audieo steg
TRANSCRIPT
-
8/14/2019 audieo steg
1/9
AUDIO STEGANOGRAPHY
Sanket Sheth
Dept. of Computer Engineering,K.J. Somaiya College Of Engineering,
Institute (Mumbai).
Abstract:
The main purpose of steganography is to hide the occurrence of communication. While
most methods in use today are invisible to the observer's senses, mathematical analysis
may reveal statistical discrepancies in the steganographic medium. These discrepancies
expose the fact that hidden communication is happening. This paper presents a new
method to preserve the statistical properties of the cover medium in the field of music.
After applying a correcting transform to a music file, statistical steganalysis is no longer
able to detect the presence of steganography. To evaluate the effectiveness of my
approach, I present tests for the JPEG image format initially and follow it with MP3
format to explain how the new method works.
Keywords:
Steganography
Steganalysis
-
8/14/2019 audieo steg
2/9
FORMULA USED FOR STEGANOGRAPHY:
The following formula provides a very generic description of the pieces of the
steganographic process:
cover_medium + hidden_data + stego_key = stego_medium
In this context, the cover_medium is the file in which we will hide the hidden_data,
which may also be encrypted using the stego_key. The resultant file is the
stego_medium (which will, of course. be the same type of file as the cover_medium).
The cover_medium (and, thus, the stego_medium) are typically image or audio files.
AUDIO STEGANOGRAPHY ENCODING AND DECODING:
To encode, following syntax is used:
encode E secret_text.txt P passphrase sanket.wav sanket1.mp3
This compresses sanket.wav along with secret_text.txt into sanket1.mp3,
encrypting the hidden text using the passphrase passphrase.
Decoding the file is accomplished using:
Decode X P passphrase sanket1.mp3
This uncompresses sanket1.mp3 into sanket1.mp3.pcm and decrypts and saves
the hidden text as sanket1.mp3.txt
-
8/14/2019 audieo steg
3/9
IMAGE STEGANOGRAPHY:
Images typically use either 8-bit or 24-bit color. When using 8-bit color, there is adefinition of up to 256 colors forming a palette for this image, each color denoted by an
8-bit value. A 24-bit color scheme, as the term suggests, uses 24 bits per pixel and
provides a much better set of colors. In this case, each pix is represented by three bytes,
each byte representing the intensity of the three primary colors red, green, and blue
(RGB), respectively. The Hypertext Markup Language (HTML) format for indicating colors
in a Web page often uses a 24-bit format employing six hexadecimal digits, each pair
representing the amount of red, blue, and green, respectively. The color orange, for
example, would be displayed with red set to 100% (decimal 255, hex FF), green set to
50% (decimal 127, hex 7F), and no blue (0), so we would use "#FF7F00" in the HTML
code.
GIF and 8-bit BMP files employ what is known as lossless compression, a scheme that
allows the software to exactly reconstruct the original image. JPEG, on the other hand,
uses lossycompression, which means that the expanded image is very nearly the same
as the original but not an exact duplicate. While both methods allow computers to save
storage space, lossless compression is much better suited to applications where the
integrity of the original information must be maintained, such as steganography. While
JPEG can be used for stego applications, it is more common to embed data in GIF or
BMP files.
The simplest approach to hiding data within an image file is called least significant bit(LSB) insertion. In this method, we can take the binary representation of the
hidden_data and overwrite the LSB of each byte within the cover_image. If we are using
24-bit color, the amount of change will be minimal and indiscernible to the human eye.
As an example, suppose that we have three adjacent pixels (nine bytes) with the
following RGB encoding:
10010101 00001101 11001001
10010110 00001111 11001010
10011111 00010000 11001011
Now suppose we want to "hide" the following 9 bits of data (the hidden data is usually
compressed prior to being hidden): 101101101. If we overlay these 9 bits over the LSB
of the 9 bytes above, we get the following (where bits in bold have been changed):
10010101 00001100 11001001
-
8/14/2019 audieo steg
4/9
10010111 00001110 11001011
10011111 00010000 11001011
Note that we have successfully hidden 9 bits but at a cost of only changing 4, or roughly
50%, of the LSBs.
Without going into any detail, it is worth mentioning steganalysis, the art of detecting
and breaking steganography. One form of this analysis is to examine the color palette of
a graphical image. In most images, there will be a unique binary encoding of each
individual color. If the image contains hidden data, however, many colors in the palette
will have duplicate binary encodings since, for all practical purposes, we can't count the
LSB. If the analysis of the color palette of a given file yields many duplicates, we might
safely conclude that the file has hidden information.
-
8/14/2019 audieo steg
5/9
Audio Steganography :
SOFTWARE REVIEW:Now let us review one of the many available steganography tools. The software going to
be reviewed is named STEGANOGRAPHY.
The above is the first window you will see when you open the software. It is quite self-
explanatory. One has to select a carrier by clicking on the picture button alongside the
Step 1.For audio steganography, one can select any audio file (.wav, .mp3 etc.)
Then one has to add message or a file by selecting the appropriate option after clicking
on Add button.
-
8/14/2019 audieo steg
6/9
On selecting File one has to select a file from the file browser.
If one selects message option then a window opens as shown below:
One can enter the message in the space provided.
Then enter password twice to complete the input details. Then clicking on hide opens
the file browser again asking the file name for saving the file(with same extension as the
carrier file).Now the file is ready with secret data to be sent without any trace of the
same.
-
8/14/2019 audieo steg
7/9
Now retrieving the file is also very simple. Simply specify the carrier file having the data.
Then enter the password required to unhide the files. On clicking UNHIDE button one
will see the files which were added to be retrieved which can be saved by double
clicking on file name.
Double clicking on message opens a window with the message as shown below
Thus one can save the message as a txt file.
-
8/14/2019 audieo steg
8/9
FUTURE PROSPECT:
The fact that steganography cannot be detected at all times makes steganalysis an area
of ongoing research. The limitations are magnified due to the fact that steganography is
not an exact technique. Todays steganographic programs can hide any type of binary
data into various types of cover media. One can never predict whether there is a secret
message to begin with; its much like looking for needles in haystack! The use of
steganography by terrorists and criminals is likely to increase in the future, posing a
problem for law enforcement agencies. Steganalysis needs to be further developed to
help counter high tech terrorism and cases of industrial espionage.
Apart from the law enforcement/intelligence and anti-terrorist significance, audio
steganographic techniques also have peaceful applications, including: in-band
captioning; integration of multiple media for convenient and reliable storage,
management, and transmission; embedding executables for function control; error
correction; and version upgrading. Computer specialists, signal-processing researchers,
and information security professionals should expect to devote much more attention to
the challenging area of information hiding and detection.
CONCLUSION :
Steganography techniques involving audio file formats appear to be increasing in
popularity. This may be attributed to the fact that current steganalysis tools available to
the general public fall short when applied to audio files. Another factor that may be
contributing to the increasing popularity is the widespread popularity of the MP3 file
format and its ubiquitous presence on storage media and the Internet. Only adding to
the appeal of audio steganography is the relatively large size of MP3 files. These large
files make detection of stegotext more difficult.
In conclusion, as more emphasis is placed on the areas of copyright protection, privacy
protection, and surveillance, I believe that steganography will continue to grow in
importance as a protection mechanism. Audio steganography in particular addresses
key issues brought about by the MP3 format, P2P software, and the need for a secure
broadcasting scheme that can maintain the secrecy of the transmitted information,
even when passing through insecure channels.
-
8/14/2019 audieo steg
9/9
Steganography techniques involving audio file formats appear to be increasing in
popularity. This may be attributed to the fact that current steganalysis tools available to
the general public fall short when applied to audio files. Another factor that may be
contributing to the increasing popularity is the widespread popularity of the MP3 file
format and its ubiquitous presence on storage media and the Internet. Only adding tothe appeal of audio steganography is the relatively large size of MP3 files. These large
files make detection of stegotext more difficult which make them suitable candidates as
carrier files.
[Note: This paper can be downloaded from http://sanketsheth.info/publications.html]
REFERENCES :
1. http://www.snotmonkey.com/work/school/405/methods.html#evalFirefoxHTML\Shell\Open\Command
2. SOFTWARE RESOURCE: http://www.securekit.com