Audio steganography is the embedding of data into an audio file. Current research in audio steganography has only shown that audio and image files can.

Slides:



Advertisements
Similar presentations
1 Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization CCSEIT 12 October 2012 Audio Steganography Using.
Advertisements

Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
F5 A Steganographic Algorithm
Overview of Digital Stenography
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
Audio Steganography Echo Data Hiding
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
STEGANOGRPAHY [APPLICATION – I]
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
CMPD273 Multimedia System Prepared by Nazrita Ibrahim © UNITEN2002 Multimedia System Characteristic Reference: F. Fluckiger: “Understanding networked multimedia,
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Tutorial 7 Working with Multimedia. New Perspectives on HTML, XHTML, and XML, Comprehensive, 3rd Edition 2 Objectives Explore various multimedia applications.
Tutorial 7 Working with Multimedia. New Perspectives on HTML, XHTML, and XML, Comprehensive, 3rd Edition 2 Objectives Explore various multimedia applications.
1 Wave Steganography Approach by Modified LSB 2009 Adviser: 吳坤熹 Student: 陳奕君 Presentation Data:2013/11/5 Second International Conference on Emerging Trends.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
 Parallel Deposit (bit scatter)  Deposits in the result register, at positions flagged by 1’s in r 3, the right justified bits from r 2 Yedidya Hilewitz.
Group 6 Arthur Garza Lizeth Gonzalez Javier Guzman.
STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Cryptographic Anonymity Project Alan Le
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Steganography
Advanced Computer Systems
Steganography in WebP image using LSB embedding
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Welcome
Steganography Example
STEGANOGRAPHY.
Computers Talk Binary.
Steganography.
Visit for more Learning Resources
A Data Hiding Scheme Based Upon Block Truncation Coding
Steganography Techniques and their use in Anonymity
Project Research Methodology
Data hiding based Hamming code
Information Hiding and Its Applications
Chapter 2. Problem Solving and Software Engineering
Partial reversible data hiding scheme using (7, 4) hamming code
Digital Watermarking for Image Authentication with Localization
Partial reversible data hiding scheme using (7, 4) hamming code
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

Audio steganography is the embedding of data into an audio file. Current research in audio steganography has only shown that audio and image files can be used as the embedded media. For this project, a Java program was written that allows for any type of file to be the embedded media within an audio file. The research that was needed for this program to be written was conducted using the Java Media Composition Library written at Georgia Institute of Technology and the jGrasp programming environment. The project was conducted with the goal to create an algorithm for audio steganography that would allow for multiple types of files to be embedded in an audio file and to construct a method of embedding data into the slopes of the sound wave in areas of high frequency. The process by which the research was conducted consisted of constructing a test class, constructing an abstract class, modifying the abstract class, and finally testing for the detection of changes within the sound file. It was discovered that by embedding the data linearly along the slopes of the sound wave, one could not detect the changes that were made to the sound file. It was then concluded that by using this Java program instead of the commonly used Least Significant Bit methodology the data could be embedded more efficiently by analyzing the cover file and using the areas determined to have high wave frequency as the cover area. ABSTRACT ENGINEERING GOAL Materials: 1.Java 8 Runtime Environment 2.jGrasp Integrated Development Environment by Auburn University 3.Minimum 4GB RAM computer 4.Java Media Composition Library by Georgia Institute of Technology MATERIALS AND PROCEDURES Procedure: 1.Setup jGrasp to use a minimum of 2GB of RAM on startup 2.Write sample program to understand the functions and limitations of the Java Media Composition Library 3.Write abstract class, which will be used for all extensions within the scope of this research 4.Write an extension class that works with text(.txt) files 5.Edit the abstract and extension classes to use an algorithm to locate areas of the cover file to embed to the data 6.Write extract method that uses the same algorithm as the abstract class to find the areas in which data is embedded and extract them. 7.Write an extension class that works for images 8.Write an extension class that works for sounds RESULTS The human subjects were split into two groups; musicians and non-musicians. This separation is important because the musicians are trained in active listening, so it should be easier for them to detect a change within the sound file than a non-musician. The two groups were then split into two groups; test and control. The non-musician control group was successful in not hearing changes in the sound file, but there were some musicians in the control group that thought that they heard changes in the sound file. There was a noticeable difference in how the non-musicians listened to the sound files and how they responded to the questions. The non-musicians purposely sat closely to the speakers, while the musicians scattered themselves around the testing area. The non-musicians also responded positively to the question, “Would you like to hear the original sound file again?”, which was asked immediately after playing every sound sample. The non-musicians, both control and test, decided to listen to the original sound sample multiple times, while the musicians decided to listen to the original sound file only once. There may be a correlation between how the test subjects conducted the tests and the results that were collected. Musicians, as well as non-musicians, were able to detect the changes within the sound file. Definite conclusions were not able to be drawn due to a small sample size and possible placebo effect. CONCLUSIONS AND FUTURE RESEARCH The program was able to successfully embed and extract sound files, text files and image files within a sound file with an algorithm that is not a derivative of the Least Significant Bit methodology. The program was successful in breaking away from the Least Significant Bit methodology by pre-analysis of the cover file and determining areas in which data can be hidden. This research can be expanded upon by “doubly encoding” by implementing the algorithm for file encryption as well as the steganography. No formal conclusion can be drawn from the human testing due to the small sample size and the possible placebo effect. REFERENCES Altaei, Mohammed S., Hmood, Dalal N., and Khudhiar, Khamael A. “A New Steganographic Method for Embedded Image In Audio File”, International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 pp Amin, Muhalim M., Ibrahim, Subariah., Katmin, Mohd R., and Salleh, Mazleena. “Information Hiding Using Steganography”. Department of Computer System & Communication Faculty of Computer Science and Information system Universiti Teknologi Malaysia Anderson, Ross J. and Petitcolas, Fabien A., “On the Limits of Steganography” IEEE Journal On Selected Areas In Communications, Vol. 16, No. 4, May 1998 pp Anupama, H.S., Jayaram P., and Ranganatha H R. “Information Hiding Using Audio Steganography – A Survey”. The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011 Dhar, Puja and Nehru, Gunjan. “A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012 ISSN (Online): pp Galshetwar, Gajanan, Jeyakumar, Amutha, and Mane, Ashiwini. “Data Hiding Technique: Audio Steganography Using LSB Technique”. International Journal of Engineering Research and Applications (IJERA) ISSN: Vol. 2, Issue 3, May-Jun 2012, pp Khalil, M. I. “Image Steganography: Hiding Short Audio Messages Within Digital Images” Reactor Physics Department, Nuclear Research Center, Atomic Energy Authority, Cairo Egypt. JCS&T Vol. 11 No. 2 October 2011 Rana, Manisha and Tanwar, Rohit. “Genetic Algorithm in Audio Steganography” International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 1 – Jul 2014 The goal of this project was to write a Java program that can embed and extract data retrieved from any type of media file into a sound file without using Least Significant Bit methodology, which is the process of embedding data in an uniform fashion, by replacing data in the cover file every n-th bit of data. Creating a Multi-Functional Algorithm for Audio Steganography Sound file before steganography Sound to be embedded CODE SAMPLE Sound extracted from cover file DATA SAMPLES