You are on page 1of 14

Audio Steganography using LSB method

Contents:

Introduction System flow diagram LSB coding E-Cipher E and D algorithm Algorithm for Transmission side Algorithm for Reception side Action plan References

Steganography

STEGANOS Covered GRAPHIE Writing Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows the existence of the message. This can be achieved by concealing the existence of information within seemingly harmless carriers or cover Carrier: text, image, video, audio, etc.

Introduction

The fast improvement of the Internet and the digital information revolution caused major changes in the overall culture. Flexible and simple-to-use software and decreasing prices of digital devices have made it feasible for consumers from all over the world to create, edit and exchange multimedia data. Broadband Internet connections almost an errorless transmission of data, helps people to distribute large multimedia files and make identical digital copies of them.
In modern communication system Data Hiding is most essential for Network Security issue. Sending sensitive messages and files over the Internet are transmitted in an unsecured form but everyone has got something to keep in secret. Audio data hiding method is one of the most effective ways to protect the privacy.

Flow Diagram

LSB Coding:

By substituting the least significant bit of each sampling point with a binary message, LSB coding allows for a large amount of data to be encoded. The following diagram illustrates how the message 'HEY' is encoded in a 16-bit audio sampled stream using the LSB method:

E-Cipher E & D Algorithm

Enter the public key in any combination of numbers, symbol and characters. The key contains set of characters and all characters are converted to ASCII value Add all the ASCII value to get single number and that single number is converted to bit pattern and by simple logical operation , a single number less than 128 can be obtained. It is added to the characters one by one in the message, before encoding. For decryption , bits of consecutive eight bytes are taken and subtracted with the key to get the original character.

Algorithm for Transmission side


Step1: Load the audio file (AF).
Step2: Input key for encryption Step3: Convert AF in the form of bytes and this byte values are represented into bit patterns. Step4: Using the key, the original message is encrypted using E-Cipher algorithm. Step5: Split the audio file bit patterns horizontally into two halves. Step6: Split the Encrypted message bit patterns vertically into two halves. Step7: Insert the LSB bit of vertically splitted encrypted text file (TF) into the LSB bit of the horizontally splitted audio file. Step8: Repeat Step 7 for the remaining bits of encrypted text file. Step9: If size (AF) size (TF) then embedding can be done as explained above else The next higher order bit prior to previous bit position can be used Until it is exhausted.

Algorithm for Reception side


Step 1: Load the Stego signal

Step 2: Extract the hidden data and audio files bit patterns from mixed data // Reverse process of step 7 of algorithm at sender side.
Step 3: Input key for decryption (as used in encryption) Step 4: Combine the two halves of audio files bit patterns. Step 5: Combine the two halves of encrypted messages bit pattern.

Step 6: Using Key, decrypt the original message.

Action plan
Sl. No 1 2 3 4 5 6 7 Details Introductory seminar Implementation of E-Cipher E & D Algorithm Code for Embeddor Progressive seminar Code for Extractor Report Final presentation Expected date of completion 07-03-2012 10-03-2012 14-03-2012 06-04-2012 11-03-2012 05-05-2012 07-05-2012

10

1. International Journal of Database Theory and Application Vol. 2, No. 2, June 2009 Data Hiding in Audio Signal: A Review Poulami Dutta1, Debnath Bhattacharyya1, and Tai-hoon Kim2

References

1Heritage Institute of Technology, Kolkata-700107, India 2Hannam University, Daejeon, Korea 2. Implementation of ISS - IHAS (Information Security System Information Hiding in Audio Signal) model with reference to proposed e-cipher Method Prof. R. Venkateswaran Department of CA, Nehru College of Management, Research Scholar-Ph.D, Karpagam University Coimbatore, TN, INDIA Dr. V. Sundaram, Director Department of CA, Karpagam College of Engineering Affiliated to Anna University of Technology, Coimbatore, TN, INDIA

11

12

13

14

You might also like