Multi-Level audio steganography
-
Upload
arya-tm -
Category
Engineering
-
view
880 -
download
0
Transcript of Multi-Level audio steganography
![Page 1: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/1.jpg)
MULTI-LEVEL AUDIO
STEGANOGRAPHY
Seminar Guide Presented by
1
![Page 2: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/2.jpg)
Overview
Steganography.
Evolution.
Basic Steganography Model.
Encoding & Decoding.
Related Works.
Steganography Terms.
Types of Steganography.
Study of Multi-Level audio steganography.
Future Scope.
Conclusion.
References.2
![Page 3: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/3.jpg)
Steganography
Comes from Greek
- steganos = “covered”
- graphei = “writing”
Also known as “covered writing”.
Deals with hiding communicated data.
Hiding one piece of data within another.
Only recipient can identify the data using key.3
![Page 4: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/4.jpg)
Evolution
Watermarking
Cryptography
Steganography
4
![Page 5: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/5.jpg)
Related Work
Multi-Level Steganographic Algorithm for Audio
Steganography using LSB Modification .
Multi-Level Steganography which defines a new concept
for hidden communication in telecommunication
networks .
Audio Steganography using LSB Modification and Parity
Encoding Technique.
5
![Page 6: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/6.jpg)
Basic Steganography Model
6
![Page 7: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/7.jpg)
Encoding
• Prepare cover data
Step1
• Encode embedded data with cover data
Step 2• Steganographic
data
Step 3
7
![Page 8: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/8.jpg)
Decoding
• Steganographic Data
Step1
• Decode Plain info
Step 2• Embedded
data obtained
Step 3
8
![Page 9: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/9.jpg)
Steganography Terms
Carrier or Cover File - Original message is hidden inside it .
Stego-Medium - Medium in which the information is hidden.
Embedded or Payload - Information which is to be hidden or concealed.
Steganalysis - Process of detecting hidden information inside a file.
9
![Page 10: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/10.jpg)
Types of Steganography
1. Text/Document Steganography.
2. Image Steganography.
3. Audio Steganography.
4. Network / Protocol Steganography.
10
![Page 11: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/11.jpg)
Text/Document Steganography
The “carrier” is a text document.
Data is hidden behind every nth letter.
Three methods
1. Format based Method.
2. Random and statistical Method.
3. Linguistics Method.
11
![Page 12: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/12.jpg)
Image Steganography
Cover object is an Image.
Pixel intensities are used.
Three methods
1. Least Significant Bit Insertion.
2. Static Parsing Steganography(SPS).
3. Masking and Filtering.
12
![Page 13: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/13.jpg)
Network / Protocol Steganography
Hiding with the help of network protocols
Example cover objects are :
TCP, ICMP, IP etc
OSI layer network model can be used.
13
![Page 14: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/14.jpg)
Audio Steganography
Embedding secret messages into digital sound.
WAV, AU, and MP3 sound files can be used.
Human auditory system (HAS) are exploited.
Methods of audio steganography are :
1. LSB coding .
2. Parity coding .
3. Phase coding.
14
![Page 15: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/15.jpg)
LSB Coding
LSB bit is used for data embedding.
Using LSB increases the capacity
And decreases the transparency.
Advantages are :
- Low computational complexity
- Easier Implementation
- Variation in choosing LSB15
![Page 16: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/16.jpg)
LSB Encoding & Decoding
Low bit encoder Low bit decoder
16
![Page 17: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/17.jpg)
Parity Coding
Encode message in the parity bit region.
Signal break down into separate region.
Flipping to LSB is possible.
Advantage :
- Sender has more of a choice in encoding.
17
![Page 18: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/18.jpg)
Phase Coding
• HAS can’t recognize the phase change in audio signal.
• Encode phase of an audio segment with a data .
18
![Page 19: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/19.jpg)
Multi-Level Steganography(MLS)
Combination of two or more steganography methods.
Consist of three levels :
1. Upper Level.
2. Middle Level.
3. Lower Level.
Layering approach is used.
Three messages can be transmitted .
19
![Page 20: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/20.jpg)
Overview of MLS
Mainly there are three permutations for MLS.
20
![Page 21: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/21.jpg)
Permutation 1
21
![Page 22: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/22.jpg)
Permutation 2
22
![Page 23: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/23.jpg)
Permutation 3
23
![Page 24: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/24.jpg)
Multi-Level Steganography(MSL)
Stego audios is compared with PSNR graph.
With help of two equations -
1. Mean Squared Error (MSE):
2. Peak Signal-to-Noise Ratio (PSNR):
24
![Page 25: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/25.jpg)
Before & After Steganography
25
![Page 26: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/26.jpg)
Comparison with PSNR Graph
This hides three secret messages.
No visible changes in graphs.
Undetectability is achieved
Hence high security.
26
![Page 27: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/27.jpg)
Advantages
Potential capability to hide existence of data.
Hardness of detecting the hidden (i.e., embedded) data.
Strengthening of the security of the encrypted data.
Maintain clarity of audio signal.
27
![Page 28: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/28.jpg)
Disadvantages
If the all algorithms are known Leakage occurs.
Password leakage also may occur.
28
![Page 29: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/29.jpg)
Confidential communication and secret data storing.
Protection of data alteration.
Access control system for digital content distribution.
Media Database systems.
Use by intelligence services.
Applications
29
![Page 30: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/30.jpg)
Cryptography vs. Steganography
30
The difference is in their goals...
- Cryptography: although encypted and unreadable, the existence
of data is not hidden.
- Steganography: no knowledge of the existence of the data .
Cryptography
cryptos
hidden
graphia
writing
Steganography
steganos graphia
covered writing
![Page 31: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/31.jpg)
Watermarking vs. Steganography
Goal of steganography
– Intruder cannot detect a message
Goal of watermarking
– Intruder cannot remove or replace the message
31
![Page 32: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/32.jpg)
Future Scope
Further we can extend this approach by combining any
four techniques or more.
By combining more techniques we can increase capacity
The system becomes more secure towards detection.
32
![Page 33: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/33.jpg)
Conclusion
Based on three different techniques.
Technique for hiding text data into digital audio files .
Three secret messages can be hidden.
Uses three traditional method of steganography
Level based approach to reach the goal.
The output stego object is very difficult to decode .
Which makes this method successful in the world.
33
![Page 34: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/34.jpg)
Reference
[1] Jasleen Kour, Deepankar Verma “ Steganography Techniques –A Review Paper “
Volume-3, Issue-5 ,2014
[2] Ramandeep Kaur ,Jagriti Bhatia ,Hardeep Singh,Rajesh Kumar
“Multilevel Technique to Improve PSNR and MSE in Audio Steganography “
Volume 103 – No.5, October 2014
[3] Nitasha, Nidhi Sood” Enhancing the Security of Multilevel Audio
Steganography” May - 2014
[4] Prof. Samir Kumar Bandyopadhyay and Barnali Gupta Banik: “Multi-Level
Steganographic Algorithm for Audio Steganography using LSB Modification
and Parity Encoding Technique”, Volume 1, Issue 2, July – August 2012.
[5] “audio steg: methods”, Internet publication on
http://www.snotmonkey.com/work/school/405/methods.html
34
![Page 35: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/35.jpg)
35
![Page 36: Multi-Level audio steganography](https://reader036.fdocuments.net/reader036/viewer/2022062412/5a6500f77f8b9ab5218b4883/html5/thumbnails/36.jpg)
36
QUERIES