Professional Documents
Culture Documents
Presented by
Guide
28 March 2012
Objective To study the advantages and disadvantages of LSB (Least Significant Bit) Technique. To work on an algorithm to encrypt the plain text into a cipher text and compress the cipher text before finally embedding it on an audio file for Secret communication. To be able to recover the original text embedded into the audio file.
28 March 2012
Literature Review
LSB method of Steganography is studied from [1]. Advantages and Disadvantages of LSB technique is discussed in [2]. Basics of Cryptography and Steganography are studied in [3] and [4].
28 March 2012
Introduction to steganography
Steganography is an art of sending hidden data or secret messages over a public channel so that a third party cannot detect the presence of the secret messages. The goal of steganography is different from classical encryption, which seeks to conceal the content of secret messages; it is about hiding the very existence of the secret messages without affecting the quality of medium.
28 March 2012 5
Block diagram
Secret Text
Embedding Process
LSB of the Data Part
Audio Input
Stego Audio
28 March 2012
Extraction
Extraction Process
Store LSB of Data Part
Stego Audio
Extracted Text
28 March 2012
28 March 2012
10
Algorithm (For Extracting of Data) Leave first 50 bytes. Start from the 51st byte and store the least significant bit in a queue. Check every alternate sample and store the least significant bit in the previous queue with a left shift of the previous bit. Convert the binary values to decimal to get the ASCII values of the secret message. From the ASCII find the secret message.
28 March 2012 11
28 March 2012
12
Existing method
Cryptography is a physical process that scrambles information by rearrangement or substitution of content, making it unreadable to anyone except the person capable of unscrambling it. With the sheer volume of sensitive Internet transactions that occur daily, the benefit of securing information using cryptographic processes becomes a major goal for many organizations.
28 March 2012
13
Spectrogram of audio file before embedding data 8000 6000 4000 2000 0
Frequency
0.1
0.2
0.5 0.6 0.7 0.8 Time Spectrogram of audio file after embedding data
0.3
0.4
0.9
Frequency
0.1
0.2
0.3
0.4
0.5 Time
0.6
0.7
0.8
0.9
14
28 March 2012
INFERENCE
As can be seen in the Spectrograms from the previous page, it can be told that a cryptanalyst is able to check if information is embedded onto the audio file by comparing the spectrogram of the transmitted audio file to the spectrogram of the original audio file. Now obviously there is a difference in the spectrogram of the two audio files. So to overcome this we have proposed a few changes to the original LSB technique. The original technique involved embedding the bits into the least significant bit of every alternate byte after the header and the bytes that are allocated to store the length of the secret data
28 March 2012
15
Transmission time for documents encrypted using public key cryptography is significantly slower. In fact, transmission of very large documents is prohibitive. The key sizes must be significantly larger to achieve the high level of protection. Public key cryptography is susceptible to impersonation attacks. It is susceptible to attacks from Cryptanalysists.
28 March 2012 16
Proposed method
Encrypting the plain text into cipher text by using one of the encryption algorithm. In the current endeavor, an audio file with .wav extension has been selected as host file. It is assumed that the least Significant bits of that file should be modified without degrading the sound quality.
28 March 2012
17
28 March 2012
18
ENCRYPTION ALGORITHMS
Algorithms Blowfish RC5 DES IDEA Triple-DES Clock cycles per round 9 12 18 50 18 # rounds 16 16 16 8 48 # of clock cycles per byte encrypted 18 23 45 50 108 free RSA security 56-bit key Ascom-Systec
We have chosen the RC5 encryption algorithm because of the following reasons
Simple algorithm key is the data-dependent rotations. Keys are accessed sequentially, allowing for small caches.
28 March 2012 20
RC5
Proprietary cipher owned by RSA Data Security (designed by Ron Rivest). Very fast, operates on words. Variable key size, block size and number of rounds. Clean and simple design. Low memory requirement. Data-dependent rotations that strengthen the algorithm against cryptanalysis.
28 March 2012
21
YES
IF C>D?
NO
CONVERT THE NEW VALUES OF C & D INTO BINARY FORM TO GET E AND F RESPECTIVELY XOR E AND F TO GET X
28 March 2012
22
Suppose we have an audio file say of length 6MB or approximately 6000 bytes. Now for making the calculations simple we take the length of the secret message when converted to binary form as 300 bits. In the proposed method, the secret message is superimposed over the audio file for which we follow the following algorithm. ALGORITHM The agenda of the proposed method is to space the bits(secret message) evenly throughout the host audio file. For this we consider the example for which we now have to find the sampling rate which is given by SAMPLING RATE = LENGTH OF THE HOST AUDIO FILE IN BYTES LENGTH OF SECRET MESSAGE IN BINARY FORM IN BITS So now, the sampling rate for the given example is 20 bytes/sample ie every 20th sample in the body of the host audio file will have its LSB tinkered with.
28 March 2012 23
SAMPLE OF AUDIO FILE WITH BINARY VALUES MODIFIED USING THE PROPOSED METHOD
SAMPLE NO. BINARY VALUE OF CORRESPONDING SAMPLE 01110100 01111100 10100101 10000000 11010011 00101100 01001100 10100110 BINARY VALUE TO BE EMBEDDED 0 1 0 0 0 0 0 1 BINARY VALUE AFTER MODIFICATION 01110100 01111101 10100101 10000000 11010010 00101100 01001100 10100111
24
28 March 2012
25
Embedding Step
Input - Karthik Key - Kiran Outut - 7(0(=.5 Now the above cipher text is embedded onto the audio file using LSB technique.
28 March 2012
26
28 March 2012
27
28 March 2012
28
Text retreival
After removing the cipher text by removing the LSB according to the sampling rate. Input - 7(0(=.5 Key - Kiran Outut - Karthik Now the above cipher text is embedded onto the audio file using LSB technique
28 March 2012
29
Applications
Military Applications Secured Data Transmission
Mode of Implementation
28 March 2012
30
Review 1 : To derive an algorithm to encrypt plain text into cipher text. Review 2 : Implement the derived algorithm and the LSB Technique using MATLAB 7.10.0.499 (R2010a)
28 March 2012
31
Reference
[1] Tanmay Bhowmik , and Pramatha Nath Basu, On Embedding of Text in audio A case of Steganography, IEEE Transactions 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 203-206. [2] J. Zollner, H. Federrath, H. Klimant, et al., Modeling the Security of Steganographic Systems, in 2nd Workshop on Information Hiding, Portland, April 1998, pp. 345-355. [3] Atul Kahate, Cryptography and Network Security, 2nd edition, Tata McGraw-Hill Inc., NY, 2008. [4] William Stallings, Cryptography and Network Security, 5th edition, Pearson Education, Inc., Prentice Hall , 2011.
28 March 2012
32