A Wavelet Based Audio Steganography System A Thesis Submitted to the College of Engineering of Nahrian University in Partial Fulfillment of the Requirements for the Degree of Master of Science In Electronic and Communications Engineering/ Electronic Circuits and Systems by Riam Majeed Zaal (B.Sc 2005) Rabie al auwal 1430 March 2009
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
A Wavelet Based Audio Steganography System
A Thesis Submitted to the College of Engineering
of Nahrian University in Partial Fulfillment of the Requirements for the Degree of
Master of Science In
Electronic and Communications Engineering/ Electronic Circuits and Systems
by Riam Majeed Zaal
(B.Sc 2005)
Rabie al auwal 1430 March 2009
i
ABSTRACT Steganography is the art of information hiding in ways that
prevent its detection. A message in cipher text may raise suspision, while
an invisible message will not. Digital steganography uses a host data or
message, known as a ''container'' or ''cover'' to hide another data or
message called ''secret'' in it.
An Image in audio steganography system had been proposed in this
thesis in order to embed a secret image data in audio data. One
embedding method is implemented in the proposed system (Least
Significant Bit in time domain, and transform domain Discrete Wavelet
Transform).
The technique (Least Significant Bit) is implemented in time domain
where the secret data is embedded directly in the cover data. This
technique is implemented in frequency domain that results from using
discrete wavelet transform; where the secret data are embedded in
wavelet transform (WT) coefficients of cover data.
Most of the fidelity measures (Mean Square Error, Normalized Root
Mean Square Error, Signal to Noise Ratio, Peak Signal to Noise Ratio
and Correlation) obtained in the test has indicated good results for PSNR
(187.28db) and MSE (0.214). The reconstructed data is exactly the same
original data if the wavelet transform is used, while a small
unrecognizable error may occur when the technique is used in time
domain. MATLAB programming environment is used to simulate the
entire system.
ii
CONTENTS
ABSTRACT i Contents ii List of Abbreviations (alphabetic) v List of Symbols (alphabetic)
vi List of Tables vii List of Figures vii
i
Chapter One :Overview
1.1 Overview 1 1.2 information Hiding 2 1.3 information Hiding Techniques 1.3.1 Hiding in Text 1.3.2 Hiding in Disc Space 1.3.3 Hiding in Network Packets 1.3.4 Hiding in Software and Circuitry 1.3.5 Hiding in Image 1.3.6 Hiding in Video 1.3.7 Hiding in Audio
2 2 2 3 3 4 4 4
1.4 Information hiding Features and Applications a) Features b) Applications
5 5 6
1.5 Steganography 7 1.6 Steganography Advantages and Disadvantages a) Advantage b) Disadvantages
7 7 8
1.7 Literature Survey 1.8 The Aim of the Work 1.9 Thesis Layout
b) Phase Coding c) Spread Spectrum Coding d) Echo Data Hiding
2.5 Digital Sound Representation 2.6 Transform Domain Techniques
17 18 18 19 21
2.7 Wavelet Transform 22 2.8 The Continuous Wavelet Transform and the Wavelet Series
24
2.9 The Discrete Wavelet Transform
25
2.10 DWT and Filter Bank 2.10.1 Multi-Resolution Analysis using Filter Banks
26 26
2.11.Daubechies Wavelets:dbN
28
2.12 Why Wavelet Analysis Effective
Chapter Three: System Design and Implementation
30
3.1 Introduction 32 3.2 The Overall System Model 32 3.3 The Proposed Stego system 34 3.3.1 Embedding in Time Domain 34 3.3.2 The Extracting Algorithm 38 3.3.3 Embedding in Transform Domain 40 3.3.4 The Extracting Algorithm 45 3.4 Fidelity Measures 47 Chapter Four : Experimental Results and System Evaluation
4.1 Introduction 52 4.2 Test on Hiding Methods 52 4.2.1 Test on Hiding in the Time domain, and DWT using LSB method
55
Chapter Five : Conclusions and Suggestions for Future Work 5.1 Conclusion 69 5.2 Suggestions for Future Work 70 REFRENCES 71 Appendix A.1 Appendix A.2 AppendixA.3
iv
List of Abbreviations
DSP Digital Signal Processing FFT Fast Fourier Transform
DVD Digital Versatile Disk
HAS Human Auditory System
A/D Analog to Digital
DSSS Direct Sequence Spread Spectrum
LSB Least Significant Bit
PCM Pulse Code Modulation
STFT Short Time Fourier Transform
WT Wavelet Transform
CWT Continuous Wavelet Transform
DWT Discrete Wavelet Transform
DHWT Discrete Haar Wavelet Transform
ASCII American Standard Code for Information
Interchange
WAV Window Audio Visual
SNR Signal to Noise Ratio
PSNR Peak Signal to Noise Ratio
NRMSE Normalized Root Mean Square Error
JPEG Joint Photography Expert Group
MSE Mean Square Error
DbN N-th order duabechies Filter
v
List of Symbols
C (u) Discrete Cosine Transform
F(x) Inverse discrete Cosine Transform
T Translation Parameter
S Scale Parameter
ψ (t) Time domain wavelet function
Ψ Called the mother wavelet
φ(t) Time domain scaling function
X Original audio signal
H◦ High pass filter
G◦ Low pass filter
ω Analog radian frequency
t Continuous time variabl
vi
List of Tables
Table Page
4.1 The test sample applied to the system
4.2 Test Results for hiding of the sample '' song1 wave'' Framing 16-bit
4.3 Test Results for hiding of the sample ''song2 wave'' Framing 16-bit
4.4 Test Results for hiding of the sample '' song3 wave'' Framing 16-bit
4.5 Test Results for hiding of the sample '' song4 wave'' Framing 16-bit
4.6 Test Results for hiding of the sample '' song5 wave'' Framing 16-bit
4.7 Test Results for hiding of the sample ''song6 wave'' Framing 16-bit
4.7 Test Results for hiding of the sample ''song6 wave'' Framing 16-bit
4.9 Test Results for hiding of the sample ''song8 wave'' Framing 16-bit
4.10 Test Results for hiding of the sample ''song9 wave'' Framing 16-bit
4.11 Test Results for hiding of the sample ''song10 wave'' Framing 16-bit
53
55
56
57
58
59
60
61
62
63
64
vii
List of Figures
Figure
Page
Figure (2.1) Steganography Model 14 Figure (2.2) the classification of covers 20 Figure (2.3) PCM for the computer programmer 21 Figure (2.4) Time-Frequency resolution of STFT 23 Figure (2.5) Time-frequency resolution of WT 23 Figure (2.6) Three-level wavelet decomposition tree 26 Figure (2.7) Three-level wavelet reconstruction tree 27 Figure (2.8) Daubechies Wavelet db4 on the Left and db8 on the Right 28 Figure (2.9) Haar Wavelet 29 Figure (2.10) Haar Scaling Function 30 Figure (3.1) the Overall System Model 33 Figure (3.2) Block Diagram of Time Domain Embedding Technique 34 Figure (3.3) Original secret image 36 Figure (3.4) Gray scale of image 36 Figure (3.5) Block Diagram of Time Domain Extracting Technique 39 Figure (3.6) Block Diagram of Transform Domain Embedding Technique
41
Figure (3.7) Block Diagram of Transform Domain Extracting Technique 46 Figure (3.8) the embedding LSB system flowchart 50 Figure (3.9) the embedding wavelet system flowchart 51 Figure (4.1) Image Used as a secret message 54 Figure (4.2) Signal to Noise Ratio when using Song Cover with size 169K 67 Figure (4.3) Mean Square Error when using Song cover with size 169KB 67 Figure (4.4) Signal to Noise Ratio when using Song cover with size 1.4MB
68
Figure (4.5) Mean Square Error when using Song cover with size 1.4MB 68
1
Chapter One
INTRODUCTION
1.1 Overview Digital multimedia communication is of the essence to the Internet. In
numerous applications it is required that communication be private or secure.
The two most common methods for secure communication are cryptography and
steganography [1]. In cryptography the secure message (of any media format) is
encrypted, while in steganography the message or payload is hidden, on an
imperceptible manner, in a ''carrier'' media. Steganography is an alternative to
cryptography because of the ease to develop customized steganographic systems
and appeal that, unlike cryptography, the secure of communication is not
apparent to any third party [2]. In the study of communications security,
cryptography techniques have received more attention from the research
community and from industry than information hiding, but in the recent years a
rapid growth of this discipline is seen [3]. The reasons for this growth are:
1. The availability of multimedia content in digital form so that digital image as
well as audio and video files a rich environment for hiding unlimited types of
data.
2. Senses/perceptions of human being are not acute enough to distinguish minor
changes.
2
1.2 Information Hiding
Information hiding, in general is covering sensitive information within
normal information, this creates a hidden communication channel between
sender and receiver such that the existence of channel is unnoticeable. The main
goal of information hiding is to send message without creating suspicion.
One of the more interesting parts of information hiding is steganography,
different from cryptography that is about protecting the contexts of message,
steganography is a concealing its existence [4].
1.3 Information Hiding Techniques
There is several information hiding techniques that should be classified
according to the media where the information is hidden.
1.3.1 Hiding in Text
Documents may be modified to hide information by manipulating of lines
and words. HTML files can be used to carry information since adding spaces,
tabs, ''invisible'' characters, and extra lines breaks are ignored by web browsers.
The ''extra'' spaces and lines are not perceptible until revealing the source of the
web page. There are many methods for hiding information in text such as line-
shift coding, word shift coding …etc [5].
1.3.2 Hiding in Disc Space
Another way to hide information relies on finding unused space is that not
reading apparent to an observer. Taking advantage of unused space or reversed
space to hold covert information provides a mean of hiding information without
3
perceptually degrading the carrier. The way operating system stores files
typically results in unused space that appears to be allocated to files. Another
method of hiding information in the file system is to create hidden partition.
These partitions are not seen if the system is started normally [5].
1.3.3 Hiding in Network Packets
Various network protocols characteristics can be used to hide information.
TCP/IP packets are used to transport information and an uncountable number of
packets are transmitted daily over the Internet. Any of these packets can provide
covert communication channel. The headers have unused space or other values
that can be manipulated to hide information. The areas encoded in the packet can
be:
1. The IP packet identification field.
2. The TCP initial sequence number field.
3. The TCP acknowledged sequence number field.
The fields are replaced with numerical ASCII representation of the
characters to be encoded. These fields are less likely to be distorted due to the
network routing or filtering [5].
1.3.4 Hiding in Software and Circuitry
Data can also be hidden based on the physical arrangement of a carrier. The
arrangement itself may be an embedded signature that is unique to creator. An
example of this is in the layout of code distributed in a program and the layout of
electronic circuits on a board. This type of 'marking'' can be used to uniquely
identify the design origin and cannot be removed without significant change to
the network [5].
4
1.3.5 Hiding in Image
Digital image is likely candidate for information hiding. There are many
attributes of human vision system (HVS) that are potential candidates for
exploitation in an information hiding system, including our varying sensitivity to
contrast as a function of spatial frequency and the masking effect of the edges
(both in luminance and chrominance0. The HVS has low sensitivity to small
changes in luminance, being able to perceive change of no less than one part in
30 for random patterns. Another HVS ''hole'' is our relative insensitivity to very
low spatial frequencies such as continuous changes in brightness across an
image. Additional advantage of working with images is that they are non-casual
data hiding techniques can have access to any pixel or block of whid at random
[6].
1.3.6 Hiding in Video
Video files are generally a collection of images and sounds, so most of the
presented techniques on images and audio can be applied to video files too. The
two advantages of video are: the large amount of data can be hidden inside each
frame, and the video is a moving stream of images and sounds, therefore any
small but otherwise noticeable distortions might be unobserved by humans
because of the continuous of the continuous flow of the information [7].
1.3.7 Hiding in Audio
Data hiding in audio is especially challenging because Human Auditory
system (HAS) perceives over a range of power greater than one billion to one
and rang of frequencies greater than one thousand to one [6].
5
1.4 Information hiding Features and Applications
a) Features
Data-hiding techniques should be capable of embedding data in a host
signal with the following restrictions and features:
1. The host signal should be nonobjectionally degraded and the embedded
data should be minimally perceptible. (The goal is for data to remain
hidden. We will use the words hidden, inaudible, imperceivable, and
invisible to mean that an observer does not notice the presence of the data,
even if they are perceptible.)
2. The embedded data should be directly encoded into the media, rather than
into a header or wrapper, so that the data remain intact across varying data
file formats.
3. The embedded data should be immune to modifications ranging from
intentional and intelligent attempts at removal to anticipated
Figures (3.8), and (3.9) show the flowcharts used to implement some of
the above steganography systems. These are Hidden in LSB, and Hidden DWT
respectively.
50
Fig (3. 8) the embedding LSB system flowchart
Cover
Converting the Sample selecting to binary (16-bit)
Taking the LSB
End
Start
Reading the cover Audio
Selecting the sample from the cover
Reading the massage image
Converting the matrix into Colum vector
Converting in to black 256 sample
Converting to binary (8-bit)
Reading the pixel by pixel
Call cover
Replacing the output of XOR with LSB of cover
Selecting another sample of cover
Massage bit (XOR) LSB cover bit
Converting the binary into stego decimal
Checking end of bits
Checking end of massage
pixels
End
Reading bit by bit
51
Figure (3.9) the embedding wavelet system flowchart
Start
Reading the cover Audio
Converting the 1D-DWT in to Blank of 256 Samples
Select the Sample from the cover
Reading the Image
Taking 1D-DWT
Reading pixel by pixel
Converting the matrix image in to column vector
Converting in to binary (8-bit)
Call cover
Massage bit (XOR) LSB cover bit
Replacing the output of XOR with LSB of cover
Reading bit by bit
Selecting on other sample of DWT
Checking end the bits
Checking end the pixels
Taking IDWT of cover Audio
End
52
Chapter Four
Experimental Results and System Evaluation
4.1 Introduction
This chapter demonstrates the results of the designed and implemented
scenarios described in chapter three. The tests were performed using standard
fidelity criteria such MSE, PSNR, SNR, NRMSE, and COR.
4.2 Tests on the Hiding Methods
In this section, the hiding method was tested. The test strategy is to check
the error that might appear in the stego-cover (cover containing the hidden
information). Another test was performed on the reconstructed secret files to
determine the level of distortion in the secret data due to hiding process. For
hiding method, various types of audio file such as Song were used for testing.
The following (Table 4.1) gives the properties of the test samples applied to the
system.
53
Table (4.1) the test samples that applied to the system.
File Name Size (KB) Length
(sec)
Type
Song1 – cover 169 00:38 Song
Song2- cover 243 00:55 Song
Song3- cover 333 01:16 Song
Song4- cover 375 00:47 Song
Song5- cover 497 00:31 Song
Song6- cover 568 00:26 Song
Song7- cover 623 00:28 Song
Song8- cover 819 00:37 Song
Song9- cover 831 00:38 Song
Song10- cover 1.4 MB 01:06 Song
As shown in Table (4.1), the ten cover song files, because we are concerned with
hiding in audio steganography, it is frequently needed, where an audio cover is
very important because in addition to its information contents, it conveys an
embedded authentication signature about the speaker. Information contents
convey an embedded authentication signature about the speaker. Figure (4.1), as
shown below for test sample of image using as a secret message with different
size.
54
Flying 145 x 109 3.77 KB Girl 130 x 121 4.82KB
Flower 499x379 20.8KB Garden 640x480 58.5 KB
Students 1152 x 864 208 KB
Baby 113x150 3.93KB
Mall 1280 x 1024 109 KB Riammajeed 197x208 26.5KB
Boys 1632 x 1224 407 KB Lamees 1536x1152 364KB Figure (4.1) Images used as a secret message
55
4.2.1 Test on Hiding in the Time domain, and DWT using LSB method.
In this section, we obtain the test results for hiding the secret image file in least bit of each 8 bit, 16 bit of the Speech cover and Song cover, as shown in the following tables, Table (4.2) Test Results for hide on the sample "Song1 wav" Framing 16-bit
Cover Stego
Standard Fidelity Measures Secret File Name methods
[12] V. Vijaya Kumar, U.S.N.Raju, ''Wavelet based Texture Segmentation methods based on Combinatorial of Morphological and Statistical Operations'', IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.8, August 2008. [13] Mohammad Pooyan, Ahmad Delforouzi,''LSB-based Audio Steganography Method Based on Lifting Wavelet Transform'', Department ofElectrical and Computer Engineering, Shahed University , delforouzi@shahed. ac. ir, pooyan@shahed. ac. Ir, 2007. [14] N.Johnson, Z. Duric and S. Jajodia, ''Steganalysis: The Investigation of
A-1 Computer program for hiding secret data inside audio signal using Least Significant Bit (LSB) method in Time Domain clc clear all tic W=randperm(255); index=[ ]; Lenc=0; len_speech=18000; %%% length of speech signal %%%% read the cover speech signal fid=fopen('rr.wav','rb'); [x]=fread(fid,len_speech,'int16'); origdata=x(250:end); origdata(length(origdata)+1:2*length(origdata))=x(250:end); % read the image x_i=imread('flying.jpg'); y_i=double(rgb2gray(x_i)); [r c]= size(y_i); y_i_v=reshape(y_i,1,r*c);% vector of the image y_i_b=dec2bin(y_i_v) ;% binary [a1 a2]=size(y_i_b); im=reshape(y_i_b,1,a1*a2); len_speech=length(origdata); len_frame=255; nf=floor(len_speech/len_frame); %% no. of frames required index=1;
A-1
for tt=0:nf-1 %%% framing into blocks of length =len_frame xr=origdata(1+tt*len_frame:len_frame+tt*len_frame); sign_xr=sign(xr); xa=abs(xr);
A-2
xrej=xa; for k=1:length(xa) xb=dec2bin(xa(W(k)),16); if index < (a1*a2) xb(16)=im(index) ; % hid information in the LSB index=index+1; end xd=bin2dec(xb); xrej(W(k))=xd ; end xf=xrej.*sign_xr; for k1=1:length(xf) rS(k1+tt*len_frame)=xf(k1); end end origdata=origdata(1:length(rS)); rS = rS';%(1:length(origdata)); % [1] Signal to Noise Ratio sqdata = origdata.^2; % Square of original speech signal sqrS = rS.^2; % Square of reconstructed signal msqdata = mean(sqdata); % Mean square of speech signal sqdiff = (sqdata-sqrS); % Square difference msqdiff = mean(sqdiff); % Mean square difference SNR = 10*log10(abs(msqdata/msqdiff)) % Signal to noise ratio
A-2
%[2] Peak Signal to Noise Ratio N = length(rS); % Length of reconstructed signal X = max(abs(sqdata)); % Maximum absolute square of original signal diff = origdata - rS; % Difference signal
A-3
endiff = (norm(diff))^2; % Energy of the difference between the % original and reconstructed signal PSNR = 10*log10((N*(X^2))/endiff) % Peak Signal to noise ratio %[3] Normalised Root Mean Square Error diffsq = diff.^2; % Difference squared mdiffsq = mean(diffsq); % Mean of difference squared mdata = mean(origdata); % Mean of original speech signal scaledsqS = (origdata - mdata).^2; % Squared scaled data mscaledsqS = mean(scaledsqS); % Mean of squared scaled data NRMSE = sqrt(mdiffsq/mscaledsqS)% Normalized Root Mean Square Error % [4] correlation xx=rS-mean(rS); yy=origdata-mean(origdata); Cor=sum(xx.*yy)/((sum(xx.^2)*sum(yy.^2))^0.5)
A-4
A-2 Computer program for hiding secret data inside audio signal using Least Significant Bit (LSB) method in Transform Domain using Discrete Wavelet Transform (DWT). clc clear all tic W=randperm(255); index=[]; wname= 'db10'; depth=2;% level; Lenc=0; len_speech=18000; %%% length of speech signal %%%% read the cover speech signal fid=fopen('sound6.wav','rb'); [x]=fread(fid,len_speech,'int16'); origdata=x(250:end); origdata(length(origdata)+1:2*length(origdata))=x(250:end); % read the image x_i=imread('students.jpg'); y_i=double(rgb2gray(x_i)); [r c]= size(y_i); y_i_v=reshape(y_i,1,r*c);% vector of the image y_i_b=dec2bin(y_i_v) ;% binary [a1 a2]=size(y_i_b); im=reshape(y_i_b,1,a1*a2); len_speech=length(origdata); len_frame=255; nf=floor(len_speech/len_frame); %% no. of frames required index=1; for tt=0:nf-1 %%% framing into blocks of length =len_frame
A-4
xf=origdata(1+tt*len_frame:len_frame+tt*len_frame); [c,l] = wavedec(xf,depth,wname); Wout=c; for kk=1:length(W) yd=c(W(kk))*100;
A-5
sign_yd=sign(yd); xb=dec2bin(abs(yd),16); if index < (a1*a2) xb(16)=im(index) ; % hid information in the LSB index=index+1; end Wout(W(kk))=sign_yd*bin2dec(xb)/100; end rC=Wout; xf=waverec(rC,l,wname); for k1=1:length(xf) rS(k1+tt*len_frame)=xf(k1); end end origdata=origdata(1:length(rS)); rS = rS';%(1:length(origdata)); % [1] Signal to Noise Ratio sqdata = origdata.^2; % Square of original speech signal sqrS = rS.^2; % Square of reconstructed signal msqdata = mean(sqdata); % Mean square of speech signal sqdiff = (sqdata-sqrS); % Square difference msqdiff = mean(sqdiff); % Mean square difference SNR = 10*log10(abs(msqdata/msqdiff)) % Signal to noise ratio
A-5
%[2] Peak Signal to Noise Ratio N = length(rS); % Length of reconstructed signal X = max(abs(sqdata)); % Maximum absolute square of original signal diff = origdata - rS; % Difference signal endiff = (norm(diff))^2; % Energy of the difference between the
A-6
% original and reconstructed signal PSNR = 10*log10((N*(X^2))/endiff) % Peak Signal to noise ratio %[3] Normalised Root Mean Square Error diffsq = diff.^2; % Difference squared mdiffsq = mean(diffsq); % Mean of difference squared mdata = mean(origdata); % Mean of original speech signal scaledsqS = (origdata - mdata).^2; % Squared scaled data mscaledsqS = mean(scaledsqS); % Mean of squared scaled data NRMSE = sqrt(mdiffsq/mscaledsqS)% Normalized Root Mean Square Error % [4] correlation xx=rS-mean(rS); yy=origdata-mean(origdata); Cor=summation(xx.*yy)/((summation(xx.^2)*summation(yy.^2))^0.5)
A-7
A-3 Computer program for extracting secret message from audio signal in Transform domain using Discrete Wavelet Transform (DWT). clc clear all tic index=[]; wname='haar'; depth=1; Lenc=0; len_speech=30000; %%% length of speech signal %%%% read the cover speech signal fid=fopen('sound6.wav','rb'); %fseek(fid,20,0); [x]=fread(fid,len_speech,'int16'); origdata=x(250:end); origdata(length(origdata)+1:2*length(origdata))=x(250:end); % read the image x_i=imread('Dock.jpg'); y_i=rgb2gray(x_i); [rr cc]= size(y_i); y_i_v=reshape(y_i,1,rr*cc);% vector of the image y_i_b=dec2bin(y_i_v) ;% binary [a1 a2]=size(y_i_b); im=reshape(y_i_b,1,a1*a2); imr=im; len_speech=length(origdata); len_frame=10; nf=floor(len_speech/len_frame); %% no. of frames required index=1; % nf=1; for tt=0:nf-1 %%% framing into blocks of length =len_frame
%sum=0; %Wa=c(1:l(1)); for kk=1:length(c) % take only detial of information yd=c(kk); sign_yd=sign(yd); xb=dec2bin(abs(yd),16); if index < (a1*a2) xb(16)=im(index) ; % hid information in the LSB index=index+1; end xd=bin2dec(xb); Wout(kk) =xd*sign_yd; end % extracting image from sound files xr=waverec(Wout,l,wname); [cr,l] = wavedec(xr,depth,wname); for kk=1:length(index) yd=c(kk); xb=dec2bin(abs(yd),16); imr(kk)=xb(16); end for k1=1:length(xf) rS(k1+tt*len_frame)=xr(k1); end end
هو فن اخفاء المعلومات بطرق معينه بحيـث يـصعب ) Steganography(الكتابه الخفيه فـي . الرساله المشفره تؤدي الى الشك بينما الرساله الغير مرئيه لا تؤدي الى الشك . اكتشافها
او Container)( عرف بالحاويـه فن الكتابه الخفيه الرقميه تستخدم رساله او بيانات معينه ت .داخله) Secret(لاخفاء بيانات او رسائل اخرى تسمى بالسريه ) Cover(الغطاء
ثم تنفيذها في النظـام . النظام المقترح في هذه الاطروحه هو نظام اخفاء صوره داخل صوت
جي ومجال في مجال الوقت وفي مجال التحويل المو ) LSBالاخفاء في البت الاخير ( المقترح .الجيب تمام
نفذت في مجال الوقت حيث ان البيانات السريه تم اخفاؤها مباشرة في بيانـات ) LSB(طريقة
حيـث هـن ) DWT(التحويـل المـوجي الغطاء ونفذت في مجال التردد الذي نتج باستخدام .البيانات السريه يتم اخفاؤها في معاملات التحويل الموجي لبيانات الغطاء
) MSE(المقترح يتم اختباره باستخدام مقاييس معوليه قياسيه هي متوسط الخطأ المربع النظام
والارتباط ) PSNR(ونسبة الاشاره الى الضوضاء ) NRMSE(ومتوسط جذر الخطأ المربع ) .(COR كل المقاييس المعوليه التي استخدمت في اختبار النظام المقترح أظهرت قيم جيـده
ات المسترجعه فكانت بالضبط هي نفسها البيانـات الـسريه التـي تـم اما البيان ). PSNR(ل في مجـال التحويـل المـوجي هـي ) LSB(اخفاؤها اذا كانت طريقه الاخفاء بالبت الاخير
المستخدمه بينما يظهر بعض الاختلاف غير المحسوس اذا كانت طريقة الاخفـاء فـي البـت .في مجال الوقت هي المستخدمهLSB) (الاخير
شكر وتقدير
بالشكر والامتنان للأستاذ المساعد الدكتور رجاء الدين عبد خالد هتقدم الباحثت, لما بذله من جهود قيمه تمثلت بالمتابعة والتوجيهات الدقيقة طوال فترة العمل
.ي ظهر بهاوالتي كان لها الدور في إظهار البحث بالصورة الت
الباحثه أن يتقدم بالشكر والامتنان لكل من ساهم بتسهيل إنجاز هذا ودكما تالعمل في قسم الهندسة الالكترونية والاتصالات وخاصة السيد رئيس القسم
الدكتور جابر سلمان عزيز والسيد مقرر الدراسات العليا الدكتور قصي لطفي .عباس
لية الهندسة في جامعة النهرين الأستاذ الدكتور كما وتشكر الباحثه السيد عميد ك
محسن جبر جويج على جهوده القيمة التي بذلها في إنجاح مسيرته الدراسية .خلال سني الدراسة الاوليه والعليا
وأخيرا تشكر الباحثه المهندس فاضل صاحب في كلية الهندسة الجامعة
. البحثألمستنصريه على تقديمه المساعدة القيمة في إكمال
الباحثه
ريام مجيد زعال
الصوتي المبني على نظام إخفاء المعلومات معالجة الاشاره الرقميه
رسالة
مقدمه إلى كلية الهندسة في جامعة النهرين وهي جزء من متطلبات نيل درجة ماجستير علوم في
الدوائر والمنظومات الالكترونية/الهندسة الالكترونية والاتصالات
من قبل ريام مجيد زعال
)2005 في الهندسة الالكترونية والاتصالات بكالوريوس علوم(