Top Banner
Audio Steganography Cody A. Ray ECES 434 Final December 11, 2009
21

Psychoacoustic Approaches to Audio Steganography

May 06, 2015

Download

Technology

Cody Ray

Presentation slides corresponding to a paper that explores methods of audio steganography with emphasis on psychoacoustic approaches. Specifically, it describes a project that had the requirement of hiding a text-based message inside an audio signal with minimal or no distortion of the signal as perceived by the human ear. The theory and experimental results of each approach are discussed.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Psychoacoustic Approaches to Audio Steganography

Audio Steganography

Cody A. RayECES 434 Final

December 11, 2009

Page 2: Psychoacoustic Approaches to Audio Steganography

Introduction

•What is steganography?

•Security through obscurity

•Basis of watermarking

Page 3: Psychoacoustic Approaches to Audio Steganography

Requirements

•Hide a text-based message inside an audio signal with minimal distortion of the signal as perceived by the human ear.

Page 4: Psychoacoustic Approaches to Audio Steganography

Approaches

•Least-Significant Bit (LSB) Method

•Time Domain Amplitude Modulation

•Psychoacoustic Model from MPEG-1 Layer I

Page 5: Psychoacoustic Approaches to Audio Steganography

Least-Significant Bit

•Prefix message with identifier string.

•Embed 1 bit of the message as every LSB

•Does not require the original audio track to recover the message.

Page 6: Psychoacoustic Approaches to Audio Steganography

LSB System DesignCopy Copy

Header Header &&

Data Data SizeSize

Convert Convert Txt→BiTxt→Bi

nn

Embed Embed IdentifiIdentifier,Len, er,Len,

MsgMsg

Write Write New New Wav Wav FileFile

Extract Extract Length Length

of of MessagMessag

ee

Check Check for for

IdentifiIdentifierer

Extract Extract LSB LSB from from

WavDaWavDatata

ConvertConvertBin→TxBin→Tx

tt

Embed Message

Recover Message

Page 7: Psychoacoustic Approaches to Audio Steganography

Wav File Format

Start Byte Len Name

0 12 RIFF Header

12 24Wav Format Subchunk

36 8Data

Subchunk (ID and Size)

44 * Data

Page 8: Psychoacoustic Approaches to Audio Steganography

LSB Implementation

•Binary conversion using de2bi, bi2de (Communications Toolbox)

•Read bytes into array. Use bitset(A, BIT, V)

•Identifier = 101010102 = 17010

•Extended ASCII ¬ not sign

•ANSI ª Feminine Ordinal Indicator

Page 9: Psychoacoustic Approaches to Audio Steganography

Mono Wav LSB

Page 10: Psychoacoustic Approaches to Audio Steganography

Stereo Wav LSB

Page 11: Psychoacoustic Approaches to Audio Steganography

LSB Results

MonoMono StereoStereo

InputInput

OutputOutput

Page 12: Psychoacoustic Approaches to Audio Steganography

Amplitude Modulation

•Time domain amplitude modulation

•Slice time into blocks using message size

•Embed 1 bit of the message per time slice

•Requires the original audio track to recover the message.

Page 13: Psychoacoustic Approaches to Audio Steganography

AM System DesignCalculaCalcula

te te Block Block SizeSize

Convert Convert Txt→BiTxt→Bi

nn

Slice Slice Time Time

BlocksBlocks

ScaleScaleEach Each SliceSlice

Slice Slice Time Time

BlocksBlocks

CalculaCalculate te

Block Block SizeSize

ComparCompare Mag. e Mag.

ofofSlicesSlices

Convert Convert Bin→TxBin→Tx

tt

Embed Message

Recover Message

Page 14: Psychoacoustic Approaches to Audio Steganography

AM System Design•Binary conv. using Ascii: dec2bin,

bin2dec

•Block size =⎣len(sig)/len(msg)⎦

•Embed: scale slice by 0.99 if ‘1’ or 0.98 if ‘0’

•Recover: check slice is greater than original scaled to 0.98 then ‘1’, else ‘0’

Page 15: Psychoacoustic Approaches to Audio Steganography

Mono Wav AM

Page 16: Psychoacoustic Approaches to Audio Steganography

Stereo Wav AM

Page 17: Psychoacoustic Approaches to Audio Steganography

AM Results

MonoMono StereoStereo

InputInput

OutputOutput

Page 18: Psychoacoustic Approaches to Audio Steganography

MPEG-Based Steganography

•Selective Fourier Domain Amplitude Modulation using Psychoacoustic Models

•Psychoacoustic Models based upon the ISO-MPEG Model 1 Layer I, fs=44.1 kHz

Page 19: Psychoacoustic Approaches to Audio Steganography

MPEG System Design

1.Calculate the power spectrum.

2.Identify the tonal and non-tonal components.

3.Decimate the maskers to eliminate all irrelevant maskers.

4.Compute the individual masking thresholds.

5.Compute the global masking threshold.

6.Determine the minimum masking threshold in each subband.

7.Shape the power of the message below the masking threshold.

Page 20: Psychoacoustic Approaches to Audio Steganography

Demonstration

>> hide(‘my secret’, ‘input.wav’, ‘output.wav’)

>> recover(‘output.wav’)

message=‘my secret’

Page 21: Psychoacoustic Approaches to Audio Steganography

Future Work

•Complete MPEG-based system

•Explore statistical methods for recovery without possession of original file

•Explore non-textual steganography (compute symbols with a radix base)