Professional Documents
Culture Documents
'
MSB 2n"MSB Secret Message Bit
0 0 3< LSB
0 1 2nd LSB
1 0 1st LSB
1 1 1st LSB
B. Sample Selection
Another way to confse the intruder is to add some
more radomness in secret message embedding by using
selective sample numbers to hide secret message. This
means all the saples will not contain the secret message
bit but a few. This radomness will be controlled by the
frst three MSBs. Table II shows a possible Sample
Selection mapping. Diferent Sample Selection mappings
ca b desiged but skipping more number of samples
will decrease the capacity.
If i is the current saple, the last column of Table II
indicates the next sample that will contain secet message
bit. Te number of samples skipped between two
consecutive secret message bits is equal to one more tha
the decimal value of frst three bits. If the frst three
MSBs of frst sample (i = 1) in a audio siga are equal
to 010, the last column indicaes te next secret message
bit to be embedded in sample number i + 3 = 4. This
meas the frst bit of secret messae will b embdded in
frst saple ad the second bit of secret message will be
embdded in fourth sample skipping the second ad third
samples. In the same way, if the frst three MSBs of the
fourth saple ae equal to 011, the tird secret message
bit will then be embedded in the eighth saple.
TABLE II
SAMLLSLLLC1iCNMAiNG
'
2nd MSB Y"MSB Sample Containing
MSB Next Secret Message
Bit
0 0 0 i + 1
0 0 1 i+2
0 1 0 i+3
0 1 1 i+4
1 0 0 i+5
1 0 1 i+6
1 1 0 i+7
1 1 1 i+8
IV . EXERIENTATION
To fnd the threshold afer which the diference
btween host message ad stego message becomes
detecable, adio stegaogaphy is performed on fxed
LSBs. Without using the radomness proposed in Bit
Selection ad Saple Selection, fxed bits of every
sample of host message are replaced with secret message
bits. The original host message is shown by Fig. 5. Te
resulting stego message afer embedding secret message
in tird LSB, fourth LSB ad eigth LSB ae shown in
Fig. 6, Fig.7 ad Fig. 8 respectively. As there is no
diference in Fig. 5 ad Fig.6, chagng of frst three
LSBs doesn't mae ay detectable chage. Compaison of
Fig. 5 with Fig. 7 shows a slight chage between host
message ad stego message. Fig. 8 shows a stego message
in which the eighth LSB of host message is bing
modifed in every sample to contain the secret messae.
Te shape of the stego message is completely chaged in
Fig. 8. Terefore, third LSB is considered threshold for
the stegaogaphy technique. When the threshold is
crossed ad higer weigtage LSBs ae being modifed,
the diference becomes detectable.
Stegaogaphy is performed on the basis of proposed
enhaced LSB modifcaion technique. Initially, the secret
message on the encoder side is encrypted using AES-256
ming te relaionsip btwe plantext ad cipherext much
complex. A secret messae "STARTISSIONBETA" is
encrpted to "-F=18-3am A". For embedding this
encrypted secret message, chaging bits with higer
weightage tha the third LSB will result in a detectable
chage in the stego message. The proposed Bit Selection
technique embeds secret message on frst, second ad
third LSBs in selective samples acording to proposed
Sample Selection technique. In this way, the proposed
technique satisfes the treshold condition ad is more
difcult for a intruder to break. The audibility of host
message and stego message as well as the spectrum of
both these messages ae not diferentiable. Fig. V shows
audio stegaogaphy performed on the basis of proposed
technique. Fig. 5 ad Fig. V ae not diferentiable.
145
G
1
1 a11 J111 Ja11 !111 !a11 111
Sample Number
Fig. 5 Original host message
Tird LSB Modified Stego Message
J1
Ja1
JI1
JJ1
J11
1
1 a11 J111 Ja11 !111 !a11 111
Sample Number
Fig. Third LSB modifed stego message
Fourth LSB Modifed Stego Message
1
1 1
Sample Number
Fig. 7Fouth LSB modifed stego message
Eighth LSB Modifed Stego Message
11
2a1
211
J11
1
a1
11
a1
!1
!a
11
111
Sample Number
Fig. 8 Eighth LSB modified stego mssage
Proposed Methodology Stego Message
J1
Ja1
JI1
J\1
J11
1
1a1 \1 Ja !1 !a1 1 111
Sample Number
Fig. 9 Proposed methodolog stego message
`. CONCLUSION
Tis reseach papr h exended te conventioa LSB
modifcaion technique fo audio stegnogaphy to mae it
more seure aganst stegaaysis. L average, te technique
embes one secret message bit pr for saples of host
message. Te mimum embdding rae is one secre
message bit pr saple of host message while minimum
embeding rae is one secret message bit pr eigt saples
of host messae. B order to mae sure the secre messae is
compleely embedde, te saples of host messae should
b eigt times te number of bits of secret message.
Saples of Host Messae = 8 * Bits of Secret Message
(1)
Te stego message formed on the basis of proposed
methodology canot be diferentiated fom host message.
Te secret message on the receiver side ca be exracted
fom the stego messae a well.
146
ACKNOWLEDGMENT
We would like to sa ALHAMVLILLAH for giving
us the strength to work on this subject ad coming up
with this reseach paer. We ae gaefl to our fmilies
for suppoing us ad paying for us. We would like to
show our gitude to Eng. Hassa Bhati for his
direction. assistace ad guidace. Special thaks to
Centre of Excellence for ASIC Desig ad DSP, VET
Taxila for poviding all the required sofwaelhadwae.
RERENCES
[1] Kaliappan Gopalan, "A Unifed Audio and Image Steganogaphy
by Spectrum Modifcation", International Conference on Industrial
Technolog, 2009, Page(s): 1 - 5.
[ 2] Andreas Westfeld, "Steganography and Multilateml Security",
pp. 223-232 in Gunter Muller, Kai Rannenberg (Eds.):
Multilateral Security in Communications Bd. 3: Technology,
Infrastructure, Economy. Addison-Wesley-Longman, Munchen
1999.
[3] Gopalan, K., "Audio steganogaphy using bit modifcation", 2003
IEEE Intertional Conference on Acoustics, Speech, and Signal
Processing, Page(s): II - 421-4 vol.2.
[4] Zamani, M., Manaf A, Ahmd, R.B., Jaryani, F., Taherdoost, H.,
Zeki, AM., "A secure audio steganogaphy approach",
Intertional Conference for Interet Technology a Secured
Tmnsactions 2009, Page(s): 1 -.
[5] Yali Lil Ken Chiang, Cherita Corbett, Rennie Archibald,
Biswanath Mukherjee, Dipak Ghosal, "Novel Audio Steganalysis
Based on High-Order Statistics of a Distortion Measure with
Hausdorf Distance", ISC '08 Proceedings of the 11 th international
conference on Infonation Security.
147