Top Banner
International Journal of Scientific Research and Engineering Studies (IJSRES) Volume 1 Issue 3, September 2014 ISSN: 2349-8862 www.ijsres.com Page 55 Design And Development Of Embedded System Based Multimedia Steganography N. Spandana E.C.E.(M.N.E.) M.I.T.S. Madanapalli, India Mr. M. Jagadeesh Babu Associate Professor, E.C.E. M.I.T.S. Abstract: Steganography is a method of hiding sent mes s age s in the cover media in all type s o f m ul ti media data for mats s uch as audio, i mage etc., I n th is proj ect we deal wit h A udi o Steg anograph y in whi ch the data can be s ent wi thou t any suspe nsion . Our embe dded sys tem use s A RM 9 micr o control ler which i s 32 bit controll er. The main aim of this proj e ct is to transfer a hi dde n data thr ough audio f il es s afely wi thou t be in g visible to othe rs. Here by us i ng thi s technique the data can be sent through the audio files wit hout being vi s ibl e by e ncr yptin g and de crypti ng the da ta. I n or de r to encrypt and decrypt the data we use the Polynomial M ethod. Po lynomi al M ethod is us e d for publi c key e ncr yption and i t i s us ed to tran sfer data s e cur e . We use Steganography for security purpose. By using Steganography the hidden media file can be sent very accurately and very f as t f r om the se nder to t he rece i ve r. Th e re are many techni ques based on Ste ganography. I n this paper we use the leas t s ign i fi cant Bi t Ste ganograph y. I t i s one of the te chniques in whi ch the leas t signif icant bi t is replaced by a data bit. We use M AT L AB for coding pur pos e and impleme nti ng it on 32 b it mi cro contr oll e r. Keywords :- Ste ganography, L e as t signi fi cant B it, Data hiding. I. INTRODUCTION A. STEGANOGRAPHY The process of hiding a message, an image, or a file in any media is known as Stganography. Here the media may be either a plain text, an audio, or a video. The word Steganography is derived from an Ancient Greek words STEGANO and GRAPHIA. The word STEGANO means “covered” and GRAPHIA means “writing”. Johannes Trithemius was the first person to use this term. He used this term first in his book known as Steganographia, which is a thesis on Steganography as well as Cryptography. Basically the messages that are hidden will appear either on images, audio, or any cover text. Some of the achievements on Steganography that do not have the type of security through irrelevance, while the schemes of Steganography that are key- dependent bond on to The Kerckhoff’s principle. The main  plus of Steganography than cryptography is “the secret message that is proposed does not magnetize the curiosity to itself as a purpose of analysis. The unbreakable noticeable messages provoke interest and convict in the places where ever the encryption is illicit. However the cryptography is a  process of defending the filling of the point and Sreganography is alarmed with the reality of hiding as the message is sent secretly along with hiding the contents of the message. The process of Steganography is shown below.  Figure 1: Steganographic process B. AUDIO STEGANOGRAPHY In this work we deal with Audio Steganography. in this  process a message is hidden s ecretly in the audio. Generally in Steganography cover media is used to hide the message. Here in this case of Audio Steganography, the cover media is used to hide the message and this message is known as encrypted message. This encrypted message is based on either the public Cover media Secret message Stego system encoder Security key Cover media Stego system decoder Secret message channel
5

Design And Development Of Embedded System Based Multimedia Steganography

Jun 02, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Design And Development Of Embedded System Based Multimedia Steganography

8/10/2019 Design And Development Of Embedded System Based Multimedia Steganography

http://slidepdf.com/reader/full/design-and-development-of-embedded-system-based-multimedia-steganography 1/4

International Journal of Scientific Research and Engineering Studies (IJSRES)Volume 1 Issue 3, September 2014

ISSN: 2349-8862

www.ijsres.com Page 55

Design And Development Of Embedded System Based MultimediaSteganography

N. Spandana

E.C.E.(M.N.E.)M.I.T.S. Madanapalli, India

Mr. M. Jagadeesh Babu

Associate Professor, E.C.E. M.I.T.S.

Abstract: Steganography is a method of hiding sentmessages in the cover media in all types of mul timedia datafor mats such as audio, image etc., I n th i s proj ect we dealwith Audio Steganography in whi ch the data can be sent

wi thou t any suspension . Our embedded system uses ARM 9micro control ler which i s 32 bit controll er. The main aim ofthis proj ect is to transfer a hi dden data through audio f il essafely wi thout being visible to others. Here by using thi stechnique the data can be sent through the audio fileswithout being vi sibl e by encr ypting and decrypti ng the data.I n or der to encrypt and decrypt the data we use thePolynomial M ethod. Polynomial M ethod is used for publi ckey encryption and i t i s used to transfer data secur e. We useSteganography for security purpose. By usingSteganography the hidden media file can be sent veryaccurately and very f ast f rom the sender to the receiver.There are many techni ques based on Steganography. I n thi s

paper we use the least sign i fi cant Bi t Steganography. I t i sone of the techniques in which the least signif icant bi t i sreplaced by a data bit. We use M AT LAB for coding pur poseand implementing it on 32 bit mi cro controll er.

Keywords:- Steganography, L east signi fi cant B it, Datahiding.

I. INTRODUCTION

A. STEGANOGRAPHY

The process of hiding a message, an image, or a file inany media is known as Stganography. Here the media may beeither a plain text, an audio, or a video. The wordSteganography is derived from an Ancient Greek wordsSTEGANO and GRAPHIA. The word STEGANO means“covered” and GRAPHIA means “writing”. JohannesTrithemius was the first person to use this term. He used thisterm first in his book known as Steganographia, which is athesis on Steganography as well as Cryptography. Basicallythe messages that are hidden will appear either on images,audio, or any cover text. Some of the achievements onSteganography that do not have the type of security throughirrelevance, while the schemes of Steganography that are key-

dependent bond on to The Kerckhoff’s principle. The main plus of Steganography than cryptography is “the secret

message that is proposed does not magnetize the curiosity toitself as a purpose of analysis. The unbreakable noticeablemessages provoke interest and convict in the places whereever the encryption is illicit. However the cryptography is a

process of defending the filling of the point andSreganography is alarmed with the reality of hiding as themessage is sent secretly along with hiding the contents of themessage.

The process of Steganography is shown below.

Figure 1: Steganographic process

B. AUDIO STEGANOGRAPHY

In this work we deal with Audio Steganography. in this process a message is hidden secretly in the audio. Generally inSteganography cover media is used to hide the message. Herein this case of Audio Steganography, the cover media is used

to hide the message and this message is known as encryptedmessage. This encrypted message is based on either the public

Covermedia

Secretmessage

Stegosystemencoder

Securitykey

Covermedia

Stegosystemdecoder

Secretmessage

channel

Page 2: Design And Development Of Embedded System Based Multimedia Steganography

8/10/2019 Design And Development Of Embedded System Based Multimedia Steganography

http://slidepdf.com/reader/full/design-and-development-of-embedded-system-based-multimedia-steganography 2/4

International Journal of Scientific Research and Engineering Studies (IJSRES)Volume 1 Issue 3, September 2014

ISSN: 2349-8862

www.ijsres.com Page 56

key or private key encryption algorithms. This two algorithmscan be differentiated in an easiest way that is to remember thesecrecy of message not only the contents but also the simpleexistence of the message.

The figure below shows the generic AudioSteganographic System.

Figure 2: Generic Audio Steganographic System

II. OBJECTIVE OF THE PROJECT

The main aim of this project is to design a Steganographysystem for audio files. This is a fine art of of hiding either atext or an image or file in the other message, image or file.Here a PC is used to check the output. In the output, thatappears on the screen there will be the secret message which ishidden. And in order to perform the whole operationEmbedded systems is used. And the hardware that is used is

Raspberry pi board and the software tool used is Qt. Theoperating systems that is used is Linux. These are all used inthe overall performance of the process. The main aim of this

project is to send the message through the audio files secretly.And in order to encrypt or decrypt the file a key is used.

III. HARDWARE SUPPORT

Basically Linux supports different types of hardware platforms and devices. This is known as Hardware support.But up to now many number of vendors have not providedlinux drivers. Because of this an outside progress is generated,

but still a more progress is required. This is generated since anumber of drivers are executed and maintained by linux

community. Due to this that all the hardware components can be used with poise without fear as that any one the day thevendor may stop the driver support for the product line. Linuxalso supports a number of hardware architectures. No otherOperating systems provide this level of probability other thanthis.

Typical architecture of an embedded linux system isshown below.

Figure 3: Typical structure of an embedded Linux system

IV. BASIC HARDWARE SETUP OF A RASPBERRYPI

Figure 4: Raspberry pi Board

Raspberry pi was developed by Raspberry pi foundationin the UK with the zeal of providing the teaching of basiccomputer science in educational institutions. This raspberry pi

board is a credit card sized single board computer. It wasmanufactured in two board configurations by licensedmanufactured deals along with RS components, Egoman and

SECR ETDA

EMBED

DAND

K EY

SECR ETDA

EMBED

DAND

NETW

OR K

APPLICATIONS

LIBRARIES

Linux kernel

HIGH LEVEL ABSTRACTIONS

FILE NETWORKSYSTEMS PROTOCOLS

LOW-LEVEL INTERFACE

HARDWARE

Page 3: Design And Development Of Embedded System Based Multimedia Steganography

8/10/2019 Design And Development Of Embedded System Based Multimedia Steganography

http://slidepdf.com/reader/full/design-and-development-of-embedded-system-based-multimedia-steganography 3/4

International Journal of Scientific Research and Engineering Studies (IJSRES)Volume 1 Issue 3, September 2014

ISSN: 2349-8862

www.ijsres.com Page 57

Network element 14 (PremierFarnell). These three companiessell Raspberrypionline.

V. WORKING PRINCIPLE OF THE PROJECT

In this section the complete description is given on the proposed system architecture. Here a Raspberry Pi board isused as platform. Once all the devices are connectedsuccessfully, then power up the device. And if once the deviceis power up then the device starts booting from the flash, firstit loads the linux to the device and then initialize all thedrivers and the core kernel. After the kernel is initialized, itfirst checks whether all the devices are working properly ornot. Then after it loads the file system and starts the startupscripts for running necessary processes and daemons. Thenfinally it starts the main application.

When the application starts running it first checks all thedevices and resources that it needs are available or not. Thenafter it checks the connection with the devices and providescontrol to the user.

The GUI that is used for the encryption has the followingoptions: Cover the button for loading the COVER file from

the USB file browser. Secret button for loading the secret file (that is to be

hidden) from the USB file browser. Password field for entering the secret key of 8-

characters. Output field for giving the result file name.

Stegano push button for embedding the data. The embedding algorithm almost works as follows: The Graphical User Interface for the decryption has

the next alternatives. Browse button for giving path of encrypted file. Encrypted file field for loading file name. Password field for entering the secret key of 8-

characters. Decrypt button for decrypting the hidden data.

On hiding the data file we need to go for encryption GUIapplication. Click on the cover button in order to give thecover data (visible data of .wav, .png and .jpg) format. Thenclick on the secret button to load the data that is to be hidden

into the cover file. Give the secret key of (8-char) andexecutable name in next field.

Now then by clicking on the Stegano button, the secretfile will be inserted into the cover data with AES algorithmand the result will be stored as the output file name. As well asfor the decryption of the data, there is a need to mention theencrypted file name and provide the eight character keymentioned for the file. Then after that by clicking on thedecrypt button, the secret file will be extracted to USB path. Inthis way we are implementing Audio and ImageSteganography system.

The experimental setup of the project is shown below.

he pictorial representation of the step by step procedure thatappears on the screen of the PC is shown below. A text file of11945 bytes is embedded into an audio file of 2079526 bytesand the result is shown below.

VI. CONCLUSION

The project “ AUDIO STEGANOGRAPHY ” has beensuccessfully designed and tested. It has been developed byintegrating features of all the hardware components andsoftware used. Presence of every module has been reasoned

out and placed carefully thus contributing to the best workingof the unit. Secondly, using highly advanced ARM11 board

Page 4: Design And Development Of Embedded System Based Multimedia Steganography

8/10/2019 Design And Development Of Embedded System Based Multimedia Steganography

http://slidepdf.com/reader/full/design-and-development-of-embedded-system-based-multimedia-steganography 4/4

International Journal of Scientific Research and Engineering Studies (IJSRES)Volume 1 Issue 3, September 2014

ISSN: 2349-8862

www.ijsres.com Page 58

(Raspberry Pi) and with the help of growing technology the project has been successfully implemented.

REFERENCES

[1] Neil F.Johnson, Sushil Jajodia, “Exploring Steganography;Seeing the Unseen”, Computer, vo l.31, no 2,pp. 26-34,feb.1998.

[2] R.Chandramouli, Nasir Memon, “Analysis of LSB BasedImage Steganography Techniques” Proc. IEEE ICIP 2001

pp 1019-1022.[3] Li Zhi Sui Ai Fen , “Detection of Random LSB Image

Steganography Techniques” proc. IEEE 2004 pp 2113 -2117.

[4] Nedeljko Cvejic, Algorithms for audio watermaking andSteganography, Oulu University Press, Oulu 2004, pp.40-42.

[5] Ali Al-Haj, Ahmad Mohammadand Lama Bata, DWT-Based Audio watermarking, The International Arab

journal of information technology, vol.8, No.3, july 2011, pp.326-333.

[6] I.J.Cox, M.L.miller, J.A.Bloom, J.Fridricand “Digitalwater marking and Steganography”, 2 nd edition, MorganKaufmann, 2008, pp.31.

[7] Y.K.Lee, L.H.Chen, High capacity image Steganographymodel, proc.Inst.Elect.Eng. Vis. Image, Signal Processing147 (3) (2000). Pp.288-294.