International Journal of Scientific Research and Engineering Studies (IJSRES) Volume 1 Issue 3, September 2014 ISSN: 2349-8862 www.ijsres.com Page 55 Design And Development Of Embedded System Based Multimedia Steganography N. Spandana E.C.E.(M.N.E.) M.I.T.S. Madanapalli, India Mr. M. Jagadeesh Babu Associate Professor, E.C.E. M.I.T.S. Abstract: Steganography is a method of hiding sent mes s age s in the cover media in all type s o f m ul ti media data for mats s uch as audio, i mage etc., I n th is proj ect we deal wit h A udi o Steg anograph y in whi ch the data can be s ent wi thou t any suspe nsion . Our embe dded sys tem use s A RM 9 micr o control ler which i s 32 bit controll er. The main aim of this proj e ct is to transfer a hi dde n data thr ough audio f il es s afely wi thou t be in g visible to othe rs. Here by us i ng thi s technique the data can be sent through the audio files wit hout being vi s ibl e by e ncr yptin g and de crypti ng the da ta. I n or de r to encrypt and decrypt the data we use the Polynomial M ethod. Po lynomi al M ethod is us e d for publi c key e ncr yption and i t i s us ed to tran sfer data s e cur e . We use Steganography for security purpose. By using Steganography the hidden media file can be sent very accurately and very f as t f r om the se nder to t he rece i ve r. Th e re are many techni ques based on Ste ganography. I n this paper we use the leas t s ign i fi cant Bi t Ste ganograph y. I t i s one of the te chniques in whi ch the leas t signif icant bi t is replaced by a data bit. We use M AT L AB for coding pur pos e and impleme nti ng it on 32 b it mi cro contr oll e r. Keywords :- Ste ganography, L e as t signi fi cant B it, Data hiding. I.INTRODUCTION A.STEGANOGRAPHY The process of hiding a message, an image, or a file in any media is known as Stganography. Here the media may be either a plain text, an audio, or a video. The word Steganography is derived from an Ancient Greek words STEGANO and GRAPHIA. The word STEGANO means “covered” and GRAPHIA means “writing”. Johannes Trithemius was the first person to use this term. He used this term first in his book known as Steganographia, which is a thesis on Steganography as well as Cryptography. Basically the messages that are hidden will appear either on images, audio, or any cover text. Some of the achievements on Steganography that do not have the type of security through irrelevance, while the schemes of Steganography that are key- dependent bond on to The Kerckhoff’s principle. The main plus of Steganography than cryptography is “the secret message that is proposed does not magnetize the curiosity to itself as a purpose of analysis. The unbreakable noticeable messages provoke interest and convict in the places where ever the encryption is illicit. However the cryptography is a process of defending the filling of the point and Sreganography is alarmed with the reality of hiding as the message is sent secretly along with hiding the contents of the message. The process of Steganography is shown below. Figure 1: Steganographic process B.AUDIO STEGANOGRAPHY In this work we deal with Audio Steganography. in this process a message is hidden s ecretly in the audio. Generally in Steganography cover media is used to hide the message. Here in this case of Audio Steganography, the cover media is used to hide the message and this message is known as encrypted message. This encrypted message is based on either the public Cover media Secret message Stego system encoder Security key Cover media Stego system decoder Secret message channel
5
Embed
Design And Development Of Embedded System Based Multimedia Steganography
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
8/10/2019 Design And Development Of Embedded System Based Multimedia Steganography
International Journal of Scientific Research and Engineering Studies (IJSRES)Volume 1 Issue 3, September 2014
ISSN: 2349-8862
www.ijsres.com Page 55
Design And Development Of Embedded System Based MultimediaSteganography
N. Spandana
E.C.E.(M.N.E.)M.I.T.S. Madanapalli, India
Mr. M. Jagadeesh Babu
Associate Professor, E.C.E. M.I.T.S.
Abstract: Steganography is a method of hiding sentmessages in the cover media in all types of mul timedia datafor mats such as audio, image etc., I n th i s proj ect we dealwith Audio Steganography in whi ch the data can be sent
wi thou t any suspension . Our embedded system uses ARM 9micro control ler which i s 32 bit controll er. The main aim ofthis proj ect is to transfer a hi dden data through audio f il essafely wi thout being visible to others. Here by using thi stechnique the data can be sent through the audio fileswithout being vi sibl e by encr ypting and decrypti ng the data.I n or der to encrypt and decrypt the data we use thePolynomial M ethod. Polynomial M ethod is used for publi ckey encryption and i t i s used to transfer data secur e. We useSteganography for security purpose. By usingSteganography the hidden media file can be sent veryaccurately and very f ast f rom the sender to the receiver.There are many techni ques based on Steganography. I n thi s
paper we use the least sign i fi cant Bi t Steganography. I t i sone of the techniques in which the least signif icant bi t i sreplaced by a data bit. We use M AT LAB for coding pur poseand implementing it on 32 bit mi cro controll er.
Keywords:- Steganography, L east signi fi cant B it, Datahiding.
I. INTRODUCTION
A. STEGANOGRAPHY
The process of hiding a message, an image, or a file inany media is known as Stganography. Here the media may beeither a plain text, an audio, or a video. The wordSteganography is derived from an Ancient Greek wordsSTEGANO and GRAPHIA. The word STEGANO means“covered” and GRAPHIA means “writing”. JohannesTrithemius was the first person to use this term. He used thisterm first in his book known as Steganographia, which is athesis on Steganography as well as Cryptography. Basicallythe messages that are hidden will appear either on images,audio, or any cover text. Some of the achievements onSteganography that do not have the type of security throughirrelevance, while the schemes of Steganography that are key-
dependent bond on to The Kerckhoff’s principle. The main plus of Steganography than cryptography is “the secret
message that is proposed does not magnetize the curiosity toitself as a purpose of analysis. The unbreakable noticeablemessages provoke interest and convict in the places whereever the encryption is illicit. However the cryptography is a
process of defending the filling of the point andSreganography is alarmed with the reality of hiding as themessage is sent secretly along with hiding the contents of themessage.
The process of Steganography is shown below.
Figure 1: Steganographic process
B. AUDIO STEGANOGRAPHY
In this work we deal with Audio Steganography. in this process a message is hidden secretly in the audio. Generally inSteganography cover media is used to hide the message. Herein this case of Audio Steganography, the cover media is used
to hide the message and this message is known as encryptedmessage. This encrypted message is based on either the public
Covermedia
Secretmessage
Stegosystemencoder
Securitykey
Covermedia
Stegosystemdecoder
Secretmessage
channel
8/10/2019 Design And Development Of Embedded System Based Multimedia Steganography
International Journal of Scientific Research and Engineering Studies (IJSRES)Volume 1 Issue 3, September 2014
ISSN: 2349-8862
www.ijsres.com Page 56
key or private key encryption algorithms. This two algorithmscan be differentiated in an easiest way that is to remember thesecrecy of message not only the contents but also the simpleexistence of the message.
The figure below shows the generic AudioSteganographic System.
Figure 2: Generic Audio Steganographic System
II. OBJECTIVE OF THE PROJECT
The main aim of this project is to design a Steganographysystem for audio files. This is a fine art of of hiding either atext or an image or file in the other message, image or file.Here a PC is used to check the output. In the output, thatappears on the screen there will be the secret message which ishidden. And in order to perform the whole operationEmbedded systems is used. And the hardware that is used is
Raspberry pi board and the software tool used is Qt. Theoperating systems that is used is Linux. These are all used inthe overall performance of the process. The main aim of this
project is to send the message through the audio files secretly.And in order to encrypt or decrypt the file a key is used.
III. HARDWARE SUPPORT
Basically Linux supports different types of hardware platforms and devices. This is known as Hardware support.But up to now many number of vendors have not providedlinux drivers. Because of this an outside progress is generated,
but still a more progress is required. This is generated since anumber of drivers are executed and maintained by linux
community. Due to this that all the hardware components can be used with poise without fear as that any one the day thevendor may stop the driver support for the product line. Linuxalso supports a number of hardware architectures. No otherOperating systems provide this level of probability other thanthis.
Typical architecture of an embedded linux system isshown below.
Figure 3: Typical structure of an embedded Linux system
IV. BASIC HARDWARE SETUP OF A RASPBERRYPI
Figure 4: Raspberry pi Board
Raspberry pi was developed by Raspberry pi foundationin the UK with the zeal of providing the teaching of basiccomputer science in educational institutions. This raspberry pi
board is a credit card sized single board computer. It wasmanufactured in two board configurations by licensedmanufactured deals along with RS components, Egoman and
SECR ETDA
EMBED
DAND
K EY
SECR ETDA
EMBED
DAND
NETW
OR K
APPLICATIONS
LIBRARIES
Linux kernel
HIGH LEVEL ABSTRACTIONS
FILE NETWORKSYSTEMS PROTOCOLS
LOW-LEVEL INTERFACE
HARDWARE
8/10/2019 Design And Development Of Embedded System Based Multimedia Steganography
International Journal of Scientific Research and Engineering Studies (IJSRES)Volume 1 Issue 3, September 2014
ISSN: 2349-8862
www.ijsres.com Page 57
Network element 14 (PremierFarnell). These three companiessell Raspberrypionline.
V. WORKING PRINCIPLE OF THE PROJECT
In this section the complete description is given on the proposed system architecture. Here a Raspberry Pi board isused as platform. Once all the devices are connectedsuccessfully, then power up the device. And if once the deviceis power up then the device starts booting from the flash, firstit loads the linux to the device and then initialize all thedrivers and the core kernel. After the kernel is initialized, itfirst checks whether all the devices are working properly ornot. Then after it loads the file system and starts the startupscripts for running necessary processes and daemons. Thenfinally it starts the main application.
When the application starts running it first checks all thedevices and resources that it needs are available or not. Thenafter it checks the connection with the devices and providescontrol to the user.
The GUI that is used for the encryption has the followingoptions: Cover the button for loading the COVER file from
the USB file browser. Secret button for loading the secret file (that is to be
hidden) from the USB file browser. Password field for entering the secret key of 8-
characters. Output field for giving the result file name.
Stegano push button for embedding the data. The embedding algorithm almost works as follows: The Graphical User Interface for the decryption has
the next alternatives. Browse button for giving path of encrypted file. Encrypted file field for loading file name. Password field for entering the secret key of 8-
characters. Decrypt button for decrypting the hidden data.
On hiding the data file we need to go for encryption GUIapplication. Click on the cover button in order to give thecover data (visible data of .wav, .png and .jpg) format. Thenclick on the secret button to load the data that is to be hidden
into the cover file. Give the secret key of (8-char) andexecutable name in next field.
Now then by clicking on the Stegano button, the secretfile will be inserted into the cover data with AES algorithmand the result will be stored as the output file name. As well asfor the decryption of the data, there is a need to mention theencrypted file name and provide the eight character keymentioned for the file. Then after that by clicking on thedecrypt button, the secret file will be extracted to USB path. Inthis way we are implementing Audio and ImageSteganography system.
The experimental setup of the project is shown below.
he pictorial representation of the step by step procedure thatappears on the screen of the PC is shown below. A text file of11945 bytes is embedded into an audio file of 2079526 bytesand the result is shown below.
VI. CONCLUSION
The project “ AUDIO STEGANOGRAPHY ” has beensuccessfully designed and tested. It has been developed byintegrating features of all the hardware components andsoftware used. Presence of every module has been reasoned
out and placed carefully thus contributing to the best workingof the unit. Secondly, using highly advanced ARM11 board
8/10/2019 Design And Development Of Embedded System Based Multimedia Steganography