT
 

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Paper id 25201451

  • 1. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 136 Audio Steganography Using Modified LSB Method Jithu Vimal1, Ann Mary Alex2 1 PG Scholar, Dept.of Electronics and Communication Engineering, Mar Baselios College of Engg & Technology, Trivandrum, India. 2 Assistant Professor, Dept. of Electronics and Communication Engineering, Mar Baselios College of Engg & Technology, Trivandrum, India. Email: jithulmc@gmail.com1 , amyl.alex@gmail.com2 Abstract-: In the current internet scenario, secure data transmission is limited due to its attack made on data communication. So more robust methods are required to ensure secure data transmission. One solution to the above problem is Steganography. Audio steganography is concerned with hiding information in a cover (host) audio signal in an imperceptible way. Hidden information is retrieved from the cover audio using a key similar to the one that was employed during the hiding phase. Least Significant Bit (LSB) modification technique is the most simple and efficient technique used for audio steganography. But conventional LSB technique have poor interface, difficult to understand and valid only for certain audio formats with restricted message size. The objective is to design an audio steganography scheme which is used to hide data in an audio file in such a way that the data hiding point or sample point is randomly selected so that with every new embedding process the position of sample point changes and thereby increasing the confidentiality of the secret message. Index Terms- Steganography; Audio Steganography; LSB technique 1. INTRODUCTION In today’s fast growing demand of internet applications secure data transmission is very important. Techniques such as cryptography are being used on a large scale for transmitting information secretly. Steganography is a new approach of providing secure data transmission. The term steganography is derived from two greek words, “stegano” means “secret” and “graphy” means “writing”. So steganography literally means secret writing. Steganography is the art and science of writing hidden messages in such a way that only the sender and intended recipient suspects the existence of the message. Audio Steganography hides the secret message in an audio signal called cover audio. Once the secret message is embedded in the cover audio, the resulting message is called stego message and stego message is transmitted to the receiver side. For any audio steganographic technique to be implementable it needs to satisfy three conditions [1]: Capacity means the amount of secret information that can be embedded within the host message Transparency evaluates how well a secret message is embedded in the cover audio Robustness measures the ability of secret message to withstand against attacks Section 2 describes the related work for Least Significant Bit (LSB) method. An audio steganographic system is briefed in section 3. Section 4 presents the system architecture. Experimental Results and conclusions are presented in section 5 and 6 respectively. 2. RELATED WORK Audio steganography is an active research area these days. Different techniques have been used to achieve the same goals. One of the earliest technique is LSB modification [2]. In LSB method consecutive LSB’s in each sample of cover audio is replaced with secret message bit. LSB method is very easy to implement but have low robustness. However, conventionally single bit is being used, but changing more than one bit in a sample has no differentiable change in the properties of the host message [3]. This increases the capacity of the technique but might also increase the amount of noise in the stego message [4]. In [5], an audio steganographic system that provides improved security is proposed. To achieve this, dual layer randomization approach is used. First layer of randomization is achieved by randomly selecting the byte number or samples. An additional layer of security is provided by randomly selecting the bit position at which embedding is done in the selected samples. Using this proposed algorithm the transparency and robustness of the steganographic technique is increased. In [6] the problems faced by substitution technique and solution to the problems are discussed. The main problem is low robustness against attacks. In conventional LSB method secret message is embedded in the least significant bit. This method is more vulnerable to attack. So by embedding message in bits other than LSB more security can be achieved. More robustness can be achieved if message is embedded into deeper bits. But the problem is that as one move into the MSBs the host audio signal gets
  • 2. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 1st MSB 2nd MSB Secret Message Bit 137 Fig 1. Steganographic System Secret Message altered. This problem can be solved by an intelligent algorithm which embeds the message bits in the MSB and alter other bits to decrease the error. 3. BLOCK DIAGRAM The basic block diagram of a steganographic system is shown in Fig 1. The secret message to be transmitted is hidden inside a cover file. Cover file could be images, videos or audio. A stego key is also used to provide security. Using a suitable embedding algorithm secret message is embedded into the carrier object. The resultant file is called stego file and this stego file is transmitted to the receiver side. At the receiver side stego file is decoded using the stego key to extract the secret message. In the case of an audio steganographic system cover file is an audio file. 4. SYSTEM ARCHITECTURE The system architecture consists of two different layers to fight against steganalysis; character encoding and modified LSB method. As shown in Fig 2, the message transmitted by Bob will pass through character encoding and modified LSB method layers before it is transmitted over the network. On the receiver side, the same operations are performed but in reverse order. However, the capacity of a steganographic technique is also important; the system architecture focuses more on security of secret messages which are related to transparency and robustness parameters of the steganographic technique Fig 2. System Architecture 4.1. Character encoding Character encoding is used to map characters to bits and bits to characters in the reverse operation. On the transmitter side, the secret message is in the form of characters. These characters are converted to bits before they are embedded in the cover audio. Usually a standard character encoder like the ASCII (American Standard Code for Information Interchange) encoders is used. But ASCII coder leaves a system which is more vulnerable to steganalysis than a custom defined encoder. Custom character encoders are not only less vulnerable to steganalysis but it also help in achieving compression, resulting in increased capacity. A possible custom character encoding is Huffman coding. A Huffman character encoder is proposed by Dr. David A. Huffman in 1952. Here the Code word lengths are no longer fixed like ASCII; Code word lengths vary and will be shorter for the more frequently used characters. Huffman coding is a lossless coding scheme with an efficient compression ratio. A codeword is assigned to all possible characters that can occur in the secret message [7]. 4.2. Modified LSB method The conventional LSB method is quite vulnerable to steganalysis. It embeds the secret message bits in fixed LSBs and any intruder who detects bit modification pattern can easily retrieve the secret message. In an 8 bits sample of a cover audio, changing the first, second or third LSB of any sample of the audio doesn't result in a detectable change, but the fourth LSB change becomes detectable Therefore, one or multiple bits from three LSBs can be used to embed a secret message. Modified LSB Method proceeds in two steps: bit selection and sample selection. Since any of the three LSBs can be used to hide the secret message bit, every sample used different LSB to hide the secret message bit. LSB selection is done by making use of first two MSBs of the same sample. Table 1 shows the bit selection mapping. Table 1. Bit Selection Mapping 0 0 1st LSB 0 1 1st LSB 1 0 2nd LSB 1 1 3rd LSB Sample selection is done to provide more randomness by randomly selecting the samples. Every samples of the cover audio will not contain the secret message bit. Randomness is controlled by selecting the first three MSBs of the selected sample. Table 2 shows the sample selection mapping. Let the first secret message bit is embedded in sample i, then the Secret Message Stego Key Embedding Algorithm Carrier Digital Object Stego File Detector Algorithm Stego Key Sender (Bob) Receiver (Alice) Character Encoding Character Decoding Modified LSB Method (Message Embedding) Modified LSB Method (Message Extraction) Network
  • 3. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 138 sample containing the next secret message bit depends on first three MSBs of sample i [8]. Table 2. Sample Selection Mapping 5. RESULTS AND DISCUSSION The objective is to design an audio steganographic system that provides more security by introducing randomness. Here randomness is achieved in two phases: one by random bit selection and another by random sample selection. The text message to be transmitted is embedded in an audio file and that stego audio file is transmitted to the receiver. While embedding text message in an audio file, the structure of input audio file must be preserved. If the audio structure has changed then the unintended recipient can detect the existence of communication. Fig 4 and Fig 5 shows the audio before steganography and after steganography respectively. Fig 4. Audio before Steganography Size of audio file=175 KB Length=2 seconds Secret Message is ‘india is my country’ Size of secret message=19*8=152 bytes Fig 5. Audio after Steganography 6. CONCLUSIONS In this paper an approach to increase the confidentiality of secret message is proposed. As compared to conventional LSB method the proposed method embeds the data in variable LSBs depending on the MSBs of cover audio samples. Also there is an increase in capacity due to the use of Huffman coding. Inorder to provide more capacity multiple bits of the selected samples can be used to hide the secret message. This can be solved in future work ACKNOWLEDGEMENTS We would like to thank the almighty for giving us the strength to work on this subject and coming up with this paper. We are grateful to our families for supporting us and praying for us. We would like to express our gratitude towards the professors of Mar Baselios College of Engineering and Technology for their valuable guidance. We are also thankful to all those who directly or indirectly helped us in making this paper a reality. REFERENCES [1] S.S. Divya, M. Ram Mohan Reddy, “Hiding text in audio using multiple LSB steganography and provide security using cryptography”, International journal of Scientific and Technology Research,vol. 1, issue 6, july 2012 . [2] Walter Bender, Daniel Gruhl, Norishige Morimoto, Anthony Lu, “Techniques for Data Hiding”, IBM Systems Journal, vol. 35, pages: 313-316. [3] Nedeljko cvejic, Tapio Seppanen, “Increasing the capacity of LSB-based audio steganography”, 2002 IEEE Workshop on Multimedia Signal Processing, pages: 336-338. [4] Kaliappan Gopalan, Qidong Shi, “Audio Steganography Using Bit Modification- A Tradeoff on Perceptability and Data Robustness for Large Payload Audio Embedding”, 19th 1st MSB 2nd MSB 3rd MSB Sample containing next secret message bit 0 0 0 i+8 0 0 1 i+7 0 1 0 i+6 0 1 1 i+5 1 0 0 i+4 1 0 1 i+3 1 1 0 i+2 1 1 1 i+1
  • 4. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 139 International Conference on Computer Communications and Networks, pages: 1-6. [5] Lovey Rana, Saikat Banerjee, “Dual Layer Randomization in Audio Steganography Using Random Byte Position Encoding” , International Journal of Engineering and Innovative Technology, Volume 2, Issue 8, February 2013 [6] Mazdak Zamani et.al , “A Secure Audio Steganography Approach”, International Conference for Internet Technology and Secured Transactions 2009. [7] Muhammad Asad, “Text Steganography Using Huffman Coding”, International Conference on Intelligent and Information Technology 2010, Volume: 1, Pages: 445 - 447. [8] Muhammad Asad, Junaid Gilani ,Adnan Khalid, “ An enhanced least Significant bit modification technique for audio steganography”, 2011 International conference on Computer Networks and Information Technology, pp. 143-147