SlideShare a Scribd company logo
1 of 36
MULTI-LEVEL AUDIO
STEGANOGRAPHY
Seminar Guide Presented by
1
Overview
 Steganography.
 Evolution.
 Basic Steganography Model.
 Encoding & Decoding.
 Related Works.
 Steganography Terms.
 Types of Steganography.
 Study of Multi-Level audio steganography.
 Future Scope.
 Conclusion.
 References.
2
Steganography
 Comes from Greek
- steganos = “covered”
- graphei = “writing”
 Also known as “covered writing”.
 Deals with hiding communicated data.
 Hiding one piece of data within another.
 Only recipient can identify the data using key.
3
Evolution
Watermarking
Cryptography
Steganography
4
Related Work
 Multi-Level Steganographic Algorithm for Audio
Steganography using LSB Modification .
 Multi-Level Steganography which defines a new concept
for hidden communication in telecommunication
networks .
 Audio Steganography using LSB Modification and Parity
Encoding Technique.
5
Basic Steganography Model
6
Encoding
• Prepare
cover data
Step1
• Encode
embedded
data with cover
data
Step 2
• Steganographic
data
Step 3
7
Decoding
• Steganographic
Data
Step1
• Decode
Plain info
Step 2
• Embedded
data
obtained
Step 3
8
Steganography Terms
 Carrier or Cover File - Original message is hidden
inside it .
 Stego-Medium - Medium in which the information is
hidden.
 Embedded or Payload - Information which is to be
hidden or concealed.
 Steganalysis - Process of detecting hidden information
inside a file.
9
Types of Steganography
1. Text/Document Steganography.
2. Image Steganography.
3. Audio Steganography.
4. Network / Protocol Steganography.
10
Text/Document Steganography
 The “carrier” is a text document.
 Data is hidden behind every nth letter.
 Three methods
1. Format based Method.
2. Random and statistical Method.
3. Linguistics Method.
11
Image Steganography
 Cover object is an Image.
 Pixel intensities are used.
 Three methods
1. Least Significant Bit Insertion.
2. Static Parsing Steganography(SPS).
3. Masking and Filtering.
12
Network / Protocol Steganography
 Hiding with the help of network protocols
 Example cover objects are :
TCP, ICMP, IP etc
 OSI layer network model can be used.
13
Audio Steganography
 Embedding secret messages into digital sound.
 WAV, AU, and MP3 sound files can be used.
 Human auditory system (HAS) are exploited.
 Methods of audio steganography are :
1. LSB coding .
2. Parity coding .
3. Phase coding.
14
LSB Coding
 LSB bit is used for data embedding.
 Using LSB increases the capacity
 And decreases the transparency.
 Advantages are :
- Low computational complexity
- Easier Implementation
- Variation in choosing LSB
15
LSB Encoding & Decoding
 Low bit encoder  Low bit decoder
16
Parity Coding
 Encode message in the parity bit region.
 Signal break down into separate region.
 Flipping to LSB is possible.
 Advantage :
- Sender has more of a choice in encoding.
17
Phase Coding
• HAS can’t recognize the phase change in audio signal.
• Encode phase of an audio segment with a data .
18
Multi-Level Steganography(MLS)
 Combination of two or more steganography methods.
 Consist of three levels :
1. Upper Level.
2. Middle Level.
3. Lower Level.
 Layering approach is used.
 Three messages can be transmitted .
19
Overview of MLS
 Mainly there are three permutations for MLS.
20
Permutation 1
21
Permutation 2
22
Permutation 3
23
Multi-Level Steganography(MSL)
 Stego audios is compared with PSNR graph.
 With help of two equations -
1. Mean Squared Error (MSE):
2. Peak Signal-to-Noise Ratio (PSNR):
24
Before & After Steganography
25
Comparison with PSNR Graph
 This hides three secret messages.
 No visible changes in graphs.
 Undetectability is achieved
 Hence high security.
26
Advantages
 Potential capability to hide existence of data.
 Hardness of detecting the hidden (i.e., embedded) data.
 Strengthening of the security of the encrypted data.
 Maintain clarity of audio signal.
27
Disadvantages
 If the all algorithms are known Leakage occurs.
 Password leakage also may occur.
28
 Confidential communication and secret data storing.
 Protection of data alteration.
 Access control system for digital content distribution.
 Media Database systems.
 Use by intelligence services.
Applications
29
Cryptography vs. Steganography
30
 The difference is in their goals...
- Cryptography: although encypted and unreadable, the existence
of data is not hidden.
- Steganography: no knowledge of the existence of the data .
Cryptography
cryptos
hidden
graphia
writing
Steganography
steganos graphia
covered writing
Watermarking vs. Steganography
 Goal of steganography
– Intruder cannot detect a message
 Goal of watermarking
– Intruder cannot remove or replace the message
31
Future Scope
 Further we can extend this approach by combining any
four techniques or more.
 By combining more techniques we can increase capacity
 The system becomes more secure towards detection.
32
Conclusion
 Based on three different techniques.
 Technique for hiding text data into digital audio files .
 Three secret messages can be hidden.
 Uses three traditional method of steganography
 Level based approach to reach the goal.
 The output stego object is very difficult to decode .
 Which makes this method successful in the world.
33
Reference
[1] Jasleen Kour, Deepankar Verma “ Steganography Techniques –A Review Paper “
Volume-3, Issue-5 ,2014
[2] Ramandeep Kaur ,Jagriti Bhatia ,Hardeep Singh,Rajesh Kumar
“Multilevel Technique to Improve PSNR and MSE in Audio Steganography “
Volume 103 – No.5, October 2014
[3] Nitasha, Nidhi Sood” Enhancing the Security of Multilevel Audio
Steganography” May - 2014
[4] Prof. Samir Kumar Bandyopadhyay and Barnali Gupta Banik: “Multi-Level
Steganographic Algorithm for Audio Steganography using LSB Modification
and Parity Encoding Technique”, Volume 1, Issue 2, July – August 2012.
[5] “audio steg: methods”, Internet publication on
http://www.snotmonkey.com/work/school/405/methods.html
34
35
36
QUERIES

More Related Content

What's hot

Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
ekta sharma
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
Manush Desai
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 

What's hot (20)

Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 

Similar to Multi-Level audio steganography

Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
IJRAT
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
Alexander Decker
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 

Similar to Multi-Level audio steganography (20)

HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSHIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
K0815660
K0815660K0815660
K0815660
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Steganography
SteganographySteganography
Steganography
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 

More from ARYA TM (13)

Ftp
FtpFtp
Ftp
 
Dns
DnsDns
Dns
 
Process management
Process managementProcess management
Process management
 
Useradmin
Useradmin Useradmin
Useradmin
 
Webserver
WebserverWebserver
Webserver
 
Basic
BasicBasic
Basic
 
Crontab
CrontabCrontab
Crontab
 
package mangement
package mangementpackage mangement
package mangement
 
s3
s3s3
s3
 
AWS
AWSAWS
AWS
 
EBS elastic block store
EBS elastic block storeEBS elastic block store
EBS elastic block store
 
DevOps
DevOps DevOps
DevOps
 
Side final 2
Side final 2Side final 2
Side final 2
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 

Multi-Level audio steganography

  • 2. Overview  Steganography.  Evolution.  Basic Steganography Model.  Encoding & Decoding.  Related Works.  Steganography Terms.  Types of Steganography.  Study of Multi-Level audio steganography.  Future Scope.  Conclusion.  References. 2
  • 3. Steganography  Comes from Greek - steganos = “covered” - graphei = “writing”  Also known as “covered writing”.  Deals with hiding communicated data.  Hiding one piece of data within another.  Only recipient can identify the data using key. 3
  • 5. Related Work  Multi-Level Steganographic Algorithm for Audio Steganography using LSB Modification .  Multi-Level Steganography which defines a new concept for hidden communication in telecommunication networks .  Audio Steganography using LSB Modification and Parity Encoding Technique. 5
  • 7. Encoding • Prepare cover data Step1 • Encode embedded data with cover data Step 2 • Steganographic data Step 3 7
  • 8. Decoding • Steganographic Data Step1 • Decode Plain info Step 2 • Embedded data obtained Step 3 8
  • 9. Steganography Terms  Carrier or Cover File - Original message is hidden inside it .  Stego-Medium - Medium in which the information is hidden.  Embedded or Payload - Information which is to be hidden or concealed.  Steganalysis - Process of detecting hidden information inside a file. 9
  • 10. Types of Steganography 1. Text/Document Steganography. 2. Image Steganography. 3. Audio Steganography. 4. Network / Protocol Steganography. 10
  • 11. Text/Document Steganography  The “carrier” is a text document.  Data is hidden behind every nth letter.  Three methods 1. Format based Method. 2. Random and statistical Method. 3. Linguistics Method. 11
  • 12. Image Steganography  Cover object is an Image.  Pixel intensities are used.  Three methods 1. Least Significant Bit Insertion. 2. Static Parsing Steganography(SPS). 3. Masking and Filtering. 12
  • 13. Network / Protocol Steganography  Hiding with the help of network protocols  Example cover objects are : TCP, ICMP, IP etc  OSI layer network model can be used. 13
  • 14. Audio Steganography  Embedding secret messages into digital sound.  WAV, AU, and MP3 sound files can be used.  Human auditory system (HAS) are exploited.  Methods of audio steganography are : 1. LSB coding . 2. Parity coding . 3. Phase coding. 14
  • 15. LSB Coding  LSB bit is used for data embedding.  Using LSB increases the capacity  And decreases the transparency.  Advantages are : - Low computational complexity - Easier Implementation - Variation in choosing LSB 15
  • 16. LSB Encoding & Decoding  Low bit encoder  Low bit decoder 16
  • 17. Parity Coding  Encode message in the parity bit region.  Signal break down into separate region.  Flipping to LSB is possible.  Advantage : - Sender has more of a choice in encoding. 17
  • 18. Phase Coding • HAS can’t recognize the phase change in audio signal. • Encode phase of an audio segment with a data . 18
  • 19. Multi-Level Steganography(MLS)  Combination of two or more steganography methods.  Consist of three levels : 1. Upper Level. 2. Middle Level. 3. Lower Level.  Layering approach is used.  Three messages can be transmitted . 19
  • 20. Overview of MLS  Mainly there are three permutations for MLS. 20
  • 24. Multi-Level Steganography(MSL)  Stego audios is compared with PSNR graph.  With help of two equations - 1. Mean Squared Error (MSE): 2. Peak Signal-to-Noise Ratio (PSNR): 24
  • 25. Before & After Steganography 25
  • 26. Comparison with PSNR Graph  This hides three secret messages.  No visible changes in graphs.  Undetectability is achieved  Hence high security. 26
  • 27. Advantages  Potential capability to hide existence of data.  Hardness of detecting the hidden (i.e., embedded) data.  Strengthening of the security of the encrypted data.  Maintain clarity of audio signal. 27
  • 28. Disadvantages  If the all algorithms are known Leakage occurs.  Password leakage also may occur. 28
  • 29.  Confidential communication and secret data storing.  Protection of data alteration.  Access control system for digital content distribution.  Media Database systems.  Use by intelligence services. Applications 29
  • 30. Cryptography vs. Steganography 30  The difference is in their goals... - Cryptography: although encypted and unreadable, the existence of data is not hidden. - Steganography: no knowledge of the existence of the data . Cryptography cryptos hidden graphia writing Steganography steganos graphia covered writing
  • 31. Watermarking vs. Steganography  Goal of steganography – Intruder cannot detect a message  Goal of watermarking – Intruder cannot remove or replace the message 31
  • 32. Future Scope  Further we can extend this approach by combining any four techniques or more.  By combining more techniques we can increase capacity  The system becomes more secure towards detection. 32
  • 33. Conclusion  Based on three different techniques.  Technique for hiding text data into digital audio files .  Three secret messages can be hidden.  Uses three traditional method of steganography  Level based approach to reach the goal.  The output stego object is very difficult to decode .  Which makes this method successful in the world. 33
  • 34. Reference [1] Jasleen Kour, Deepankar Verma “ Steganography Techniques –A Review Paper “ Volume-3, Issue-5 ,2014 [2] Ramandeep Kaur ,Jagriti Bhatia ,Hardeep Singh,Rajesh Kumar “Multilevel Technique to Improve PSNR and MSE in Audio Steganography “ Volume 103 – No.5, October 2014 [3] Nitasha, Nidhi Sood” Enhancing the Security of Multilevel Audio Steganography” May - 2014 [4] Prof. Samir Kumar Bandyopadhyay and Barnali Gupta Banik: “Multi-Level Steganographic Algorithm for Audio Steganography using LSB Modification and Parity Encoding Technique”, Volume 1, Issue 2, July – August 2012. [5] “audio steg: methods”, Internet publication on http://www.snotmonkey.com/work/school/405/methods.html 34
  • 35. 35