SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 3 (Jul. - Aug. 2013), PP 30-35
www.iosrjournals.org
www.iosrjournals.org 30 | Page
Enhancement of Data Hiding Capacity in Audio Steganography
Sheelu1
1
(M. Tech (CSE) - Manav Rachna College Of Engineering, Faridabad, India)
Abstract: Nowadays, a lot of applications are Internet-based and demand of internet applications
requires data to be transmitted in a secure manner. Data transmission in public communication
system is not secure because of interception and improper manipulation by eavesdropper. So a
technique for secure transmission of messages called Steganography, which send the
messages in such a way that existence of the message is concealed. Audio Steganography is the
scheme of hiding the existence of secret information by concealing it into an audio file. In this paper
we will discuss how audio file can be used as carrier to hide the secret information. In this paper we
also proposed a system that will enhance the data hiding capacity in Audio Steganography using LSB
method. we will use last 4 LSB's instead of a single LSB , this will enhance the data hiding capacity of carrier
file.
Keywords: Steganography, Audio Steganography , Cover file, Stego file, key
I. Introduction
Steganography[1] is the technique of hiding secret information in a communication channel in such a
manner that the very existence of information is concealed. It is the science of “invisible” communication and
prevents an unintended recipient from suspecting that the data exists. Steganography is derived from the Greek
word steganos which means “Covered” and graphy means “Writing”, i.e. covered writing. Many different
carrier file formats can be used like Text, Images, and videos, but digital Images and Audios are the most
popular because of their frequency on the Internet.
The Steganography hides different types of data within a cover file. The resulting stego file also
contains hidden information, although it is virtually identical to the cover file. Steganography exploit human
perception; human senses are not trained to look for files that have information hidden inside of them, although
there are programs available that can do what is called Steganalysis (Detecting use of Steganography). The main
goal of Steganography is to communicate securely in a completely undetectable manner and to avoid drawing
suspicion to the transmission of a hidden data . It is not only prevents others from knowing the hidden
information, but it also prevents others from thinking that the information even exists. If a Steganography
method causes someone to suspect there is a secret information in a carrier medium, then the method has failed
II. Different File Formats Used as Carrier in Steganography:
The four main categories of file formats[2] that can be used as carrier in Steganography are:
I. Text
II. Images
III. Audio/ Video
IV. Protocol
Figure 1:Different carriers in Steganography
I. Text Steganography: Hiding information in text is the most important method of Steganography. The method
was to hide a secret message in every nth letter of every word of a text message. After booming of Internet and
different type of digital file formats it has decreased in importance. Text stenography using digital files is not
used very often because the text files have a very small amount of redundant data
.
Enhancement of Data Hiding Capacity in Audio Steganography
www.iosrjournals.org 31 | Page
II. Image Steganography: Images are used as the popular cover objects for Steganography. A message is
embedded in a digital image through an embedding algorithm, using the secret key. The resulting stego image is
send to the receiver. On the other side, it is processed by the extraction algorithm using the same key. During the
transmission of stego image unauthenticated persons can only notice the transmission of an image but can‟t
guess the existence of the hidden message.
III. Audio Steganography: Audio stenography is masking, which exploits the properties of the human ear to
hide information unnoticeably. An audible, sound can be inaudible in the presence of another louder audible
sound .This property allows to select the channel in which to hide information.
IV. Protocol Steganography: The term protocol Steganography is to embedding information within network
protocols such as TCP/IP. We hide information in the header of a TCP/IP packet in some fields that can be
either optional or are never used.
III. Audio Steganography
Audio Steganography[3] is the scheme of hiding the existence of secret information by concealing it
into another medium such as audio file. Thus embedding secret messages into digital sound is known as audio
Steganography. Audio Steganography methods can embed messages in WAV, AU, and even MP3 sound files.
The properties of the human auditory system (HAS) are exploited in the process of audio Steganography.
Auditory perception is based on the critical band analysis in the inner ear where a frequency-to-location
transformation takes place along the basilar membrane. The power spectra of the received sounds are not
represented on a linear frequency scale but on limited frequency bands called critical bands
3.1 Digital Audio
Digital audio[3] is discrete rather than continuous signal as found in analog audio. A discrete signal is
created by sampling a continuous analog signal at a specified rate. For example, the standard sampling rate for
CD digital audio is about 44 kHz.
Figure 2: Continuous analog sound wave is sampled to produce digital signal
Digital audio is stored in a computer as a sequence of 0's and 1's. With the right tools, it is possible to change the
individual bits that make up a digital audio file. Such precise control allows changes to be made to the binary
sequence that are not discernible to the human ear. In the digital domain, PCM (Pulse Code Modulation) is the
most straightforward mechanism to store audio. The analog audio is sampled in accordance with the Nyquest
theorem and the individual samples are stored sequentially in binary format. The wave file is the most common
format for storing PCM data and the WAVE file format is a subset of Microsoft's RIFF specification for the
storage of multimedia files. That‟s why .wav files have been used here for below mentioned experiments
3.2. The basic model of Audio Steganography
The basic model of Audio Steganography[4] consists of Carrier (Audio file), Message, Password,
Stego file. Carrier is also known as a cover-file, which conceals the secret information. Basically, the model for
Steganography is shown in Fig 3. Message is the data that the sender wishes to remain it confidential. Message
can be plain text, image, audio or any type of file. Password is known as a stego-key, which ensures that only
the recipient who knows the corresponding decoding key will be able to extract the message from a cover-file.
The cover-file with the secret information is known as a stego-file. Fig.3 shows the block diagram of a secure
steganographic system. Input messages can be images, texts, video, etc. The components of steganographic
system are:
Enhancement of Data Hiding Capacity in Audio Steganography
www.iosrjournals.org 32 | Page
Figure 3. A generic Steganography System
secret message: The secret message or information to hide.
audio file: An audio file which concealed the secret message.
stego file: A modified version of audio file that contains the secret message.
key: Additional secret data that is needed for the embedding and extracting processes and must be known to
both, the sender and the recipient
steganographic method: A steganographic function that takes audio file, secret message and key as parameters
and produces stego as output.
inverse of steganographic method: A steganographic function that has stego and key as parameters and
produces secret message as output. This is the inverse of method used in embeding process in the sense that the
result of the extracting process is identical to the input of the embedding process.
The embedding process embeds the secret message in the audio file. The result of the embedding function is
slightly modified version of audio file: the stego file. After the recipient has received stego file, he starts the
extracting process with the stego file and the key as parameters. If the key that is supplied by the recipient is
the same as the key used by the sender to embed the secret message and if the stego data the recipient uses as
input is the same data the sender has produces, then the extracting function will produce the original secret
message.
IV. Least Significant Bit (LSB) Encoding:
Least significant bit (LSB)[4] coding is the simplest way to embed information in a digital audio file,
which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the
hidden data. By substituting the least significant bit of each sampling point with a binary message, LSB coding
allows for a large amount of data to be encoded. In LSB coding, the ideal data transmission rate is 1 kbps per 1
kHz.
To extract a secret message from an LSB encoded sound file, the receiver needs access to the sequence
of sample indices used in the embedding process. Normally, the length of the secret message to be encoded is
smaller than the total number of samples in a sound file. One must decide then on how to choose the subset of
samples that will contain the secret message and communicate that decision to the receiver. One trivial
technique is to start at the beginning of the sound file and perform LSB coding until the message has been
completely embedded, leaving the remaining samples unchanged. This creates a security problem, however in
that the first part of the sound file will have different statistical properties than the second part of the sound file
that was not modified. One solution to this problem is to pad the secret message with random bits so that the
length of the message is equal to the total number of samples.
Figure 4 : Binary representation of decimal 149
The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit binary number
represents a value of 128 decimal. The LSB represents a value of 1. For example, to hide the letter "a" (ASCII
code 97, which is 01100001) inside eight bytes of a cover, you can set the LSB of each byte like this:
10010010
01010011
10011011
11010010
10001010
00000010
01110010
00101011
Enhancement of Data Hiding Capacity in Audio Steganography
www.iosrjournals.org 33 | Page
Fig 5 illustrates how the message 'HEY' is encoded using the LSB method. Here the secret information is
„HEY‟ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information
„HEY‟ and the audio file are converted into bit stream. The least significant column of the audio file is replaced
by the bit stream of sectet information „HEY‟. The resulting file after embedding secret information „HEY‟ is
called Stego-file.
Figure 5 . LSB coding example
There are two main disadvantages associated with the use of methods like LSB coding. The human ear is very
sensitive and can often detect even the slightest bit of noise introduced into a sound file, Second disadvantage
however, is that this is not robust. If a sound file embedded with a secret message using either LSB coding was
resample, the embedded information would be lost. Robustness can be improved somewhat by using a
redundancy technique while encoding the secret message. However, redundancy techniques reduce data
transmission rate significantly.
V. Proposed system
In the proposed system, I will use last 4 LSB's instead of single LSB. By this we can store more bits of
secret information in the single byte of carrier file. This will enhance the capacity of carrier file to conceal the
secret information as shown in the figure.
Figure 5 . Proposed system example
Enhancement of Data Hiding Capacity in Audio Steganography
www.iosrjournals.org 34 | Page
The Proposed system: The Proposed system is consist of following two phases
a) Sender side(Encoding process)
b) Receiver side(Decoding process)
5.1 Encoding Process on Sender Side (Secret Data Hiding)
Encoding process takes place at the sender side to hide the secret information. Here the carrier audio
file and secret information will be converted into bits and then bits of secret information will hideen in the last 4
LSB's of carrier audio file. The steps of encoding process are as follows:
1. Convert the audio file to binary format.
2. Hide the secret information into an audio or carrier file.
3. Remove noise from the stego file by using the filter.
4. Generate the key using the stego and the filtered file.
5. Key and the filtered file are send to the receiver.
Figure 7 . Process on sender side in the proposed system
5.2 Decoding Process on Receiver Side (Secret Data Extraction)
Decoding process will takes place at the receiver side to extract the secret information. Here the key
and filtered file are used to get the secret information. The steps of decoding process are as follows:
1. The receiver will decrypt the key .
2. The receiver will use the key to extract the stego file from the filtered file.
3. Receiver can extract the secret information from the extracted stego file.
Figure 8 . Process on receiver side in the proposed system
Enhancement of Data Hiding Capacity in Audio Steganography
www.iosrjournals.org 35 | Page
VI. Conclusion
Steganography not only prevents others from knowing the hidden information, but it also prevents
others from thinking that the information even exists. If a Steganography method causes someone to suspect
there is a secret information in a carrier medium, then the method has failed. Different file formats can be used
as carrier in Steganography. Embedding secret information in an audio file is usually a more difficult process
than embedding messages in other media. Audio Steganography methods can embed messages in WAV, AU,
and even MP3 sound files. As we will hide 4 bits of secret information in each byte of the carrier. This will
enhance the capacity of carrier and carrier will conceal a large amount of secret information. By this we can
send a large amount of secret information in a audio file
References
[1] Jammi Ashok, Y. Raju, S. Munishankaraiah, K. Srinivas " Steganography : An Overview" in International Journal of Engineering
Science and Technology Vol. 2(10), 2010, 5985-5992
[2] Pratap Chandra Mandal Modern "Steganographic technique: A survey" in International Journal of Computer Science & Engineering
Technology (IJCSET)
[3] Prof. Samir Kumar Bandyopadhyay and Barnali Gupta “LSB Modification and Phase Encoding Technique of Audio Steganography
Revisited” in International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 4, June 2012
[4] Jayaram P, Ranganatha H R, Anupama H S, " Information Hiding Using Audio Steganography – A Survey" in The International
Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011

Weitere ähnliche Inhalte

Was ist angesagt?

Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityIAEME Publication
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
 

Was ist angesagt? (20)

Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Steganography
SteganographySteganography
Steganography
 
30808010 report(1)
30808010 report(1)30808010 report(1)
30808010 report(1)
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
F1803023843
F1803023843F1803023843
F1803023843
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
L1803037377
L1803037377L1803037377
L1803037377
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Steganography
Steganography Steganography
Steganography
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 

Andere mochten auch

Pattern Mapping Approach for Detecting Xss Attacks In Multi-Tier Web Applicat...
Pattern Mapping Approach for Detecting Xss Attacks In Multi-Tier Web Applicat...Pattern Mapping Approach for Detecting Xss Attacks In Multi-Tier Web Applicat...
Pattern Mapping Approach for Detecting Xss Attacks In Multi-Tier Web Applicat...IOSR Journals
 
Feb 2015 ndta flyer v2
Feb 2015 ndta flyer v2Feb 2015 ndta flyer v2
Feb 2015 ndta flyer v2watersb
 
The Impact Of Positive Thinking On Your Internet Business
The Impact Of Positive Thinking On Your Internet BusinessThe Impact Of Positive Thinking On Your Internet Business
The Impact Of Positive Thinking On Your Internet Businessbelieve52
 
Micro-Propagation of Aloe indica L. Through Shoot Tip Culture
Micro-Propagation of Aloe indica L. Through Shoot Tip CultureMicro-Propagation of Aloe indica L. Through Shoot Tip Culture
Micro-Propagation of Aloe indica L. Through Shoot Tip CultureIOSR Journals
 
Re:Thinking Audience Engagement with an online exhibit
Re:Thinking Audience Engagement with an online exhibitRe:Thinking Audience Engagement with an online exhibit
Re:Thinking Audience Engagement with an online exhibitJustine G. Chapleau
 
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...IOSR Journals
 
Three Phase Digitally Controlled Power Factor Improvement System
Three Phase Digitally Controlled Power Factor Improvement SystemThree Phase Digitally Controlled Power Factor Improvement System
Three Phase Digitally Controlled Power Factor Improvement SystemIOSR Journals
 
From Changes to Dynamics: Dynamics Analysis of Linked Open Data Sources
From Changes to Dynamics: Dynamics Analysis of Linked Open Data Sources From Changes to Dynamics: Dynamics Analysis of Linked Open Data Sources
From Changes to Dynamics: Dynamics Analysis of Linked Open Data Sources Thomas Gottron
 
Investigation on the Efficacy of Salmonella Bivalent Vaccine
Investigation on the Efficacy of Salmonella Bivalent VaccineInvestigation on the Efficacy of Salmonella Bivalent Vaccine
Investigation on the Efficacy of Salmonella Bivalent VaccineIOSR Journals
 
Performance analysis of Fuzzy logic based speed control of DC motor
Performance analysis of Fuzzy logic based speed control of DC motorPerformance analysis of Fuzzy logic based speed control of DC motor
Performance analysis of Fuzzy logic based speed control of DC motorIOSR Journals
 
A Secure Software Implementation of Nonlinear Advanced Encryption Standard
A Secure Software Implementation of Nonlinear Advanced Encryption StandardA Secure Software Implementation of Nonlinear Advanced Encryption Standard
A Secure Software Implementation of Nonlinear Advanced Encryption StandardIOSR Journals
 
Role of Machine Translation and Word Sense Disambiguation in Natural Language...
Role of Machine Translation and Word Sense Disambiguation in Natural Language...Role of Machine Translation and Word Sense Disambiguation in Natural Language...
Role of Machine Translation and Word Sense Disambiguation in Natural Language...IOSR Journals
 
EPiServer 7 CMS - NA Partners
EPiServer 7 CMS - NA PartnersEPiServer 7 CMS - NA Partners
EPiServer 7 CMS - NA PartnersBeth McEnery
 
130729【let53全国研究大会】003.key
130729【let53全国研究大会】003.key130729【let53全国研究大会】003.key
130729【let53全国研究大会】003.keySei Sumi
 

Andere mochten auch (20)

H0154448
H0154448H0154448
H0154448
 
Pattern Mapping Approach for Detecting Xss Attacks In Multi-Tier Web Applicat...
Pattern Mapping Approach for Detecting Xss Attacks In Multi-Tier Web Applicat...Pattern Mapping Approach for Detecting Xss Attacks In Multi-Tier Web Applicat...
Pattern Mapping Approach for Detecting Xss Attacks In Multi-Tier Web Applicat...
 
Feb 2015 ndta flyer v2
Feb 2015 ndta flyer v2Feb 2015 ndta flyer v2
Feb 2015 ndta flyer v2
 
F0443041
F0443041F0443041
F0443041
 
The Impact Of Positive Thinking On Your Internet Business
The Impact Of Positive Thinking On Your Internet BusinessThe Impact Of Positive Thinking On Your Internet Business
The Impact Of Positive Thinking On Your Internet Business
 
Micro-Propagation of Aloe indica L. Through Shoot Tip Culture
Micro-Propagation of Aloe indica L. Through Shoot Tip CultureMicro-Propagation of Aloe indica L. Through Shoot Tip Culture
Micro-Propagation of Aloe indica L. Through Shoot Tip Culture
 
Re:Thinking Audience Engagement with an online exhibit
Re:Thinking Audience Engagement with an online exhibitRe:Thinking Audience Engagement with an online exhibit
Re:Thinking Audience Engagement with an online exhibit
 
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
 
Three Phase Digitally Controlled Power Factor Improvement System
Three Phase Digitally Controlled Power Factor Improvement SystemThree Phase Digitally Controlled Power Factor Improvement System
Three Phase Digitally Controlled Power Factor Improvement System
 
From Changes to Dynamics: Dynamics Analysis of Linked Open Data Sources
From Changes to Dynamics: Dynamics Analysis of Linked Open Data Sources From Changes to Dynamics: Dynamics Analysis of Linked Open Data Sources
From Changes to Dynamics: Dynamics Analysis of Linked Open Data Sources
 
Investigation on the Efficacy of Salmonella Bivalent Vaccine
Investigation on the Efficacy of Salmonella Bivalent VaccineInvestigation on the Efficacy of Salmonella Bivalent Vaccine
Investigation on the Efficacy of Salmonella Bivalent Vaccine
 
G01114650
G01114650G01114650
G01114650
 
E0421931
E0421931E0421931
E0421931
 
Performance analysis of Fuzzy logic based speed control of DC motor
Performance analysis of Fuzzy logic based speed control of DC motorPerformance analysis of Fuzzy logic based speed control of DC motor
Performance analysis of Fuzzy logic based speed control of DC motor
 
A Secure Software Implementation of Nonlinear Advanced Encryption Standard
A Secure Software Implementation of Nonlinear Advanced Encryption StandardA Secure Software Implementation of Nonlinear Advanced Encryption Standard
A Secure Software Implementation of Nonlinear Advanced Encryption Standard
 
B0150711
B0150711B0150711
B0150711
 
B0510916
B0510916B0510916
B0510916
 
Role of Machine Translation and Word Sense Disambiguation in Natural Language...
Role of Machine Translation and Word Sense Disambiguation in Natural Language...Role of Machine Translation and Word Sense Disambiguation in Natural Language...
Role of Machine Translation and Word Sense Disambiguation in Natural Language...
 
EPiServer 7 CMS - NA Partners
EPiServer 7 CMS - NA PartnersEPiServer 7 CMS - NA Partners
EPiServer 7 CMS - NA Partners
 
130729【let53全国研究大会】003.key
130729【let53全国研究大会】003.key130729【let53全国研究大会】003.key
130729【let53全国研究大会】003.key
 

Ähnlich wie Enhancement of Data Hiding Capacity in Audio Steganography

Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 

Ähnlich wie Enhancement of Data Hiding Capacity in Audio Steganography (20)

Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
F017253244
F017253244F017253244
F017253244
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
A04020107
A04020107A04020107
A04020107
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
Steganography Steganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
HACKING
HACKINGHACKING
HACKING
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
H017255560
H017255560H017255560
H017255560
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 

Kürzlich hochgeladen (20)

POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 

Enhancement of Data Hiding Capacity in Audio Steganography

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 3 (Jul. - Aug. 2013), PP 30-35 www.iosrjournals.org www.iosrjournals.org 30 | Page Enhancement of Data Hiding Capacity in Audio Steganography Sheelu1 1 (M. Tech (CSE) - Manav Rachna College Of Engineering, Faridabad, India) Abstract: Nowadays, a lot of applications are Internet-based and demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So a technique for secure transmission of messages called Steganography, which send the messages in such a way that existence of the message is concealed. Audio Steganography is the scheme of hiding the existence of secret information by concealing it into an audio file. In this paper we will discuss how audio file can be used as carrier to hide the secret information. In this paper we also proposed a system that will enhance the data hiding capacity in Audio Steganography using LSB method. we will use last 4 LSB's instead of a single LSB , this will enhance the data hiding capacity of carrier file. Keywords: Steganography, Audio Steganography , Cover file, Stego file, key I. Introduction Steganography[1] is the technique of hiding secret information in a communication channel in such a manner that the very existence of information is concealed. It is the science of “invisible” communication and prevents an unintended recipient from suspecting that the data exists. Steganography is derived from the Greek word steganos which means “Covered” and graphy means “Writing”, i.e. covered writing. Many different carrier file formats can be used like Text, Images, and videos, but digital Images and Audios are the most popular because of their frequency on the Internet. The Steganography hides different types of data within a cover file. The resulting stego file also contains hidden information, although it is virtually identical to the cover file. Steganography exploit human perception; human senses are not trained to look for files that have information hidden inside of them, although there are programs available that can do what is called Steganalysis (Detecting use of Steganography). The main goal of Steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data . It is not only prevents others from knowing the hidden information, but it also prevents others from thinking that the information even exists. If a Steganography method causes someone to suspect there is a secret information in a carrier medium, then the method has failed II. Different File Formats Used as Carrier in Steganography: The four main categories of file formats[2] that can be used as carrier in Steganography are: I. Text II. Images III. Audio/ Video IV. Protocol Figure 1:Different carriers in Steganography I. Text Steganography: Hiding information in text is the most important method of Steganography. The method was to hide a secret message in every nth letter of every word of a text message. After booming of Internet and different type of digital file formats it has decreased in importance. Text stenography using digital files is not used very often because the text files have a very small amount of redundant data .
  • 2. Enhancement of Data Hiding Capacity in Audio Steganography www.iosrjournals.org 31 | Page II. Image Steganography: Images are used as the popular cover objects for Steganography. A message is embedded in a digital image through an embedding algorithm, using the secret key. The resulting stego image is send to the receiver. On the other side, it is processed by the extraction algorithm using the same key. During the transmission of stego image unauthenticated persons can only notice the transmission of an image but can‟t guess the existence of the hidden message. III. Audio Steganography: Audio stenography is masking, which exploits the properties of the human ear to hide information unnoticeably. An audible, sound can be inaudible in the presence of another louder audible sound .This property allows to select the channel in which to hide information. IV. Protocol Steganography: The term protocol Steganography is to embedding information within network protocols such as TCP/IP. We hide information in the header of a TCP/IP packet in some fields that can be either optional or are never used. III. Audio Steganography Audio Steganography[3] is the scheme of hiding the existence of secret information by concealing it into another medium such as audio file. Thus embedding secret messages into digital sound is known as audio Steganography. Audio Steganography methods can embed messages in WAV, AU, and even MP3 sound files. The properties of the human auditory system (HAS) are exploited in the process of audio Steganography. Auditory perception is based on the critical band analysis in the inner ear where a frequency-to-location transformation takes place along the basilar membrane. The power spectra of the received sounds are not represented on a linear frequency scale but on limited frequency bands called critical bands 3.1 Digital Audio Digital audio[3] is discrete rather than continuous signal as found in analog audio. A discrete signal is created by sampling a continuous analog signal at a specified rate. For example, the standard sampling rate for CD digital audio is about 44 kHz. Figure 2: Continuous analog sound wave is sampled to produce digital signal Digital audio is stored in a computer as a sequence of 0's and 1's. With the right tools, it is possible to change the individual bits that make up a digital audio file. Such precise control allows changes to be made to the binary sequence that are not discernible to the human ear. In the digital domain, PCM (Pulse Code Modulation) is the most straightforward mechanism to store audio. The analog audio is sampled in accordance with the Nyquest theorem and the individual samples are stored sequentially in binary format. The wave file is the most common format for storing PCM data and the WAVE file format is a subset of Microsoft's RIFF specification for the storage of multimedia files. That‟s why .wav files have been used here for below mentioned experiments 3.2. The basic model of Audio Steganography The basic model of Audio Steganography[4] consists of Carrier (Audio file), Message, Password, Stego file. Carrier is also known as a cover-file, which conceals the secret information. Basically, the model for Steganography is shown in Fig 3. Message is the data that the sender wishes to remain it confidential. Message can be plain text, image, audio or any type of file. Password is known as a stego-key, which ensures that only the recipient who knows the corresponding decoding key will be able to extract the message from a cover-file. The cover-file with the secret information is known as a stego-file. Fig.3 shows the block diagram of a secure steganographic system. Input messages can be images, texts, video, etc. The components of steganographic system are:
  • 3. Enhancement of Data Hiding Capacity in Audio Steganography www.iosrjournals.org 32 | Page Figure 3. A generic Steganography System secret message: The secret message or information to hide. audio file: An audio file which concealed the secret message. stego file: A modified version of audio file that contains the secret message. key: Additional secret data that is needed for the embedding and extracting processes and must be known to both, the sender and the recipient steganographic method: A steganographic function that takes audio file, secret message and key as parameters and produces stego as output. inverse of steganographic method: A steganographic function that has stego and key as parameters and produces secret message as output. This is the inverse of method used in embeding process in the sense that the result of the extracting process is identical to the input of the embedding process. The embedding process embeds the secret message in the audio file. The result of the embedding function is slightly modified version of audio file: the stego file. After the recipient has received stego file, he starts the extracting process with the stego file and the key as parameters. If the key that is supplied by the recipient is the same as the key used by the sender to embed the secret message and if the stego data the recipient uses as input is the same data the sender has produces, then the extracting function will produce the original secret message. IV. Least Significant Bit (LSB) Encoding: Least significant bit (LSB)[4] coding is the simplest way to embed information in a digital audio file, which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the hidden data. By substituting the least significant bit of each sampling point with a binary message, LSB coding allows for a large amount of data to be encoded. In LSB coding, the ideal data transmission rate is 1 kbps per 1 kHz. To extract a secret message from an LSB encoded sound file, the receiver needs access to the sequence of sample indices used in the embedding process. Normally, the length of the secret message to be encoded is smaller than the total number of samples in a sound file. One must decide then on how to choose the subset of samples that will contain the secret message and communicate that decision to the receiver. One trivial technique is to start at the beginning of the sound file and perform LSB coding until the message has been completely embedded, leaving the remaining samples unchanged. This creates a security problem, however in that the first part of the sound file will have different statistical properties than the second part of the sound file that was not modified. One solution to this problem is to pad the secret message with random bits so that the length of the message is equal to the total number of samples. Figure 4 : Binary representation of decimal 149 The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit binary number represents a value of 128 decimal. The LSB represents a value of 1. For example, to hide the letter "a" (ASCII code 97, which is 01100001) inside eight bytes of a cover, you can set the LSB of each byte like this: 10010010 01010011 10011011 11010010 10001010 00000010 01110010 00101011
  • 4. Enhancement of Data Hiding Capacity in Audio Steganography www.iosrjournals.org 33 | Page Fig 5 illustrates how the message 'HEY' is encoded using the LSB method. Here the secret information is „HEY‟ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information „HEY‟ and the audio file are converted into bit stream. The least significant column of the audio file is replaced by the bit stream of sectet information „HEY‟. The resulting file after embedding secret information „HEY‟ is called Stego-file. Figure 5 . LSB coding example There are two main disadvantages associated with the use of methods like LSB coding. The human ear is very sensitive and can often detect even the slightest bit of noise introduced into a sound file, Second disadvantage however, is that this is not robust. If a sound file embedded with a secret message using either LSB coding was resample, the embedded information would be lost. Robustness can be improved somewhat by using a redundancy technique while encoding the secret message. However, redundancy techniques reduce data transmission rate significantly. V. Proposed system In the proposed system, I will use last 4 LSB's instead of single LSB. By this we can store more bits of secret information in the single byte of carrier file. This will enhance the capacity of carrier file to conceal the secret information as shown in the figure. Figure 5 . Proposed system example
  • 5. Enhancement of Data Hiding Capacity in Audio Steganography www.iosrjournals.org 34 | Page The Proposed system: The Proposed system is consist of following two phases a) Sender side(Encoding process) b) Receiver side(Decoding process) 5.1 Encoding Process on Sender Side (Secret Data Hiding) Encoding process takes place at the sender side to hide the secret information. Here the carrier audio file and secret information will be converted into bits and then bits of secret information will hideen in the last 4 LSB's of carrier audio file. The steps of encoding process are as follows: 1. Convert the audio file to binary format. 2. Hide the secret information into an audio or carrier file. 3. Remove noise from the stego file by using the filter. 4. Generate the key using the stego and the filtered file. 5. Key and the filtered file are send to the receiver. Figure 7 . Process on sender side in the proposed system 5.2 Decoding Process on Receiver Side (Secret Data Extraction) Decoding process will takes place at the receiver side to extract the secret information. Here the key and filtered file are used to get the secret information. The steps of decoding process are as follows: 1. The receiver will decrypt the key . 2. The receiver will use the key to extract the stego file from the filtered file. 3. Receiver can extract the secret information from the extracted stego file. Figure 8 . Process on receiver side in the proposed system
  • 6. Enhancement of Data Hiding Capacity in Audio Steganography www.iosrjournals.org 35 | Page VI. Conclusion Steganography not only prevents others from knowing the hidden information, but it also prevents others from thinking that the information even exists. If a Steganography method causes someone to suspect there is a secret information in a carrier medium, then the method has failed. Different file formats can be used as carrier in Steganography. Embedding secret information in an audio file is usually a more difficult process than embedding messages in other media. Audio Steganography methods can embed messages in WAV, AU, and even MP3 sound files. As we will hide 4 bits of secret information in each byte of the carrier. This will enhance the capacity of carrier and carrier will conceal a large amount of secret information. By this we can send a large amount of secret information in a audio file References [1] Jammi Ashok, Y. Raju, S. Munishankaraiah, K. Srinivas " Steganography : An Overview" in International Journal of Engineering Science and Technology Vol. 2(10), 2010, 5985-5992 [2] Pratap Chandra Mandal Modern "Steganographic technique: A survey" in International Journal of Computer Science & Engineering Technology (IJCSET) [3] Prof. Samir Kumar Bandyopadhyay and Barnali Gupta “LSB Modification and Phase Encoding Technique of Audio Steganography Revisited” in International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 4, June 2012 [4] Jayaram P, Ranganatha H R, Anupama H S, " Information Hiding Using Audio Steganography – A Survey" in The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011