Professional Documents
Culture Documents
Abstract—Steganography is the practice of hiding infor- handle two issues; capability and transparency [3]. The LSB
mation and is well known for concealing the existence of the encoding method Least Significant Bits of the audio sample is
communication. This technique deals with the insertion of the replaced with the secret message bits as there is little effect on
secret message in an appropriate carrier like writing, audio. Out original audio. The index of the target bits can be randomized
of these carriers, digital writing (text file) message are mostly
preferred because of their wide usage on the Internet. The LSB
to increase robustness [7]. There are various other methods
modification technique allows the secret information to be which were used to hide a secret message within an audio fie
embedded in the least significant bit of the cover message but this like LSB Substitution, Eco Hiding, Phase Coding and Spread
technique can be broken very easily. MATLAB software has been Spectrum [8].
used for the execution of steganography. This paper is used Least
Significant Bit (LSB) modification technique. Two techniques are
The hairs concealed the message by hiding it under the
being proposed which work on the basis works on the current hairs and no one was able to read the secret message but the
sample bits. These techniques spread the secret message on intended receiver. Another method that was used in the
different bits of the sample. The methodology has also involved ancient times was Grille method [9]. Grille method used a
an AES encryption scheme as a backup in case the wooden template. A thin layer of wood was replaced to write
steganography algorithm has been broken. This will not the secret message which was waxed to hide its presence and
compromise the confidentiality of the secret information and the layer was placed back after the message had been hidden
implemented Point to Point link between two pc. [10]. During First and Second World Wars, significant
advancements were carried out in the field of steganography.
Keywords— SB, AES, Steganography, Encryption Introduction
An increased digital communication has presently raised copy-
rights issues [11].
I. INTRODUCTION
The basic spread spectrum method attempts to spread
Steganography is a concatenation of two Greek words
secret information across the cover message frequency
“stegos” meaning cover and “grafia” meaning writing [1]. It is
spectrum as much as possible. The system which implements
the art and science of covered writing or invisible communi-
the LSB modification and randomly spreads the message bits
cation. Steganography and cryptography are counter parts in
over the entire cover message. However, unlike LSB
digital security [2]. The main objective of steganography is to
modification, the spread spectrum method spreads the secret
hide sensitive information inside the cover object in such a
message over the cover message frequency spectrum using a
way that no one apart from the authorized user can even detect
technique which is independent of the actual signal. A model
that there is a secret message inside [3].
is proposed which enhances the confidentiality of the hidden
Steganography can be applied to different type of media message and also improves the capacity of the steganographic
including text, audio, and video. Audio and video files are system [13]. Generic Algorithm is also proposed in which opts
considered to be excellent carriers for the purpose of to hide the secret message content in the deepest portions of
steganography due to the presence of redundancy [4]. Audio carrier audio fie [14]. The error produced by the modification
steganography is considered more difficult than video is minimized by altering some other bits [15]. For this
steganography because the Human Auditory System (HAS) is purpose, the technique needs to satisfy transparency. Apart
more sensible than the Human Visual System (HVS)[5]. The from this, the capability is also a major concern because an
audio Steganography is the most challenging as well as efficient technique is one which can embed more secret
effective method as Human Auditory System (HAS) is more information within the same amount of cover message.
sensitive than the human visual system[6]. The objective of However, it’s still a trade-off between transparency and
this paper is to ensure more security towards cryptanalysis capability. A good balance should be maintained to keep the
attacks, by using the method of Trusted Third-Party Indexing transparency and capability within a technique. This paper
Keys, and a secondary key that will be provided by the contains 4 sections. Section II elaborates the methodology,
encoder. To perform audio steganography successfully, the section III describes the results and simulation, section IV
adopted technique should work against the Human Auditory describes conclusion and future work.
System (HAS). The audio steganography technique needs to
Mix Columns transformation is absent only in the final section (char) = Send Alpha Bravo Charlie to swat for
round and is always performed on the output of the ShiftRows operation against terrorist section (Hexadecimal) = 83 101
110 100 32 65 108 112 104 97 32 66 114 97 118 111 32
transformation. The transformation is performed indepen-
67 104 97 114 108 105 101 32 116 111 32 115 119 97 116
dently on every column and replaces each byte with another
32 102 111 114 32 111 112 101 114 97 116 105 111 110
byte. A fixed matrix derived from Galois field GF (28) is 32 97 103 97 105 110 115 116 32 116 101 114 114 111
multiplied with the State matrix. The matrix multiplication in 114 105 115 116
Mix Columns transformation is different from normal multi-
plication. The Fig-5 shows instead of adding all the partial Applying Key:
multiplication results bitwise XOR operation is performed. Keyh (In HEX) = ‘60’ ‘3d’ ‘eb’ ‘10’ ‘15’ ‘ca’ ‘71’ ‘be’...
Moreover, if the left-shifted bit in any partial multiplication is
equal to 1, the partial multiplication result is bitwise XORed ‘2b’ ‘73’ ‘ae’ ‘f0’ ‘85’ ‘7d’ ‘77’ ‘81’... ‘1f’ ‘35’ ‘2c’ ‘07’
with ”00011011”. In normal multiplication, the partial ‘3b’ ‘61’ ‘08’ ‘d7’... ‘2d’ ‘98’ ‘10’ ‘a3’ ‘09’ ‘14’ ‘df’ ‘f4’;
multiplication results formed by bit 1 multiplications are
added to form multiplication result. After Encryption:
section (Hexadecimal) = 228 218 84 57 212 120 229 173
255 145 218 213 153 175 89 37 115 229 174 48 231 249
87 126 13 80 119 33 212 33 58 174 110 246 97 29 114 34
20 7 90 77 71 148 122 47 26 163 108 45 211 17 68 190 99
218 27 89 206 125 33 65 154 212
The different values of the variable section before and after
Fig. 6. Multiplication of fixed matrix with State in Mix Columns encryption is performed are clear evidence of the complex
transformation relationship between the input and output of the encryption
block. It is impossible to break it without the availability of a
AddRoundKey is always the last transformation in every key. In Fig-7 shows the main step of the encoder block which
round. This transformation is not only performed from Round inserts the encrypted secret message into host message via LSB
1 to Round 14 but is also performed in an extra round called replacement algorithm.
When the first three LSBs are being replaced, a non-
differentiable change occurs in the contents of the host
message. This means if the first three LSBs are changed, one
can’t differentiate between a host message and a stego message
in Fig.8. Figure 9 and 10 are sufficient to support the facts
presented in our proposed methodology.
REFERENCES