1 Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization CCSEIT 12 October 2012 Audio Steganography Using.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

IEEE/FIPA WG Mobile Agents Ulrich Pinsdorf Fraunhofer-Institute IGD, Germany Dept. Security Technology
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H.264/AVC Sourav Bhattacharya ; T. Chattopadhyay ; Arpan.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
An Error-Resilient GOP Structure for Robust Video Transmission Tao Fang, Lap-Pui Chau Electrical and Electronic Engineering, Nanyan Techonological University.
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
A Review on: Spread Spectrum Watermarking Techniques
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
1 Wave Steganography Approach by Modified LSB 2009 Adviser: 吳坤熹 Student: 陳奕君 Presentation Data:2013/11/5 Second International Conference on Emerging Trends.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Introduction to Steganalysis Schemes Multimedia Security.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Yongfeng Huang;Rui Miao Department of Electronic Engineering,
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Audio steganography is the embedding of data into an audio file. Current research in audio steganography has only shown that audio and image files can.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Introduction to Audio Watermarking Schemes N. Lazic and P
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
EXTRACTING SPREAD-SPECTRUM HIDDEN DATA FROM DIGITAL MEDIA
Model-based Steganography
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Steganography in digital images
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Data hiding based Hamming code
A High Embedding Capacity Approach to Adaptive Steganography
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
EarthTour Presentations
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Image Based Steganography Using LSB Insertion Technique
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

1 Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization CCSEIT 12 October 2012 Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization CCSEIT 12 October 2012 Sangita Roy, Jyotirmayee Parida, Avinash Kumar Singh, Ashok Singh Sairam Student: Presentation Date:2013/12/10 Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology

2 Outline Introduction LSB Encoding Proposed LSB Technique with Increased Capacity Experimental Details Results and Analysis Conclusion Reference

3 Introduction We design a high bit rate LSB audio watermarking method that reduces embedding distortion of the host audio with increased capacity of secret text. The scientific study began in 1983 when Simmons stated the problem in terms of communication in a prison.

4 LSB Encoding (1/2)

5 LSB Encoding(2/2) Proposed LSB Technique with Increased Capacity(1/2) LSB coding is explained in the following procedure: Read one sample from the wave stream. Get the next bit from the current message byte. Place it in the current 4th bit of the sample. Flip the rest 3 bits accordingly. Copy the rest of the wave without changes. Our proposed LSB technique is explained in the following procedure: Read one sample from the wave stream. Get the next two bits from the current message byte. Place it in the current 4th and 3rd bit of the sample. Flip the rest 2 bits accordingly. Copy the rest of the wave without changes.

6 Proposed LSB Technique with Increased Capacity(2/2)

7 Experimental Details

8 Results and Analysis(1/2)

9 Results and Analysis(2/2)

10 Conclusion

11 Reference Anderson, R, Bowman, Petticolas,F. On the limits of Steganography. IEEE Journal selected areas in Communication,16, 4, Bassia, P., Pitas I., Nikolaidis N. Robust audio watermarking in the time domain, IEEE Transactions on Multimedia 3, 2, Brian, J., Yuliya K. and Andrew, L.Fröhlich audio Steganography Dec 13. Cedric, T., Adi, R.,Mcloughlin, I.: Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency domain LSB insertion, Proc. IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia,

12 Reference Fridrich, J., Goljan, M., Du, R.: 2002 Lossless Data Embedding – New Paradigm in Digital Watermarking, Applied Signal Processing, 2002, 2, I. Cox, M. Miller and J. Bloom, 2003.Digital Watermarking Morgan Kaufmann Publishers, San Francisco, CA, 2003 Krista, B., Linguistic steganography: survey, analysis and robustness concerns for hiding information in text, Center for Education and Research in Information Assurance and Security, Tech report 2004.

13 Reference Mobasseri, B. Direct sequence watermarking of digital video using m-frames Proc. International Conference on Image Processing, Chicago, IL, Roy, S., Manasmita M., A novel approach to format based test stegonography, International conference on communication computing and security, ICCCS 2011,Procidings by ACM with ISBN rourkela,Odisha,India. Steganography FAQ Aelphaeis Mangarae, march