You are on page 1of 32

EMBEDDING OF TEXT ONTO AUDIO DATA USING LSB TECHNIQUE FOR SECURED COMMUNICATION

Presented by

B.I. Karthik Kiran Karthik Doraiswamy Parthiban A

Guide

: Saraswathi N Asst. Prof Dept of ECE

28 March 2012

Outline of the Presentation


Objectives of the Research work Literature Review Introduction to Steganography System model Existing Method Drawbacks of Existing Method Proposed Method Advantages of Proposed Method Application Mode of Implementation Schedule for phase 1 Reference List
28 March 2012 2

Objective To study the advantages and disadvantages of LSB (Least Significant Bit) Technique. To work on an algorithm to encrypt the plain text into a cipher text and compress the cipher text before finally embedding it on an audio file for Secret communication. To be able to recover the original text embedded into the audio file.

28 March 2012

Literature Review
LSB method of Steganography is studied from [1]. Advantages and Disadvantages of LSB technique is discussed in [2]. Basics of Cryptography and Steganography are studied in [3] and [4].

28 March 2012

Introduction to steganography

Steganography is an art of sending hidden data or secret messages over a public channel so that a third party cannot detect the presence of the secret messages. The goal of steganography is different from classical encryption, which seeks to conceal the content of secret messages; it is about hiding the very existence of the secret messages without affecting the quality of medium.
28 March 2012 5

LSB technique in detail


To develop this algorithm multiple bits of each sample of the file have been changed or modified to insert text data in it. It has also been observed that there is degradation of the host audio file after modification of the bits. The bit modification was done by various ways, like 1, 2, 3, 4 bits were changed in turn. But after going through all the modification it has been observed that 1 bit change in LSB gave the best result. Thus, data can be embedded according to the following algorithm.
28 March 2012 6

Block diagram
Secret Text

Embedding Process
LSB of the Data Part

Audio Input

Separate Header and Data Alternate Samples of LSB Data

Stego Audio

28 March 2012

Extraction

Extraction Process
Store LSB of Data Part

Stego Audio

Separate Header and Data Left Shift of Previous bit

Convert Binary to ASCII

Extracted Text

28 March 2012

Algorithm (For Embedding of Data):


Leave the header section of the audio file untouched... Start from a suitable position of the data bytes. (For the practical implementation the present start byte was the 51st byte). Edit the least significant bit with the data that have to be embedded. Take every alternate sample and change the least 28 March 2012 9 significant bit to embed the whole message.

Example of embedding text A into file

28 March 2012

10

Algorithm (For Extracting of Data) Leave first 50 bytes. Start from the 51st byte and store the least significant bit in a queue. Check every alternate sample and store the least significant bit in the previous queue with a left shift of the previous bit. Convert the binary values to decimal to get the ASCII values of the secret message. From the ASCII find the secret message.
28 March 2012 11

Example of extracting text A out of file

28 March 2012

12

Existing method
Cryptography is a physical process that scrambles information by rearrangement or substitution of content, making it unreadable to anyone except the person capable of unscrambling it. With the sheer volume of sensitive Internet transactions that occur daily, the benefit of securing information using cryptographic processes becomes a major goal for many organizations.

28 March 2012

13

Spectrogram of audio file before embedding data 8000 6000 4000 2000 0

Frequency

0.1

0.2

0.5 0.6 0.7 0.8 Time Spectrogram of audio file after embedding data

0.3

0.4

0.9

8000 6000 4000 2000 0

Frequency

0.1

0.2

0.3

0.4

0.5 Time

0.6

0.7

0.8

0.9
14

28 March 2012

INFERENCE
As can be seen in the Spectrograms from the previous page, it can be told that a cryptanalyst is able to check if information is embedded onto the audio file by comparing the spectrogram of the transmitted audio file to the spectrogram of the original audio file. Now obviously there is a difference in the spectrogram of the two audio files. So to overcome this we have proposed a few changes to the original LSB technique. The original technique involved embedding the bits into the least significant bit of every alternate byte after the header and the bytes that are allocated to store the length of the secret data

28 March 2012

15

Drawbacks of existing method

Transmission time for documents encrypted using public key cryptography is significantly slower. In fact, transmission of very large documents is prohibitive. The key sizes must be significantly larger to achieve the high level of protection. Public key cryptography is susceptible to impersonation attacks. It is susceptible to attacks from Cryptanalysists.
28 March 2012 16

Proposed method
Encrypting the plain text into cipher text by using one of the encryption algorithm. In the current endeavor, an audio file with .wav extension has been selected as host file. It is assumed that the least Significant bits of that file should be modified without degrading the sound quality.

28 March 2012

17

ENCRYPT THE DATA

STEGO AUDIO STEGO AUDIO


SEPARATE HEADER AND DATA CALCULATE SAMPLING RATE

EMBED ENCRPTED MESSAGE

28 March 2012

18

Advantages of proposed method


Secrecy - The embedding secret text is known to the sender and the receiver only. Imperceptibility The medium after being embedded with the covert data is indiscernible from the original medium. One cannot become suspicious of the existence of the covert data within the medium. High capacity - The maximum length of the covert message that can be embedded as long as possible depending on the size of the covering medium (audio).
28 March 2012 19

ENCRYPTION ALGORITHMS
Algorithms Blowfish RC5 DES IDEA Triple-DES Clock cycles per round 9 12 18 50 18 # rounds 16 16 16 8 48 # of clock cycles per byte encrypted 18 23 45 50 108 free RSA security 56-bit key Ascom-Systec

We have chosen the RC5 encryption algorithm because of the following reasons
Simple algorithm key is the data-dependent rotations. Keys are accessed sequentially, allowing for small caches.
28 March 2012 20

RC5
Proprietary cipher owned by RSA Data Security (designed by Ron Rivest). Very fast, operates on words. Variable key size, block size and number of rounds. Clean and simple design. Low memory requirement. Data-dependent rotations that strengthen the algorithm against cryptanalysis.

28 March 2012

21

A GET INPUT B GET KEY C DOUBLE VALUE OF A D DOUBLE VALUE OF B

FIND DIFFERENCE - T (C-D) APPEND DOUBLE VALUE 100 TO D , T TIMES

YES

IF C>D?

NO

FIND DIFFERENCE T (D-C) APPEND DOUBLE VALUE 100 TO C , T TIMES

CONVERT THE NEW VALUES OF C & D INTO BINARY FORM TO GET E AND F RESPECTIVELY XOR E AND F TO GET X

28 March 2012

LEFT CIRCULAR SHIFT X BY 1 TO GET THE CIPHER TEXT

22

Suppose we have an audio file say of length 6MB or approximately 6000 bytes. Now for making the calculations simple we take the length of the secret message when converted to binary form as 300 bits. In the proposed method, the secret message is superimposed over the audio file for which we follow the following algorithm. ALGORITHM The agenda of the proposed method is to space the bits(secret message) evenly throughout the host audio file. For this we consider the example for which we now have to find the sampling rate which is given by SAMPLING RATE = LENGTH OF THE HOST AUDIO FILE IN BYTES LENGTH OF SECRET MESSAGE IN BINARY FORM IN BITS So now, the sampling rate for the given example is 20 bytes/sample ie every 20th sample in the body of the host audio file will have its LSB tinkered with.
28 March 2012 23

SAMPLE OF AUDIO FILE WITH BINARY VALUES MODIFIED USING THE PROPOSED METHOD
SAMPLE NO. BINARY VALUE OF CORRESPONDING SAMPLE 01110100 01111100 10100101 10000000 11010011 00101100 01001100 10100110 BINARY VALUE TO BE EMBEDDED 0 1 0 0 0 0 0 1 BINARY VALUE AFTER MODIFICATION 01110100 01111101 10100101 10000000 11010010 00101100 01001100 10100111
24

51 71 91 111 131 151 171 191


28 March 2012

28 March 2012

25

Embedding Step
Input - Karthik Key - Kiran Outut - 7(0(=.5 Now the above cipher text is embedded onto the audio file using LSB technique.

28 March 2012

26

28 March 2012

27

28 March 2012

28

Text retreival
After removing the cipher text by removing the LSB according to the sampling rate. Input - 7(0(=.5 Key - Kiran Outut - Karthik Now the above cipher text is embedded onto the audio file using LSB technique

28 March 2012

29

Applications
Military Applications Secured Data Transmission

Mode of Implementation

MATLAB 7.10.0.499 (R2010a)

28 March 2012

30

Schedule for Phase 1


Review 0 in Audio files. : Study the LSB Technique of Steganography

Review 1 : To derive an algorithm to encrypt plain text into cipher text. Review 2 : Implement the derived algorithm and the LSB Technique using MATLAB 7.10.0.499 (R2010a)

28 March 2012

31

Reference
[1] Tanmay Bhowmik , and Pramatha Nath Basu, On Embedding of Text in audio A case of Steganography, IEEE Transactions 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 203-206. [2] J. Zollner, H. Federrath, H. Klimant, et al., Modeling the Security of Steganographic Systems, in 2nd Workshop on Information Hiding, Portland, April 1998, pp. 345-355. [3] Atul Kahate, Cryptography and Network Security, 2nd edition, Tata McGraw-Hill Inc., NY, 2008. [4] William Stallings, Cryptography and Network Security, 5th edition, Pearson Education, Inc., Prentice Hall , 2011.

28 March 2012

32

You might also like