SlideShare a Scribd company logo
1 of 4
Download to read offline
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
154
AUDIO - VIDEO STEGANOGRAPHY USING FORENSIC
TECHNIQUEFOR DATA SECURITY
Athira Mohanan, Reshma Remanan, Dr. Sasidhar Babu Suvanam, Dr. Kalyankar N V
Department of Computer Science & Engineering,
Sree Narayana Gurukulam College of Engineering, Ernakulam, India
ABSTRACT
Steganography means, a method for hiding secret information for example password text or image inside a
cover file. In this paper, a combination of audio steganography and image steganography is used and also forensic
technique is used for authentication. The aim is to hide secret data in the audio and image of a video file. Video has so
many still frames of image and audio, we can select any frame for hiding our data. Two algorithms can be used for this
purpose.4LSB for image steganography and phase coding algorithm for audio steganography.
Keywords: 4LSB; Data Hiding; Steganography; Computer Forensics; Histogram; PSNR; Authentication.
I. INTRODUCTION
Steganography means covered writing. Goal is to hide the fact that communication is taking place. This is
achieved by using a cover file and embedding the secret message into this file. The result is stego file containing the
secret message. Stego algorithm downloads are now available on internet. Governments, military, businesses and private
citizens now use steganography for security and privacy purpose. Combination of image and video steganography is
used. Computer forensic technique is used to find the parameter like frame number, height and width of data, PSNR,
histogram of secrete message data before and after hiding to audio-video. If all these parameters are verified and found to
be correct then it will send to receiver otherwise it stop the message in computer forensics block.
II. RELATED WORKS
In previous, cryptography is used for encryption of data and provides data security. But actually term
cryptography provides privacy. Privacy is what you need when you use your credit card on the Internet — you don’t
want your number revealed to the public. For this, you use cryptography, and send a coded pile of gibberish that only the
web site can decipher. Though your code may be unbreakable, any hacker can look and see you’ve sent a message.
[2][3][4]
To overcome this drawback steganography is used for sending data like image and audio and make hidden.
Steganography is intended to provide secrecy. [1] Steganography approach that makes use of Least Significant Bit (LSB)
algorithm for embedding the data into the bit map image (.bmp). This approach is to replace the data of lower bit in a
cover audio data by a secret data. Our system is designed by using 32-bit ARM controllers for designing predictive
model for image and audio steganography system. The proposed method will help to secure the content with in the image
and encryption of audio file with in the image will help to make the document much securer because even though if the
unauthorized person succeeds in being able to hack the image, the person will not able to read the message as well as
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 12, December (2014), pp. 154-157
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
155
acquire the information in the audio file. Secret data like image and audio is encrypted into cover data by developing the
application involved with LSB algorithm on ARM architecture device.
III. SELECTING AUDIO-VIDEO FILE
• Select any available .avi audio-video file, behind which user want to hide data.
• Separate audio and video from selected audio-video file using available s/w ‘Easy Audio-Video Separator’.
• Save audio file as .wav file, this is the original separated audio file.
IV. VIDEO STEGANOGRAPHY
• Select original video file. Read file using ‘VideoReader function’.
• Collect all frame’s structure in one variable using ‘mov’ function.
• Read the structure. Play video using ‘movie’ function.
• Accept one of the frame no from user, behind which an authentication image is to be hidden.
• Read the frame and store it in variable ‘a’.
• Select one of authentication image read that image and store it in variable ‘b’.
• To extract msb of frame, bitand frame with 240 using function ‘bitand’.
• To extract msb of authentication image, bitand image with 240 using function ‘bitand.
• Reverse the place of msb of authentication image to lsb by dividing each element by 16.
• Reshape the image bits into one row.
• This reshaped row vector of authentication image data is embedded on the frame matrix, by adding each row
vector bits to last 4 bits of frame bits.
• This forms a stego frame, overwriting this stego frame with original video file create stego-video file.
• Using ‘VideoWriter’ function new create stego-video file, in which authentication image is hidden.
• Close the file.
V. CREATING STEGO AUDIO FILE
• Combine stego audio and stego video file using ‘Cute audio video merger’.
• This forms the stego audio-video file at transmitter side which has hidden text and image in it.
VI. AUTHENTICATION (AT RECEIVER SIDE)
• After transmission the stego audio-video file obtained at receiver side.
• Read the stego audio-video file; store the data in one variable ‘a1’.
• Select the frame no. The frame no should be same at transmitter and receiver side, then only the authentication
process start else it gets terminated.
• To recover the authentication image from the selected frame bitand frame data with 15 using ‘bitand’ function.
• Authentication image data is available at Lsb of frame recovered. It is in row vector.
• Reshape the row vector data into matrix using ‘reshape’ function.
• Select the authentication image at receiver side. Compare recovered authenticated image with the selected
image.
• If both the images matched, then only user can recover the text behind audio else process is terminated.
VII. AUDIO RECOVERY
• Audio file is read using function ‘wavread’, sample data is store in ‘y’.
• Open this stego audio file in read mode using function ‘fopen’.
• Read wave file’s first 40 bytes of header using ‘fread’ function and store it in a variable ‘header’.
• Then read all its data after 40th
byte using same function and store it in ‘dta1’ variable.
• Close file using ‘fclose’ function.
• Recover the size of identity key from lsb of .wav file. Recover identity key from further lsb bits of .wav file.
• Accept identity key from user and compare entered identity key with recover identity key. If both the keys
matched then only user can recover the hidden text else processes will be aborted.
• As identity key is matched recover the size of message from further lsb bits of .wav file. Recover the message.
• Secrete text is recovered.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
156
VIII. COMPUTER FORENSICS AND AUTHENTICATION
• Phase coding exploits the human audio system insensitivity to relative phase of different spectral components.
• The basic idea is to split the original audio file into blocks.
• Then embed the whole message data sequence into the phase spectrum of the first block.
• One drawback is low payload because only first block is used for secret message embedding.
• The secret message is not distributed over the entire file so it can be easily removed using cropping attack.
• The phase coding algorithm is explained in the following procedure:
• The original sound signal is segmented to extract the header.
• The rest portion is broken up into smaller segments.
• The size of this will be equal to the message to be encoded.
• A discrete Fourier transform is applied to each segment to create a matrix of phases.
• The secret message is inserted in the phase vector of the first signal segment as follows:
Oldphase+pi/2, for bit ‘0’.
New phase=old phase-pi/2, for bit ‘1’.
• A new phase matrix is created using new phase of first segment and original phase matrix.
• Using new phase matrix sound signal is reconstructed by applying inverse DFT.
• Then concatenating the sound segments with original header.
IX. ALGORITHM FOR HIDING DATA IN AUDIO
• Start and accept audio name along with full path from user to extract the audio using s/w ‘Easy video to audio
converter’. Extract the audio file in ‘.wav’ format and save this audio file in a specific folder.
• Accept this audio file in MATLAB using the function ‘uigetfile’.
• Read the file using ‘wavread’ function. Thisfunction returns the sampled audio data, no of bits per second and
sampling frequency.
• Open this file in ‘read’ mode using ‘fopen’ function,this function returns a file ID.
• First 40 bytes of a file make wav header,store the header in variable ‘header’.41st
byte to 43rd
byte represents
the length of wav data samples.Hence,copy the 16 bit
wav data samples starting from 44th
byte.
• Close the file only wav data samples are sufficient to hide the text.
X. TAKE THE TEXT MESSAGE
• Convert the message into binary and reshape the message in column vector using the function ‘reshape’.
• Convert the audio data into smaller segments whose lengths equal the size of the message to be encoded.
• Apply DFT to each segment to create a matrix of the phases.
• Old phase+ pi/2, for bit ‘0’.
• New phase = old phase- pi/2, for bit ‘1’.
• Create new phase using new phase of first segment and original phase matrix.
• Apply inverse DFT to reconstruct sound signal.
• Open a new audio file to ‘write’ mode.
• Copy the header of original wave file to a new file.
• Close the file.
• End.
XI. ALGORITHM FOR RECOVERING THE HIDDEN TEXT
• Start.
• Accept the stego-audio file in MATLAB using the function ‘uigetfile’.
• Read the file using ‘warhead’ function. This function returns the sampled audio data, no of bits per second and
sampling frequency.
• Open the file in ‘read’ mode using ‘fopen’ function, this function returns a file ID.
• Close the file, only wav data samples are sufficient or extracting the text.
• Extract the binary length, phase, extract binary text and convert it into decimal and characters respectively.
• End.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
157
XII. ALGORITHM FOR TRANSMITTER SIDE
• Select the cover video and split into frames.
• Enter the pass-key and the cover frame from cover video will be selected as per the pass-key.
• Enter the secret message andconvert it into binary form.
• Hide secret message inside cover frame using 4LSB algorithm to get stego frame.
• Hide authenticationkey using same algorithm inside fixed frame.
• Replace original frames chosen for hiding secret message and authentication info by those stego frames.
• Recombine frames to form stego video and transfer it using any communication.
XIII. RECEIVER SIDE
Get the stego video and split it into frames.
• Take authentication key from user and cross check it with that in the stego video at specified frame.
Ifauthentication fails go to step 7 otherwise continue.
• Enter the pass-key when asked and pass-key selects stego frame along with adjacent frames.
• Using forensic check presence of any hidden data. If forensic check fails go to step 7 otherwise continue.
• Extract data from stego frame by the use of reverse 4LSB algorithm and store it in a file.
XIV. CONCLUSION
To provide high end security to the data to prevent form the attackers, a dynamic method can be used. Two
things are important to provide security to the data confidentiality and encryption. Use sign cryption technique to provide
high security to the data, by encrypting the data with digital signature. Because of this the attacker cannot do any kind of
modification to the data. Then embed the data in an audio video file using audio-video Steganography to confuse the
attacker. In this way we can provide highly strong security.
ACKNOWLEDGMENT
This research was supported by Sree Narayana Gurukulam College of Engineering, computer science and
Engineering, Kerala.
REFERENCES
[1] Application of data hiding in audio-video using anti forensics technique for authentication and data security,
IEEE 2014.
[2] STEGANALYSIS OF AUDIO: ATTACKING THE STEGHIDE, IEEE International Conference on Machine
Learning and Cybernetics, Guangzhou, 18-21 August 2005.
[3] Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints, IEEE TRANSACTIONS
ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010.
[4] Steganography and Visual Cryptography in Computer Forensics, 2010 Fifth International Workshop on
Systematic Approaches to Digital Forensic Engineering.
[5] A view on latest audio steganography techniques, IEEE 2011.
[6] ISRN Signal Processing Volume 2013 (2013), Article ID 496701, 22 pages
http://www.hindawi.com/journals/isrn/2013/496701/.
[7] Anti-Forensics with Steganographic Data Embedding in Digital Images, IEEE JOURNAL ON SELECTED
AREAS IN COMMUNICATIONS, VOL. 29, NO. 7, AUGUST 2011.
[8] Steganography based on interpolation and LSB substitution with visual cryptography on digital images,
Monika Biraraet al., International Journal of Computer Application and Technology (s), May - 2014,
http://technopublications.com/documents/spec/YAMCATS62014.pdf.
[9] An Audio/Video Crypto – Adaptive Optical Steganography Technique, 2012 IEEE.
[10] Audio-video Crypto Steganography using LSB substitution and advanced chaotic algorithm, International
Journal of Engineering Inventions,e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 4, Issue 2, 2014.
[11] http://www.ijeijournal.com/papers/Vol.4-Iss.2/A04020107.pdf
[12] Sonali Patil, Kapil Tajane and Janhavi Sirdeshpande, “Analysing Secure Image Secret Sharing Schemes Based
on Steganography”, International Journal of Computer Engineering & Technology (IJCET), Volume 4,
Issue 2, 2013, pp. 172 - 178, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 

What's hot (20)

Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
P0460594100
P0460594100P0460594100
P0460594100
 
It3116411644
It3116411644It3116411644
It3116411644
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Encrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryEncrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometry
 
S4501105108
S4501105108S4501105108
S4501105108
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
C010511420
C010511420C010511420
C010511420
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Steganography
SteganographySteganography
Steganography
 

Viewers also liked (7)

Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Steganography
Steganography Steganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Similar to Audio video steganography using forensic techniquefor data security

Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
IAEME Publication
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
Manush Desai
 

Similar to Audio video steganography using forensic techniquefor data security (20)

A04020107
A04020107A04020107
A04020107
 
H41034449
H41034449H41034449
H41034449
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
A Study on Video Steganographic Techniques
A Study on Video Steganographic TechniquesA Study on Video Steganographic Techniques
A Study on Video Steganographic Techniques
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
AVC VIDEO SECURITY ON WIRELESS CHANNEL
AVC VIDEO SECURITY ON WIRELESS CHANNELAVC VIDEO SECURITY ON WIRELESS CHANNEL
AVC VIDEO SECURITY ON WIRELESS CHANNEL
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
HACKING
HACKINGHACKING
HACKING
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Advanced technique for video steganography with an encryption using LSB repl...
Advanced technique for video steganography with an  encryption using LSB repl...Advanced technique for video steganography with an  encryption using LSB repl...
Advanced technique for video steganography with an encryption using LSB repl...
 
IRJET- Efficient Data Embedding and Data Encryption in Video Stream
IRJET- Efficient Data Embedding and Data Encryption in Video StreamIRJET- Efficient Data Embedding and Data Encryption in Video Stream
IRJET- Efficient Data Embedding and Data Encryption in Video Stream
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
Steganoid - A tool for steganography
Steganoid - A tool for steganographySteganoid - A tool for steganography
Steganoid - A tool for steganography
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 

More from IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Audio video steganography using forensic techniquefor data security

  • 1. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 154 AUDIO - VIDEO STEGANOGRAPHY USING FORENSIC TECHNIQUEFOR DATA SECURITY Athira Mohanan, Reshma Remanan, Dr. Sasidhar Babu Suvanam, Dr. Kalyankar N V Department of Computer Science & Engineering, Sree Narayana Gurukulam College of Engineering, Ernakulam, India ABSTRACT Steganography means, a method for hiding secret information for example password text or image inside a cover file. In this paper, a combination of audio steganography and image steganography is used and also forensic technique is used for authentication. The aim is to hide secret data in the audio and image of a video file. Video has so many still frames of image and audio, we can select any frame for hiding our data. Two algorithms can be used for this purpose.4LSB for image steganography and phase coding algorithm for audio steganography. Keywords: 4LSB; Data Hiding; Steganography; Computer Forensics; Histogram; PSNR; Authentication. I. INTRODUCTION Steganography means covered writing. Goal is to hide the fact that communication is taking place. This is achieved by using a cover file and embedding the secret message into this file. The result is stego file containing the secret message. Stego algorithm downloads are now available on internet. Governments, military, businesses and private citizens now use steganography for security and privacy purpose. Combination of image and video steganography is used. Computer forensic technique is used to find the parameter like frame number, height and width of data, PSNR, histogram of secrete message data before and after hiding to audio-video. If all these parameters are verified and found to be correct then it will send to receiver otherwise it stop the message in computer forensics block. II. RELATED WORKS In previous, cryptography is used for encryption of data and provides data security. But actually term cryptography provides privacy. Privacy is what you need when you use your credit card on the Internet — you don’t want your number revealed to the public. For this, you use cryptography, and send a coded pile of gibberish that only the web site can decipher. Though your code may be unbreakable, any hacker can look and see you’ve sent a message. [2][3][4] To overcome this drawback steganography is used for sending data like image and audio and make hidden. Steganography is intended to provide secrecy. [1] Steganography approach that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (.bmp). This approach is to replace the data of lower bit in a cover audio data by a secret data. Our system is designed by using 32-bit ARM controllers for designing predictive model for image and audio steganography system. The proposed method will help to secure the content with in the image and encryption of audio file with in the image will help to make the document much securer because even though if the unauthorized person succeeds in being able to hack the image, the person will not able to read the message as well as INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 12, December (2014), pp. 154-157 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 155 acquire the information in the audio file. Secret data like image and audio is encrypted into cover data by developing the application involved with LSB algorithm on ARM architecture device. III. SELECTING AUDIO-VIDEO FILE • Select any available .avi audio-video file, behind which user want to hide data. • Separate audio and video from selected audio-video file using available s/w ‘Easy Audio-Video Separator’. • Save audio file as .wav file, this is the original separated audio file. IV. VIDEO STEGANOGRAPHY • Select original video file. Read file using ‘VideoReader function’. • Collect all frame’s structure in one variable using ‘mov’ function. • Read the structure. Play video using ‘movie’ function. • Accept one of the frame no from user, behind which an authentication image is to be hidden. • Read the frame and store it in variable ‘a’. • Select one of authentication image read that image and store it in variable ‘b’. • To extract msb of frame, bitand frame with 240 using function ‘bitand’. • To extract msb of authentication image, bitand image with 240 using function ‘bitand. • Reverse the place of msb of authentication image to lsb by dividing each element by 16. • Reshape the image bits into one row. • This reshaped row vector of authentication image data is embedded on the frame matrix, by adding each row vector bits to last 4 bits of frame bits. • This forms a stego frame, overwriting this stego frame with original video file create stego-video file. • Using ‘VideoWriter’ function new create stego-video file, in which authentication image is hidden. • Close the file. V. CREATING STEGO AUDIO FILE • Combine stego audio and stego video file using ‘Cute audio video merger’. • This forms the stego audio-video file at transmitter side which has hidden text and image in it. VI. AUTHENTICATION (AT RECEIVER SIDE) • After transmission the stego audio-video file obtained at receiver side. • Read the stego audio-video file; store the data in one variable ‘a1’. • Select the frame no. The frame no should be same at transmitter and receiver side, then only the authentication process start else it gets terminated. • To recover the authentication image from the selected frame bitand frame data with 15 using ‘bitand’ function. • Authentication image data is available at Lsb of frame recovered. It is in row vector. • Reshape the row vector data into matrix using ‘reshape’ function. • Select the authentication image at receiver side. Compare recovered authenticated image with the selected image. • If both the images matched, then only user can recover the text behind audio else process is terminated. VII. AUDIO RECOVERY • Audio file is read using function ‘wavread’, sample data is store in ‘y’. • Open this stego audio file in read mode using function ‘fopen’. • Read wave file’s first 40 bytes of header using ‘fread’ function and store it in a variable ‘header’. • Then read all its data after 40th byte using same function and store it in ‘dta1’ variable. • Close file using ‘fclose’ function. • Recover the size of identity key from lsb of .wav file. Recover identity key from further lsb bits of .wav file. • Accept identity key from user and compare entered identity key with recover identity key. If both the keys matched then only user can recover the hidden text else processes will be aborted. • As identity key is matched recover the size of message from further lsb bits of .wav file. Recover the message. • Secrete text is recovered.
  • 3. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 156 VIII. COMPUTER FORENSICS AND AUTHENTICATION • Phase coding exploits the human audio system insensitivity to relative phase of different spectral components. • The basic idea is to split the original audio file into blocks. • Then embed the whole message data sequence into the phase spectrum of the first block. • One drawback is low payload because only first block is used for secret message embedding. • The secret message is not distributed over the entire file so it can be easily removed using cropping attack. • The phase coding algorithm is explained in the following procedure: • The original sound signal is segmented to extract the header. • The rest portion is broken up into smaller segments. • The size of this will be equal to the message to be encoded. • A discrete Fourier transform is applied to each segment to create a matrix of phases. • The secret message is inserted in the phase vector of the first signal segment as follows: Oldphase+pi/2, for bit ‘0’. New phase=old phase-pi/2, for bit ‘1’. • A new phase matrix is created using new phase of first segment and original phase matrix. • Using new phase matrix sound signal is reconstructed by applying inverse DFT. • Then concatenating the sound segments with original header. IX. ALGORITHM FOR HIDING DATA IN AUDIO • Start and accept audio name along with full path from user to extract the audio using s/w ‘Easy video to audio converter’. Extract the audio file in ‘.wav’ format and save this audio file in a specific folder. • Accept this audio file in MATLAB using the function ‘uigetfile’. • Read the file using ‘wavread’ function. Thisfunction returns the sampled audio data, no of bits per second and sampling frequency. • Open this file in ‘read’ mode using ‘fopen’ function,this function returns a file ID. • First 40 bytes of a file make wav header,store the header in variable ‘header’.41st byte to 43rd byte represents the length of wav data samples.Hence,copy the 16 bit wav data samples starting from 44th byte. • Close the file only wav data samples are sufficient to hide the text. X. TAKE THE TEXT MESSAGE • Convert the message into binary and reshape the message in column vector using the function ‘reshape’. • Convert the audio data into smaller segments whose lengths equal the size of the message to be encoded. • Apply DFT to each segment to create a matrix of the phases. • Old phase+ pi/2, for bit ‘0’. • New phase = old phase- pi/2, for bit ‘1’. • Create new phase using new phase of first segment and original phase matrix. • Apply inverse DFT to reconstruct sound signal. • Open a new audio file to ‘write’ mode. • Copy the header of original wave file to a new file. • Close the file. • End. XI. ALGORITHM FOR RECOVERING THE HIDDEN TEXT • Start. • Accept the stego-audio file in MATLAB using the function ‘uigetfile’. • Read the file using ‘warhead’ function. This function returns the sampled audio data, no of bits per second and sampling frequency. • Open the file in ‘read’ mode using ‘fopen’ function, this function returns a file ID. • Close the file, only wav data samples are sufficient or extracting the text. • Extract the binary length, phase, extract binary text and convert it into decimal and characters respectively. • End.
  • 4. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 157 XII. ALGORITHM FOR TRANSMITTER SIDE • Select the cover video and split into frames. • Enter the pass-key and the cover frame from cover video will be selected as per the pass-key. • Enter the secret message andconvert it into binary form. • Hide secret message inside cover frame using 4LSB algorithm to get stego frame. • Hide authenticationkey using same algorithm inside fixed frame. • Replace original frames chosen for hiding secret message and authentication info by those stego frames. • Recombine frames to form stego video and transfer it using any communication. XIII. RECEIVER SIDE Get the stego video and split it into frames. • Take authentication key from user and cross check it with that in the stego video at specified frame. Ifauthentication fails go to step 7 otherwise continue. • Enter the pass-key when asked and pass-key selects stego frame along with adjacent frames. • Using forensic check presence of any hidden data. If forensic check fails go to step 7 otherwise continue. • Extract data from stego frame by the use of reverse 4LSB algorithm and store it in a file. XIV. CONCLUSION To provide high end security to the data to prevent form the attackers, a dynamic method can be used. Two things are important to provide security to the data confidentiality and encryption. Use sign cryption technique to provide high security to the data, by encrypting the data with digital signature. Because of this the attacker cannot do any kind of modification to the data. Then embed the data in an audio video file using audio-video Steganography to confuse the attacker. In this way we can provide highly strong security. ACKNOWLEDGMENT This research was supported by Sree Narayana Gurukulam College of Engineering, computer science and Engineering, Kerala. REFERENCES [1] Application of data hiding in audio-video using anti forensics technique for authentication and data security, IEEE 2014. [2] STEGANALYSIS OF AUDIO: ATTACKING THE STEGHIDE, IEEE International Conference on Machine Learning and Cybernetics, Guangzhou, 18-21 August 2005. [3] Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010. [4] Steganography and Visual Cryptography in Computer Forensics, 2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering. [5] A view on latest audio steganography techniques, IEEE 2011. [6] ISRN Signal Processing Volume 2013 (2013), Article ID 496701, 22 pages http://www.hindawi.com/journals/isrn/2013/496701/. [7] Anti-Forensics with Steganographic Data Embedding in Digital Images, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 7, AUGUST 2011. [8] Steganography based on interpolation and LSB substitution with visual cryptography on digital images, Monika Biraraet al., International Journal of Computer Application and Technology (s), May - 2014, http://technopublications.com/documents/spec/YAMCATS62014.pdf. [9] An Audio/Video Crypto – Adaptive Optical Steganography Technique, 2012 IEEE. [10] Audio-video Crypto Steganography using LSB substitution and advanced chaotic algorithm, International Journal of Engineering Inventions,e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 4, Issue 2, 2014. [11] http://www.ijeijournal.com/papers/Vol.4-Iss.2/A04020107.pdf [12] Sonali Patil, Kapil Tajane and Janhavi Sirdeshpande, “Analysing Secure Image Secret Sharing Schemes Based on Steganography”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 172 - 178, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.