Anda di halaman 1dari 4

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882

Volume 3, Issue 6, September 2014

NEW TECHNIQUE FOR HIDING DATA IN AUDIO AND IMAGE WITH


MULTILEVEL PROTECTION
Deepika Thakur, Research Scholar
Department of Electronics and Communication Engg., GGCT, Jabalpur
Prof. Papiya Dutta, Professor & Guide
Department of Electronics & Communication Engg., GGCT, Jabalpur

ABSTRACT
The present scenario has observed a huge growth in
communications. Few Applications say online banking,
mobile banking, military communication, smartcards
and many more have taken security in account as most
desirable stuff. Cryptography and steganography are
two methods are available secure data. But, to have the
highly secure requirement for highly confidential data
of todays applications, highly secure and significant
hardware algorithms are necessity. So to avoid such
type of problem proposed work has given new theory to
combination of both the methods that is cryptography
and steganography. With these techniques the problems
of both the methods can be solved. The con of
cryptography is that it is very easy to detect and the
problem with steganography is that it is simpler to decrypt. So by using addition of both the problem of each
can be used as advantage of each other.

mobile phone systems or networks and some schemes


proposed like digital elections.
Few approaches used in steganography are decided area
tools or some normal system such as least significant
bit (LSB) substitution and manipulation in noise, and
convert into transform domain that involve changes in
algorithms and also image transformation like as
discrete
cosine
transformation
or
wavelet
transformation. Moreover there are techniques available
that share the properties of both of the image and few
domain tools like patchwork, spread spectrum methods,
pattern block encoding and masking.
There are several suitable carriers below to be the
cover-object:
Network Protocols such as IP, TCP and UDP
Audio file in form of digital audio formats such
as avi, wav, midi, mpeg, etc

1. INTRODUCTION

Disk and File that can hides and also append


files by using the slack space

Steganography become more critical as lots of people


join the cyberspace revolution. Steganography is the
way of concealing information in such a manner that
prevents the acknowledgment of hidden messages.
Steganography include an array of cipher
communication techniques that cover the message from
being find or discovered.

Text like null characters which appears just


alike Morse code including java and html
Images file such as gif, bmp and jpg it can be
both color and gray-scale.

The aim of steganography is to avoid having suspicion


to the even existence of a hidden message. This method
of information hiding technique has recently become
critical in a number of application areas. Digital video,
audio, and pictures are generally furnished with
distinguishing but it is imperceptible marks, which can
contain a hidden copyright notice or a serial number or
also help to prevent unwanted copying directly.

In normal, the information hiding process fetched


redundant bits from cover-object. The process requires
of two steps:
Identify the redundant bits in a cover-object.
Redundant bits are those bits in image that can
be change without corrupting the quality or loss
of information of integrity of the cover-object.

Communications in military system increasing also use


of traffic security technique which, can merely
concealing the subject of a message using data
encryption and seek to conceal its sender, its receiver
end or its very existence. Same techniques are used in

The embedding process then chooses the subset


of the redundant bits to be substituting it with
data from a secret message. The stego-object is
generated by changing the selected redundant
bits with message bits.

www.ijsret.org

1032

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3, Issue 6, September 2014

2. METHODOLOGY
DATA

Figure 1 shows the proposed module for data secure


transmission, here the original data will get isolated in
three different part at first level of encryption then at
the second level out of three data the data-1 will get
encrypted using 64-bit key, KASUMI encryption at the
third level the data-2 will get encrypted through our
proposed 16 bit key Image encryption later on at fourth
level of security the data-3 will get stenograph with
proposed 16 bit audio steganography. Hence one can
conclude that proposed architecture produces very high
level of security because of it is using multiple levels of
encryption.

KEY

DAT
A1

DAT
A2

DAT
A3

DATA

INVERSE
KEY
GENERA
TOR

KEY
KASUMI
Decryptio
n
DATA1

DATA
2

DATA3

New
proposed
Image
Steganog
raphy

KEY
GENERATO
R
KASUMI
Encryption

KE
Y2

New
proposed
Audio
Steganog
raphy

K
E
Y
1

New
proposed
Image
Steganogra

K
E
Y
1

KEY3

KEY
2

phy
New
proposed
Audio
Steganogra
phy

Bit
stre
am
data

KEY3

Ima
ge
jpg
file

Audi
o
wav
file

Figure 2: The Decryption Engine


Bit
strea
m
data

Image
jpg
file

Audio
wav

file

Figure 1: the proposed Encryption engine model

Figure 2 shows the decryption engine module as can


simply observed it is reverse of encryption but it
requires the same key for extracting the data from
stenograph or cryptograph data. It is also a multi level
decryption and requires lots of privet information to
have original data.
www.ijsret.org

1033

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3, Issue 6, September 2014

3. RESULTS
Figure 3 shown below shows the results observed for
the KASUMI data encryption for 64 bit means 8 bytes.

Figure 4 shown below shows the results that are been


observed by the proposed every 8th bit on 2nd LSB of
pixel and rest of other on 1st LSB Image Encryption
using MATLAB.
Figure 5: the proposed audio stenograph result
Figure 5 shows the results that are been observed for
the proposed audio steganography where key based
separation scaled data hiding as interleave in audio file.

4. CONCLUSIONS
Information security is required for confidential data
transfer. Steganography is type or can say the ways
used for secure transmission of secrete information.
Proposed architecture for data transmission with highly
level of security has achieved it original objective and
the overall avalanche has been improved and the SNR
has been improved. Hence one can conclude that
proposed architecture produces very high level of
security because of it is using multiple levels of
encryption. So combination of both can be used so that
confidentiality, data integrity, authentication, and nonrepudiation of the data can be maintained.

REFERENCES
Figure 3: the KASUMI data Encryption

1.
Harish Kumar and Anuradha has published
paper in Third International Conference on IEEE,
Computing
Communication
&
Networking
Technologies (ICCCNT), 2012, entitle Enhanced LSB
technique for audio Steganography
2.
Altaay and Alaa A. Jabbar and Shahrin Bin
Sahib along with Mazdak Zamani has published paper
International Conference on IEEE, Advanced Computer
Science Applications and Technologies (ACSAT),
2012, entitle, An Introduction to Image
Steganography Techniques,
3.
V. Saravanan, A. Neeraja, has published paper
in IEEE, Proceedings of 7'h International Conference
on Intelligent Systems and Control (ISCO 2013), entitle
Security Issues in Computer Networks and
Stegnography.
4.
Imran Sarwar Bajwa, Rubata Riasat has
published paper in 2011 IEEE, entitle A New Perfect
Hashing based Approach for Secure Stegnograph

Figure 4: the proposed Image Stenograph result

5.
Prof. Samir Kumar Bandyopadhyay
and
Barnali Gupta Banik, has published paper in
International Journal of Emerging Trends &
www.ijsret.org

1034

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3, Issue 6, September 2014

Technology in Computer Science , Volume 1, Issue 2,


July

August
2012,entitle
Multi-Level
steganographic algorithm for audio steganography
using LSB modification and parity encoding
technique,
6.
Hemalatha S, U Dinesh Acharya, Renuka A,
Priya R. Kamath, has published paper in Signal &
Image Processing : An International Journal (SIPIJ)
Vol.4, No.1, February 2013,entitle A secure and high
capacity steganography technique.
7. Debnath Bhattacharyya, Poulami Das, Samir
Kumar Bandyopadhyay, and Tai-hoon Kim, has
published paper in International Journal of Advanced
Science and Technology Vol. 3, February, 2009, entitle
Text Steganography: A Novel Approach

www.ijsret.org

1035

Anda mungkin juga menyukai