to hide1 - copy

Upload: rudra1

Post on 02-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 To Hide1 - Copy

    1/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 1

    CHAPTER 1

    INTRODUCTION

  • 8/10/2019 To Hide1 - Copy

    2/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 2

    1.1 BACKGROUND:

    Steganography is the art and science of writing hidden messages in such a

    way that no one apart from the intended recipient knows of the existence of the

    message; this is in contrast to cryptography, where the existence of the message

    itself is not disguised, but the content is obscured. The word Steganography is

    of Greek origin and literally translated it means covered writing:

    Steganos(covered) graphein (writing).With the advent of digital media,

    steganography has come to include the hiding of digital information within

    digital files.

    1.2 RELEVANCE:

    The information communicated comes in numerous forms and is used in many

    applications. In a large number of these applications, it is desired that the

    communication to be done in secrete. Such secrete communication ranges from

    the obvious cases of bank transfers, corporate communications, and credit card

    purchases, on down to a large percentage of everyday email. Steganography is

    the ancient art of embedding a secret message into a seemingly harmless

    message. Direct sequence spread spectrum method used to hide data in audio

    file. Spread Spectrum method is known to be very robust, but as consequence

    the cost very large implementation is relatively complex and the information

    capacity is very limited.

  • 8/10/2019 To Hide1 - Copy

    3/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 3

    1.3 LITERATURESURVEY :-

    After going through many magazines and websites we got the idea aboutPerformance

    Analysis of Audio Signal For Promoting Global Cyber Security Using Data Hiding

    Techniques

    On searching IEEE papers the following information is collected:

    The paper entitled LSB Based Audio Steganography Method Based On Lifting

    Wavelet.gives following information.

    In this paper we present a novel method for digital audio steganography where

    encrypted convert data is embedded into the wavelet coefficients of host audio signal. this

    method avoid extraction error we use lifting wavelet transform. but this method is not robust.It is very sensitive to any kind of filtering or manipulation of the stego audio. We calculated

    hearing threshold in time domain and used it embedding threshold

    The Paper entitledA Robust Digital Watermarking Scheme For Media Files (

    IEEE2006) gives following information .

    In this paper present a robust mechanism for digital watermarking in media files .

    we have combined cryptographic and steganographic operation so that a violator can not

    easily change the copyright information hidden inside the file. this method robust. but it is

    difficult to implemented .

    The Paper entitled Intelligent Processing : An Approch of audio steganography

    (IEEE2011)

    This paper provides implementation of two level encryption of user data combining

    two areas of network security ,cryptography and steganography .the combination of LSB

    techniques with XOR ing method is described in this paper ,whichgives additional level ofsecurity. It gives great security . It is very sensitive to any kind of filtering or manipulation of

    the stego audio.This paper can be used to increase the capacity as well as to improve the

    confidentiality of audio steganography

  • 8/10/2019 To Hide1 - Copy

    4/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 4

    The paper entitled Implementation of Direct Spread Spectrum steganography

    on audio data gives information about the algorithm used for the basic steganography. This

    paper basically focuses in the advantages of the Spread spectrum algorithm as well as the

    advantages of the audio steganography.Various algorithms for audio steganography weresearched and studied.This paper explains the detail method for audio steganography. This

    method proved very robust against audio manipulation and very safe with the resulting noise

    is quite small but cost that take far more expensive than LSB method .Implementation is

    relatively complex , and the information capacity is very limited. This Method used are audio

    cropping ,audio inversion ,overwriting the information ,and changing the format

    1.4

    Motivation

    Today, steganographic techniques are often used by copyright holders who wish to combat

    privacy and theft. Images, video, and music can be encoded with information that can be

    used to identify the work as being the property of an individual or corporation. These

    encodings are often called watermarks. Watermarked media can be distributed on the internet

    while allowing copyright holders to be able to maintain their intellectual property.

    Commercially available watermarking technologies use robust techniques to encode

    information that are resistant to a variety of attacks on the message. Such attacks may include

    cropping or distorting the image, or modifying color information to destroy any hidden

    information that could possibly exist in a given signal.Steganography has seen exponential

    usage since the 1990s. Stego algorithm downloads are now available on the Internet as

    shareware. Governments, military, businesses, and private citizens all over the world now

    use steganography for security and privacy purpose. The music and movie industries

    continually devise new material control methods such as earmarking early distribution of

    movie screenings via steganography. In traitor tracing each copy of a given movie contains

    a digital watermark with a unique serial number and the movie distributor knows to whom

    each serial number has been delivered. When a copy becomes compromised, the movie

    company only needs to extract the serial number from the copy in question and start tracing it

    to the point of origin. In broadcast monitoring broadcast detectors are used to extract the

  • 8/10/2019 To Hide1 - Copy

    5/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 5

    watermark of a given file or medium and report to the broadcasting events to notify the

    owner or distributor of broadcast status (medium was played, time and date).

    1.5 Problem Definition

    Our project is an effort aimed at providing a secure means of communication hiding

    the very fact that some sort of communication is taking place.

    To develop software Steganography which will hide secrete data like text message in

    audio,, with the help of secrete key.

    In encoding process we must get the audio file back, such that, viewer of audio

    should not come to know that data is hidden behind that audio file.

    1.6

    Scope and Objectives

    Military communications system make increasing use of traffic security technique which,

    rather than merely concealing the content of a message using encryption, seek to conceal its

    sender, its receiver or its very existence. Similar techniques are used in some mobile phone

    systems and schemes proposed for digital elections. Some of the techniques used in

    steganography are domain tools or simple system such as least significant bit (LSB) insertion

    and noise manipulation, and transform domain that involve manipulation algorithms and

    audio transformation such as discrete cosine transformation and wavelet transformation.

    The project has the following objectives:

    1. To create a tool that can be used to hide data inside audio.

    2. The tool should be easy to use, and should use a graphical user interface.

    3. The tool should effectively hide a message using an audio and should be able to retrieve

    this message afterwards.

    4. The tool should take into account the original content, to theoretically more effectively

    hide the message.

    5. The tool should be able to provide some information as to the effectiveness of the hiding

    i.e. it should be able to evaluate the degradation of audio.

  • 8/10/2019 To Hide1 - Copy

    6/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 6

    1.7

    Technical Approach

    There are a number of software packages are available on the internet for the purpose

    steganography on just about any software platform.

    MP3 STEGO: - MP3 Stego is a steganographic tool that will hide information in MP3 filesduring the compression process. The basic idea behind these systems is to substitute the

    redundant parts of the cover object with the stego message. Steganography literally means

    covered writing. Its goal is to hide the fact that communication is taking place. This is often

    achieved by using a (rather large) cover file and embedding the (rather short) secret

    message into this file. The result is an innocuous looking file (the stego file) that contains the

    secret message. Now, it is gaining new popularity with the current industry demands for

    digital watermarking and fingerprinting of audio and video. There are three different aspects

    in information-hiding systems contend with each other: capacity, security and robustness.

    Capacity refers to the amount of information that can be hidden in the cover medium,

    security to an eavesdroppers inability to detect hidden information and robustness to the

    amount of modification the stego medium can withstand before an adversary can destroy the

    hidden information. In the field of steganography, some terminology has been developed and

    is as follows. The term cover is used to describe the original, innocent message, data,

    audio, still, video and so on. The information to be hidden in the cover data is known as the

    embedded ddata or secret data. The stegodata is the data containing both the cover

    signal and the secrete information embedded using key. Logically, the process of putting

    the hidden or embedded data, into the cover data, is sometimes known as embedding.

    Occasionally, especially when referring to image steganography, the cover image is known

    as the container.

    . Also, the following tools are used:-

    Hide4PGP

    MP3Stego

    JP-hide

    GifshufflE

    EzStego

    Hide and Seek

  • 8/10/2019 To Hide1 - Copy

    7/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 7

    CHAPTER 2

    THEORETICAL DETAILS AND ANALYSIS

  • 8/10/2019 To Hide1 - Copy

    8/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 8

    2.1 Introduction

    The whole seminar report is divided into appropriate number of chapters. The brief

    introduction of each chapter is described below.

    .Chapter 1:In this chapter we are introducing our project through previous work, historyRelevance and literature survey.

    Chapter 2: In this chapter theoretical details and analysis of project is discussed.

    Section 2.2 introduction and discussion for steganography is given

    Section 2.3 categories of steganography are given.

    Section 2.4 Audio algorithm discussed.

    Chapter 3: Flowcharts, algorithms and block diagrams of project is discussed.

    Chapter 4: Results of project and discussion.

    Chapter 5: In this chapter conclusions are discussed.

    Chapter 6:Futurescope

    2.2

    STEGANOGRAPHY

    Steganography is the practice of hiding private or sensitive information within something that

    appears to be nothing out to the usual. Steganography is often confused with cryptology

    because the two are similar in the way that they both are used to protect important

    information. The difference between two is that steganography involves hiding information

    so it appears that no information is hidden at all. If a person or persons views the object that

    the information is hidden inside of he or she will have no idea that there is any hidden

    information, therefore the person will not attempt to decrypt the information.

    What steganography essentially does is exploit human perception, human senses are not

    trained to look for files that have information inside of them, although this software is

    available that can do what is called Steganography. The most common use of steganography

    is to hide a file inside another file.

    History of Steganography

  • 8/10/2019 To Hide1 - Copy

    9/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 9

    Throughout history Steganography has been used to secretly communicate information

    between people. Some examples of use of Steganography is past times are:

    1. During World War 2 invisible ink was used to write information on pieces of paper so

    that the paper appeared to the average person as just being blank pieces of paper.

    Liquids such as milk, vinegar and fruit juices were used, because when each one of

    these substances are heated they darken and become visible to the human eye.

    2. In Ancient Greece they used to select messengers and shave their head, they would

    then write a message on their head. Once the message had been written the hair was

    allowed to grow back. After the hair grew back the messenger was sent to deliver the

    message, the recipient would shave off the messengers hair to see the secrete

    message.3. Another method used in Greece was where someone would peel wax off a tablet that

    was There are three different aspects in information-hiding systems contend with

    each other: capacity, security and robustness. Capacity refers to the amount of

    information that can be hidden in the cover medium, security to an eavesdroppers

    inability to detect hidden information and robustness to the amount of modification

    the stego medium can withstand before an adversary can destroy the hidden

    information. In the field of steganography, some terminology has been developed and

    is as follows

    4. The term cover is used to describe the original, innocent message, data, audio, still,

    video and so on. The information to be hidden in the cover data is known as the

    embedded data or secrete data. The stego datais the data containing both the

    cover signal and the secrete information embedded using key. Logically, the

    process of putting the hidden or embedded data, into the cover data, is sometimes

    known as embedding. Occasionally, especially when referring to image

    steganography, the cover image is known as the container.

  • 8/10/2019 To Hide1 - Copy

    10/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 10

    2.3FIVE CATEGORIES OF STEGANOGRAPHY

    A) SUBSTITUTION SYSTEM

    Substitution system steganography replaces redundant or unneeded bits of a cover with the

    bits from the secret message. Several available steganography tools use the Least Significant

    Bit (LSB) method of encoding the secret message. LSB works like this. In a digital cover

    file, there is a tremendous amount of wasted or redundant space. It is this space that the

    steganography program will take advantage of and use to hide another message (on the bit

    level) within the digital cover.

    B) TRANSFORM DOMAIN TECHNIQUES

    The transform domain technique is also very effective, but is a little trickier to explain.

    Basically, transform domain techniques hide message data in the transform space of a

    signal .If youre saying to yourself, Huh? hold on and Ill explain. Every day on the

    Internet, people send pictures back and forth, and most often they use a JPEG format. JPEGs

    are interesting in that they compress themselves when they close. In order for this to take

    place, they have to get rid of excess data (excess bits) that would otherwise prevent them

    from Steganography and Application Password Crackers compressing. During compression,

    a JPEG will make an approximation of itself to become smaller. This change transforms

    space; thus, it can be used to hide information.

    C) SPREAD SPECTRUM TECHNIQUES

    In this section we briefly define two types of spread spectrum techniques: direct sequence

    and frequency hopping .In direct sequence spread spectrum, the stream of information to be

    transmitted is divided into small pieces, each of which is allocated to a frequency channel

    spread across the spectrum. A data signal at the point of transmission is combined with a

    higher data-rate bit sequence (also known as a chipping code) that divides the data according

    to a spreading ratio. The redundant chipping code helps the signal resist interference and also

  • 8/10/2019 To Hide1 - Copy

    11/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 11

    enables the original data to be recovered if data bits are damaged during transmission

    .Frequency hopping is when a broad slice of the bandwidth spectrum is divided in many

    possible broadcast frequencies. In general, frequency-hopping devices use less power and are

    cheaper, but the performance of direct sequence spread spectrum systems is usually better

    and more reliable.

    D) DISTORTION TECHNIQUES

    The distortion method of steganography creates a change in a cover object to hide

    information .The secret message is recovered when the algorithm compares the changed

    and or distorted cover with the original.

    E) COVER GENERATION METHODS

    Cover generation methods are probably the most unique of the five types. Typically, a

    coverobject is chosen to hide a message in, but thats not the case here. A cover generation

    method actually creates a cover for the sole purpose of hiding information. Spam Mimic is

    an excellent example of a cover generation method.

    TERMS RELATED TO STEGANOGRAPHY

    Cover image- An image containing an embedded message.

    Cypher text Refers to encrypted data.

    Cryptography The art of protecting information by encrypting it into an unreadable

    format, called cipher text. A secret key is used to decrypt the message into plain text.

    Encryption The translation of data into a secret code.

    Least significant bit (LSB)- The bit contributing the least value in a string of bits.

    Lossless compression- For most types of data, lossless compression techniques can reducethe space needed by only about 50%. No data is lost in the process. For greater compression,

    one must use a lossy compression technique.

  • 8/10/2019 To Hide1 - Copy

    12/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 12

    Lossy compression - Lossy compression technologies attempt to eliminate redundant orunnecessary information. Some amount of data is lost in the process.

    Plain text Refers to any message that is not encrypted - also called clear text.

    Steganalysis The art of discovering and rendering useless covert messages.

    Steganography - A means of overlaying one set of information ("message") on another (a

    cover).

    Stego audio- The result of combining the cover audio and the embedded message.

    Stego text It is the result of applying some steganographic process to a plain text (notnecessarily encrypted).

    TCP/IP - The Transmission Control Protocol / Internet Protocol is the standard protocol

    suite used on the Internet.

    A.DCT

    DCT (discrete cosines transform) is used in JPEG compression. Embedding in DCT domain

    is simply done by altering the DCT coefficients, for example by changing the least

    significant bit of each coefficient. One of the limitation in DCT domain happened when 64

    coefficients are equal to zero. Values will have an effect on the compression rate. So the

    number of bit one could embed in DCT domain is less that the number of bits one could

    embed by the LSB method. Also embedding capacity becomes dependent on the Image type

    used in the case of DCT embedding. There are different methods for altering the DCT

    coefficients that reviews of stego.

    B: Frequency Domain

    Another transform domain for embedding is frequency domain. They first decor relate the

    image by scrambling the pixels randomly, which in effect whitens the frequency domain of

    the image and increases the number of transform coefficients in the frequency domain thus

    increasing the embedding capacity. Note the result is a salt and pepper image.

  • 8/10/2019 To Hide1 - Copy

    13/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 13

    2.4Data Hiding in Audio Signal

    2.4.1 Introduction

    The fast improvement of the Internet and the digital information revolution caused major

    changes in the overall culture. Flexible and simple-to-use software and decreasing prices of

    digital devices (e.g. portable CD and mp3players, DVD players, CD and DVD recorders,

    laptops, PDAs) have made it feasible for consumers from all over the world to create, edit

    and exchange multimedia data. Broadband Internet connections almost an errorless

    transmission of data helps people to distribute large multimedia files and make identical

    digital copies of them. In modern communication system Data Hiding is most essential for

    Network Security issue. Sending sensitive messages and files over the Internet are

    transmitted in an unsecured form but everyone has got something to keep in secret. Audio

    data hiding method is one of the most effective ways to protect your privacy.

    A number of different cover objects (signals) can be used to carry hidden messages. Data

    hiding in audio signals exploits imperfection of human auditory system known as audio

    masking. In presence of a loud signal (masker), another weaker signal may be inaudible,

    depending on spectral and temporal characteristics of both masked signal and masker

    Masking models are extensively studied for perceptual compression of audio signals In the

    case of perceptual compression the quantization noise is hidden below the masking threshold,

    while in a data hiding application the embedded signal is hidden there. Data hiding in audio

    signals is especially challenging, because the human auditory system operates over a wide

    dynamic range. The human auditory system perceives over a range of power greater than one

    billion to one and a range of frequencies greater than one thousand to one .Sensitivity to

    additive random noise is also acute. The perturbations in a sound file can be detected as low

    as one part in ten million (80 dB below ambient level).However, there are some holes

    available. While the human auditory system has a large dynamic range, it has a fairly small

    differential range. As a result, loud sounds tend to mask out quiet sounds .Additionally, the

    human auditory system is unable to perceive absolute phase, only relative phase. Finally,

    there are some environmental distortions so common as to be ignored by the listener in most

    cases. Now we will discuss many of these methods of audio data hiding technology.

  • 8/10/2019 To Hide1 - Copy

    14/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 14

    2.4.2 WAVE Files

    Audio file format is a container format for storing audio data and metadata on a computer

    system. There are three major groups of audio file format nowadays:

    1] Uncompressed audio formats, [e.g., WAV]

    2] Formats with lossless compression, [e.g., WMA]

    3] Formats with lossy compression. [e.g., MP3]

    Our design is based on uncompressed WAV audio format. WAV file format is a subset of

    Microsofts RIFF specification for the storage of multimedia files. A RIFF file begins with a

    file header followed by a sequence of data chunks. In fact, a WAV file is a RIFF file with a

    signal WAV chunk. The signal WAV chunk is subdivided into two subchunks:[a] fmt

    chunk specifies the data format with some audio metadata information, such as number of

    channels, sample frequency rate, byte rate, and [b] block alignment. data chunk specifies

    the data sample .

    What is probably the most common format in use today is the WAVE format, usually marked

    by the suffix .wav. WAVE files are actually a special case, for audio, of the RIFF format for

    multimedia files. The RIFF format is a Microsoft standard. The full specification is contained

    in the document Microsoft Multimedia Standards Update, Revision 3.0, April 15, 1994. The

    RIFF format is a derivative of the Interchange Format Files format developed by Electronic

    Arts.

    There is also a slight variant of the RIFF format known as the RIFX format. RIFX differs

    from RIFF in the endianess of integer data. RIFF data is required to be little-endian; RIFX

    data is required to be big-endian. In all other respects RIFX format is identical to RIFF

    format except for the fact that the magic number isRIFXrather thanRIFF. The RIFF format

    was developed for use with Intel processors. The RIFX format is an adaptation for Motorolaprocessors, which have the opposite endianness.

    It is possible for standard-conforming WAVE files to be more complex. They may contain

    multiple data chunks, and they may contain chunks of other types, such as play lists, cue lists,

    padding (to cause the audio data to start at a specific location), and text containing

  • 8/10/2019 To Hide1 - Copy

    15/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 15

    information about the origin of the file and the processing it has undergone. It is permissible

    for WAVE files to include non-standard chunk types. Standard-conforming software will

    simply skip over chunks that it does not know how to handle.

    Here is the structure of the simplest standard-conforming WAVE file:

    Bytes Content Offset

    4 Magic number: RIFF/RIFX 0

    4 WAVE chunk size = file size 8 4

    4 WAVE identifier: WAVE 8

    4 Format chunk identifier: fmt 12

    4 Format chunk size: 16 16

    2 Sound format code 20

    2 Number of channels 22

    4 Sampling rate 24

    4 Average data rate in bytes per second 28

    2 Bytes per sample* 32

    2 Bits per sample* 34

    4 Chunk identifier: data 36

    4 Chunk length in bytes: N 40

    N Audio data 44

    Table 2.1 WAVE file format

  • 8/10/2019 To Hide1 - Copy

    16/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 16

    CHAPTER 3

    ALGORITHMS AND BLOCK DIAGRAM

  • 8/10/2019 To Hide1 - Copy

    17/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 17

    3.1AUDIO STEGNOGRAPHY

    3.1.2 ENCODER

    1. Select available original .wav file at transmitter side.

    2. Read the .wav audio file using wavread function. its samples amplitude value in

    variable wave and frequency in fs.

    3. Transform audio cover object in time domain into frequency domain .

    4. Now information signal (message signal) convert into binary format.

    5. Take PN sequence . frequency of PN sequence must be greater than frequency of

    message signal .

    6. Modulate message signal & PN sequence .length message signal must be equal to length

    of PN sequence .output of modulators is message signal with noise.7. After Transform message signal with noise in time domain into frequency domain .

    8. Add the FFT of audio signal and FFT of message signal with noise.gives FFT of audio

    signal containing message.

    9. Take the IFFT of audio signal containing message and obtain stego audio . Stego audio

    means combining the cover audio and the embedded message

    10.Check parameters PSNR, MSE, BER.

    3.1.2 DECODER1. Select available stego .wav file at receiver side

    2. Read the .wav audio file (stego audio)using wavread function. its samples amplitude

    value in variable wave and frequency in fs.

    3. Transform stego audio in time domain into frequency domain

    4. Subtraction of stego audio of FFT and original audio of FFT. to obtain FFT message

    signal with noise.

    5. Take the IFFT of message signal with noise.

    6. Then demodulate message signal with noise and same PN sequence. obtain original

    message signal in binary format.

    7. Convert binary format into character format .we obtain original message .

  • 8/10/2019 To Hide1 - Copy

    18/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 18

    3.2.3 TRANSCEIVER GUI FOR AUDIO:1. Press the get audiobutton to select audio file in which you want to hide secret data.

    2. Enter the secret text data which you want to hide .

    3. Press playbutton to listen audio .

    4. Enter the secret password .

    5. Press the encode button to hide text in audio file .

    6. Check PSNR ,BER ,MSE.

    7. We get ENCODING DONE message.

    8. Enter password.

    9. Press DECODER button .

    10.To obtain original audio and text.

    11.Press the play audiobutton to check audio file.

  • 8/10/2019 To Hide1 - Copy

    19/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 19

    3.3 BLOCK DIAGRAM :

    Fig .Block diagram of Embedding and Extraction of secret data

    MESSAGE

    AUDIO

    FILEENCODER STGO

    AUDIO

    PN

    SEQUENCE

    DECODER

    RECOVER

    MESSAGE

    RECOVER

    AUDIO

    COMPUTER

    FORENSICS

  • 8/10/2019 To Hide1 - Copy

    20/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 20

    CHAPTER 4

    RESULTS AND DISCUSSION

  • 8/10/2019 To Hide1 - Copy

    21/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 21

    4.1RESULTS:

    Data security is provided by hiding secrete data behind cover audio file using

    steganography technique and fake or original stego-audio is detected, using computerforensic technique. We have worked on hiding text behind audio files extractedfrom an WAV file using least spread spectrum method for audio steganography. We

    have designed the software for the project in MATLAB

    4.2

    TRANSCEIVER FOR AUDIO FILE

    Fig .Transceiver Gui for audio

  • 8/10/2019 To Hide1 - Copy

    22/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 22

    4.3AUDIO STEGANOGRAPHY RESULTS:

  • 8/10/2019 To Hide1 - Copy

    23/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 23

    4.6 ADVANTAGES

    1. As human auditory system to recognize the change in audio is smaller than visual

    system, we hide secrete text in audio file.

    2. At receiver user has to enter the secret key which will be known to the intended user

    only. This is more secure.

    3. It also has user friendly GUI which is easy to handle.

    4.7 APPLICATIONS1. Used for the secure data transmission

    2. Used in the business environment for transmitting the secret business plan

    3. This software can be used by the scientists for transmitting secret chemical

    Formula

    4. Common man can use this software for keeping some secret documents like

    passwords or confidential data

    5. used for military areas.

  • 8/10/2019 To Hide1 - Copy

    24/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 24

    CHAPTER 5

    CONCLUSIN

  • 8/10/2019 To Hide1 - Copy

    25/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 25

    CONCLUSION:-

    Steganography is not intended to replace cryptography but rather to supplement it. If a

    message is hidden with a steganographic method it provides an additional layer of protectionand reduces the chance of the hidden message being detected.

    This method proved very robust against audio manipulation and very safe with the resulting

    noise is quite small but cost that take far more expensive than LSB method .Implementation

    is relatively complex , and the information capacity is very limited.

    This Method used are audio cropping ,audio inversion ,overwriting the information ,and

    changing the format

  • 8/10/2019 To Hide1 - Copy

    26/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 26

    CHAPTER 6

    FUTURE SCOPE

  • 8/10/2019 To Hide1 - Copy

    27/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 27

    1. The emergence of the Internet and the World Wide Web has created new areas for

    Steganography to expand to. The music industry can substantially gain fromSteganography in the form of Digital Watermarking. The music industry has lost

    significant revenue due to a drop in sales. This drop has been correlated with the

    increased exchange of music through peer to peer technologies such as KaZaa andiMesh. Digital watermarking can be implemented to identify legitimately purchasedmusic from music that has not been acquired through legitimate channels. The music

    industry can then use that data to implement controls to prevent those files from beingplayed. This will involve cooperation with software and hardware vendors to allow

    only licensed files to be played

    2. Steganography is more secure technique than any other data hiding techniquesavailable. Due to time and computing limitations, we could not explore all facets of

    steganography and detection techniques. As you saw, we studied the power in ourpictures to test for hidden data. Another method which we were unable to explore was

    to analyze the noise of the pictures. Adding hidden data adds random noise, so itfollows that a properly tuned noise detection algorithm could recognize whether or

    not a picture had steganographic data or not.therefore continuous efforts have beenmade to increase the robustness of steganographic images.

    3. Individuals who want to protect their information and communication messages canalso use Steganography to augment existing encryption options. As hackers and other

    individuals who want to get other individuals data get more sophisticated, the privatecitizen needs to have more methods to protect themselves.

    4. Terror organizations have access to the same technologies available to private

    individuals. This in turn poses a challenge to governments and military commanders.Steganography can provide terror organizations a vehicle in which to transmit

    information unnoticed. Governments and military commanders are aware of thissituation and could in turn pose restrictions on the availability of advanced

    technologies to its citizens. A technology such as Steganography fits very well withthe needs of terror organizations. However it is unclear as to what extent terrorists

    have used or will use this technology.

    5. The military that has been a major user of Steganography will continue to use it inmore advanced and complex methods. In a military operation the battlefield

    commander must ensure that his commands are relayed in the most secure methodpossible. In addition battle field intelligence must make its way from the front lines

    back to the commander is an equally secure mechanism. The military has used bothcryptography and Steganography to protect its information. We foresee that this will

    still continue to be the case, however digital Steganography is an area that themilitary can further expand on.

  • 8/10/2019 To Hide1 - Copy

    28/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    Page | 28

    REFERENCES:-

    [1] Rizky M. Nugraha Implemenation of Direct Sequence Spread spectrum

    Steganography On Audio Data978-1-4577-0752-0/11$2011 IEEE

    [2] W. C. Kuo, L.C. Wuu, C.N. Shyi, S.H. Kuo, A Data Hiding Scheme with High

    Embedding Based on General Improving Exploiting Modification Direction

    Method,2009Conference on Hybrid Intelligent Systems (HIS09), Aug. 2009, pp. 69-72.

    [3] David Wheelers, Y. R. Wang, and C. C. Chang, Audio Steganography Using High

    Frequency Noise Introduction,IIHMSP 2007. Third International Conference on Volume

    1, Issue, 26-28 Nov. 2007 pp.497 500

    [4] Wen-Chung Kuo,Jiin-Chiou Cheng, Chun-Cheng WangAudio Watermarking Techniques

    Using Sinusoidal Pattern Based On Pseudo Random Sequence.2009 Fourth International

    Conference on circuit and system, for the audio information.

    [5] Yuh-Ming Huang, Pei-WunJhanTwo Improved Data Hiding Schemes978-1-4244-

    9306-7/112011 IEEE4th International Congress on Image and Signal Processing.

    [6] ZhengLing,ZhangBin,Fu LichenMulti-scale edge detection in the EMD domain using

    the adaptive noise threshold -2011. 978-1-4577-1587-7/110 2011 IEEE2011

    International Conference on Computer Science and Network Technology

    [7] QuZhiguo, Fu Yu, NiuXinxin, Yang Yixian, ZhangRuImproved EMD Steganography

    with Great Embedding Rate and High Embedding Efficiency. 978-0-7695-3762-7/09

    2009 IEEE DOI 10.1109/IIH-MSP.2009.290 348Fifth International Conference on Intelligent

    Information Hiding and MultimediaSignal Processing.

  • 8/10/2019 To Hide1 - Copy

    29/29

    TO HIDE TEXIT IN AUDIO FILE USING SPREAD SPECTRUM

    [8] Weiwei Liu, Yuewei Dai, ShiguoLianRobust Audio Steganography Using Direct

    Sequence Spread Spectrum -2011. 978-0-7695-4559-2/11 2011 IEEEDOI

    10.1109/MINES.2011.138Third International Conference on Multimedia Information

    Networking and Security

    [9] Zheng Ling, Zhang Bin ,WangJiyeAdaptive Multi-Scale Edge Detection in the

    EMD Domain-2012978-0-7695-4789-3/12 2012 IEEEDOI

    10.1109/ICCIS.2012.59Fourth International Conference on Computational and Information

    Sciences.

    [10] HamzehHajizadeh, Ahmad Ayatollahi and SattarMirzakuchakiA New High

    Capacity and EMD-based Image Steganography Scheme in Spatial Domain.-2013 978-

    1-4673-5634-3/132013 IEEE

    WIKIPEDIA, INTERNET.

    Website:

    1. Sonali Gupta, 2005, All about steganography, available at:

    http://palisade.plynt.com/issues/2005apr/steganography