audio steganography

advertisement
A Comparative Study of Combination
with Different LSB Techniques in MP3
Steganography
Mohammed Salem Atoum
Faculty of Computing, Universiti Teknologi Malaysia
Moh_atoom1979@yahoo.com
Abstract
Steganography hides the existence of the data inside any cover file. There are different file
formats used in steganography like text, image, audio and video. Out of these file formats
audio steganography is followed in this paper .One of the major objective of hiding data
using audio steganography is to hide the data in an audio file, so that the changes in the
intensity of the bits of host must not be detect by human auditory system. The focus of
this paper is on time domain technique i.e. LSB technique of audio steganography.
Method used in the paper hides the data in combination of LSBs instead of hiding the
data in least significant bit. Results are compared by using parameters PSNR, BER and
correlation.
Introduction
The increasing Internet usage stems from the growing availability of the global communication
technology that has led to electronically induced information gathering and distribution. However, the
challenge it presents in terms of information security is enormous. Every Internet user interest lies in
having a secure transaction, communication and information across the transmission link, but in reality,
much communication are infiltrated, jabbed and altered. Information confidentiality was enacted by the
CIA as one of the key principles of a secure communication and if abused attracts penalty. However, many
communications still fall short of achieving a secured information transmission across the global network
(the Internet). The need to secure information within the global network is of paramount importance so
that user information is preserved until it reaches its destination undisclosed.
A lot of sensitive information goes through the Internet on frequent basis. This information could be
military codes, government dealings, and personal data, the route, sender/ receiver, the content of such
information requires that they are protected against hacking and infiltration. Therefore, providing a
secure framework that conceals information content and sender/receiver identity should be an urgent
matter of interest. There are two known approaches to information confidentiality; they are cryptography
and steganography [1]. Cryptography has long existed as the method for securing data; it works with set
of rules that transforms information into unrecognizable format. The rules are used to serve for
authentication purposes, because only the one who knows the rules can decipher the encrypted
information [2]. The advent of steganography provides more security features since the information is
disguised in the sense that the information does not give away its content and identity of sender and
receiver within the communication link. Cryptography and steganography techniques both make use of
Information Institute Conferences, Las Vegas, NV, May 21-23, 2014
1
Atoum
data encryption approach but Cryptography encrypts plainly its secret message thereby making the
content and the user’s details vulnerable to exploitation. Steganography technique protects both
information content and identity of a person’s transmitting the information, whereas only information is
concealed with cryptography [3].
Steganography operates by embedding a secret message which might be a copyright mark, or a covert
communication, or a serial number in a cover such as a video film, an audio recording, or computer code
in such a way that it cannot be accessed by unauthorised person during data exchange. A cover containing
a secret data is known as a Stego-object [3]. After data exchange; it is advisable for both parties (sender
and receiver) to destroy the cover in order to avoid accidental reuse. The basic model of a steganography
system is shown in the Figure1 [4]. The model contains two inputs and two processes, the inputs are a
cover medium and secret message both can be any image, audio, video and so on. Two processes contain
embedding and extracting processes.
Sender sides
Cover
Embedding Process
Stego object
Message
Key
Receiver sides
Stego object
Extracting Process
Message
Key
Figure 1: Basic Model of Steganography
The embedding process is used to hide secret messages inside a cover; the embedding process is
protected by a key if using secret key steganography and public key Steganography types, or without a key
if using pure Steganography type. When using key, only those who possess the secret key can access the
hidden secret message, while the extracting process is applied to a possibly modified carrier and returns
the hidden secret message. Until recently, steganography utilized image files for embedding information
across the Internet network. However recently, its use has been extended to audio steganography. The
usage of audio signal as an embedding platform for information hiding is due to the fact that it has
sophisticated features that allow information hiding, though difficult its robustness counts. In audio
steganography, various signal processing techniques can be utilized to hide information in an audio file in
such a way that it cannot be visually interpreted [5]. This approach has brought about the growing
research interest in the use of digital audio signal for embedding information. The sensitiveness of audio
files to delay presents more challenges to the design objective of steganography. There are three
fundamental properties to the design of steganography. They are: 1) imperceptibility, 2) robustness and
3) capacity. However, there are other properties such as computational time that must be considered
when dealing with different types of applications (information) such as broadcast monitoring applications
in a global network. In most cases it requires real time processing and thereby cannot tolerate any form of
delay [6].
The rest of this paper is organized as follows: A detailed introduction of audio steganography and MP3
file structure, the existing methods for MP3 steganography, then experimental results and conclusion.
2
Editors: Gurpreet Dhillon and Spyridon Samonas
AUDIO STEGANOGRAPHY
The techniques of Steganography were originally developed and used for images. Researchers in the
field then started studying on how the techniques can be used on audio media. Hence, the introduction
and development of the known algorithms for audio steganography was founded. As the known
steganography techniques are mostly used for images there are not many methods for audio steganalysis.
Thus, audio Steganography provides considerably better security [5].
In audio Steganography, many types of file can be used as a cover of steganography such as Waveform
Audio File Format (WAVE, or more commonly known as WAV due to its filename extension) or MPEG1 or MPEG-2 Audio Layer III (MP3). Similarly, secret messages that are embedded can be of secured types
such as text or speech. MP3 is the most popular compression format for digital audio. In steganography,
which uses MP3 as a cover, secret message can be embedded during compression and after compression
[12-13].
This section explains and discusses MP3 file structure, MP3 encoding and MP3 frames header
MP3 file structure
The content of MP3 files depends on the type of encoding used. The common structures of MP3 files
consist of three components, they are Tag, Padding bytes and Frames, and these are shown in Figure 2.
Figure 2: MP3 File Structure
Tags are of two types, the ID3v1 and the ID3v2, and the later usually utilize the end section of the file to
post-pended information. The length of ID3v1 is 128 bytes separated to seven fields which composed of
the artist name, album, song title and genre. Its drawbacks are that it has a static size and also lack
flexibility of implementation. Also, not all MP3 files accept the ID3v1 tagging system. However, its second
ID3v2 presents a more adaptive standard since it is flexible and has a tagging system that pre-pended
information before it is sent [7]. The ID3v2 tags consist of its own frames which are capable of storing
various bits of data, for instance, the standard of character strings such as the artist name, song title or
more advanced information concerning the way the file was programmed are all the data that is
embedded in the signal. The advantages of the ID3v2 tags are that useful hints to the decoder are
provided prior to transmission and that there is no size limit to information capacity provided in its prepending system [8]. The Padding byte provides additional data embedding; the data provided are added
to the frame. Its working principle is that on the event of the encoding, additional data are evenly filled to
the frame; this byte can be found in Constant Bit Rate (CBR) so as to ensure that frames are of the same
size [9].
Information Institute Conferences, Las Vegas, NV, May 21-23, 2014
3
Atoum
MP3 Encoding
MP3 encoding refers to quality enhancer of both compressed sound and the size of compressed sound
file or compression ratio. The three encoding bit rates used by different encoders include the CBR,
Variable Bit Rate (VBR) and Average Bit Rate (ABR).
CBR refers to a standard encoding mechanism used by basic encoders. In this encoding mechanism,
each frame used the same bit rate in the audio data. The bit rate is fixed in the whole of MP3 file, as the
same number of bits is used for each part of the MP3 file. However, the quality of MP3 is variable. These
techniques can be used to predict the size of encoded file and can be calculated by multiplying the bit rate
chosen to encode with the length of a song [10].
VBR is a technique that can keep the quality of audio files during the encoding process. In this
technology the quality of the sound can be specified but the size of the sound file remains unpredictable
[10].
ABR is a mode that uses higher bit rate for the part of music by choosing the encoder adds bits. The
final result showed that the quality is higher than CBR. Moreover, the average file size remains
predictable [10].
RELATED WORKS
Little research's using MP3 as a cover in steganography [14]. Most researchers work in wave
steganography. The following methods explain and discuss the current MP3 steganography methods:
1. M4M method: Bhattacharyya and et al [15] proposed a new method for imperceptible audio data
hiding for an audio file of wav or mp3 format. This approach based on the Mod 16 Method (M16M) [16]
designed for image named Mod 4 Method (M4M) along with a Number Sequence Generator Algorithm to
avoid embedding data in the consecutive indexes of the audio, which will eventually help in avoiding
distortion in the audio quality. The input messages can be in any digital form, and are often treated as a
bit stream. Embedding positions are selected based on some mathematical function which de-ends on the
data value of the digital audio stream. Data embedding is performed by mapping each two bit of the secret
message in each of the seed position, based on the remainder of the intensity value when divided by 4.
Extraction process starts by selecting those seed positions required during embed-ding. At the receiver
side other different reverse operation has been carried out to get back the original information.
2. M16M method: Bhattacharyya and et al [17] proposed a new method for imperceptible audio data
hiding for an audio file of wav or mp3 format. This approach based on the Mod 16 Method (M16M) [16]
designed for image named Mod 16 Method for audio (M16MA) along with a Number Sequence Generator
Algorithm to avoid embedding data in the consecutive indexes of the audio, which will eventually help in
avoiding distortion in the audio quality. The input messages can be in any digital form, and are often
treated as a bit stream. Embedding positions are selected based on some mathematical function which deends on the data value of the digital audio stream. Data embedding is performed by mapping each four bit
of the secret message in each of the seed position, based on the remainder of the intensity value when
divided by 16. Extraction process starts by selecting those seed positions required during embedding. At
the receiver side other different reverse operation has been carried out to get back the original
information.
3. Unused Header Bit Stuffing (UHBS): The MP3 frame headers are made up of fields such as
the private bit, original bit, copyright bit, and emphasis bit but its usage are mostly omitted in some MP3
players. These fields are the important aspect of the frame that aids the interpretation of information
concealed within the audio signal. They can be properly used to embed undisclosed massage by replacing
the bit stream of undisclosed massage through the bits in the field. However, if in the process of replacing
the bit stream with the bit in the field fails, the actual content of the secret message received within the
frame will be lost and that will make the signal recovery more challenging [9]. The work by [18]
4
Editors: Gurpreet Dhillon and Spyridon Samonas
highlighted on the possibility that audio steganography can achieve good capacity and robustness
through the use of 4 bits in each header frame of the audio signal to embed secret messages.
4. Padding Byte Stuffing (PBS): Padding byte stuffing was recently established as one of the
techniques for steganography. Its approach is relatively straightforward in terms of implementation. It
represents fine regular storage capability and has the ability to program 1 byte of information for each
frame as long as padding bytes are accessible. The MP3 file is a given example of the material medium
that can well utilize the padding byte stuffing method because it can allow for hundreds of frames in one
secret message, especially when the filling bytes cannot take any more audio information [18].
5. Embedding in Before All Frames (BAF): BAF was developed by [19]. Their approach embeds
text file to MP3 file. The text file is encrypted by using RSA algorithm to increase the security of
undisclosed secret message. The first frame will be filled with encrypted information. This process is
repeated sequentially until the frame headers are filled. The capacity of about 15 KB is utilized when
encryption algorithm is used otherwise it takes about 30 KB for the MP3 file. Even though there are
chances of the secret message being sniffed, for this approach, its advantages are enormous, for instance,
the method of padding and the unused bit even after the frames must have been filled, provides more
encoding capability.
6. Embedding in Between Frames (BF): [20] Developed steganography technique that
embedded between frames (BF). It also embeds text file to MP3 file like the BAF and encrypts information
in bits format by using RSA algorithm in order to increase the protection of concealed secret messages.
The BF differs from the BAF in the way the text files are inserted into the frames. It does not start with the
first frame it sees but selects the frame of its choice. On the other hand, the capacity of the BF in
comparison to the BAF utilizes the capacity of about 40 MB with encryption algorithm but requires 80
MB on original format. BF likewise provides good capacity for embedding text file in more capacity but it
is still prone to attack. We draw inferences based on the literatures accessed that the method of
embedding information after compression is a challenging task since the embedding process is done after
compression and the text file are located in the unused bit location and not in the audio data. This
technique provides a platform that is prone to attack because the content of the secret message sent can
be easily deciphered by a third party sniffing through the communication link. It also provides only
limited capacity for secret message hiding. However, if the LSB technique is used to insert speech in MP3
file with the use of 2, 3 and 4 bit exchange in audio data (8-bit for sample), the problem of capacity can be
resolve. In addressing the problem of security, the use of key as the lock for concealed secret message is a
foreseeable approach that can achieve maximum security for concealed secret messages.
7. New Secure Scheme in Audio Steganography (SSAS): Atoum et al [21] proposed model
uses Mathematical equation to partition secret message into blocks, and applies permutation equation to
re-order the blocks position, which will change and create new secret message addressing. So, if attackers
detect the Stego object they can’t know the secret message contains. In addition, the proposed model
applied a mathematical model for embedding, and also used map for extracting secret message. All these
techniques increase the security of Stego object and also reduce the probability to attack the secret
message or exchange it.
Literature review shows that the method of embedding information after compression. There are
several methods for embedding secret message after compression namely: M4M, M16M, UHBS, PBS, BF,
BAF and SSAS. The strengths and weaknesses are shown in Table1.
Information Institute Conferences, Las Vegas, NV, May 21-23, 2014
5
Atoum
Table 1 shows the strength and weakness for MP3 methods
Techniques
Author and Year
et al.,
Strength
M4M
Bhattacharyya
2011
M16M
Bhattacharyya, Kundu
and Sanyal, 2011
UHS
PBS
Maciak, Ponniah and
sharma, 2005
Maciak, Ponniah and
sharma, 2005
Zaturenskiy, 2013
BF
Atoum et al., 2011a
 High capacity.
 Simple
BAF
Atoum et al., 2011b
 Low capacity.
SSAS
Atoum et al., 2013
 High capacity
and security
Weakness
 Good capacity
and security but
can be improved.
 Good capacity
and security but
can be improved.
 Simple
 Low imperceptibility and
robustness.
 Simple
 Not all MP3 contains
padding stuffing, just
constant bit rate.
 Low security and capacity.
 Low security.
 Using cryptography.
 Low imperceptibility and
robustness.
 Low security and capacity.
 Low security.
 Using cryptography.
 Don’t have message
integrity checking.
EVALUATION METHODS (STEGANALYSIS):
The evaluation method (steganalysis) aims to analyze a stego-object and detect if this stego-object
contains secret data or exposed to any change or it is a pure cover that has not been manipulated.
Steganalysis methods can be divided into two main groups: active and passive. In passive method, there is
no change in the cover after applying an attack, where the presence or the absence of hidden data is only
considered. While in active method, a modified version can destroy the message or even extract the data
[23].
Steganalysis could be a targeted steganalysis or a blind steganalysis. Targeted steganalysis breaks a
specific known steganography embedding scheme. Blind steganalysis attempts to detect the
steganography presence without a previous knowledge of the used algorithm. Technical approaches are
needed to scan the cover for suspicious properties or detecting hidden messages. Changes in size, file
format, colour palette or last modified timestamp may indicate a hidden message presence, but this is not
always true in all cases. Statistical analysis is one of the common techniques used for scanning image. In
this sub processes discussed and explain four evaluations methods: PSNR, Pearson correlation coefficient
and BER.
Peak signal-to-noise ratio (PSNR) is the ratio between a signal's maximum power and the power of the
signal's noise. Engineers commonly use the PSNR to measure the quality of reconstructed signals that
have been compressed. Signals can have a wide dynamic range, so PSNR is usually expressed in decibels
(db), which is a logarithmic scale. The PSNR block calculates the peak signal-to-noise ratio between two
hosts. This ratio is commonly used for quality measurement between the original cover and Stego object.
The higher PSNR value indicates better quality of the cover [24].
6
Editors: Gurpreet Dhillon and Spyridon Samonas
The most familiar measure of dependence between two quantities is the Pearson correlation coefficient
[26-29], or "Pearson's correlation." It is obtained by dividing the covariance of the two variables by the
product of their standard deviations. Karl Pearson developed the coefficient from a similar but slightly
different idea by Francis Galton. The Pearson correlation is +1 in the case of a perfect positive (increasing)
linear relationship (correlation), -1 in the case of a perfect decreasing (negative) linear relationship (anti
correlation) , and some value between -1 and 1 in all other cases, indicating the degree of linear
dependence between the variables. As it approaches zero there is less of a relationship (closer to
uncorrelated). The closer the coefficient is to either -1 or 1, the stronger the correlation between the
variables. If the variables are independent, Pearson's correlation coefficient is 0, but the converse is not
true because the correlation coefficient detects only linear dependencies between two variables.
The bit error rate or bit error ratio (BER) is the number of bit errors divided by the total number of
transferred bits during a studied time interval. BER is a unit less performance measure often expressed as
a percentage. The bit error probability pe is the expectation value of the BER. The BER can be considered
as an approximate estimate of the bit error probability. This estimate is accurate for a long time interval
and a high number of bit errors [30].
In telecommunication transmission, the BER is the percentage of bits that have errors relative to the
total number of bits received in a transmission, usually expressed as ten to a negative power. For example,
a transmission might have a BER of 10 to the minus 6, meaning that, out of 1,000,000 bits transmitted,
one bit was in error. The BER is an indication of how often data has to be retransmitted because of an
error. Too high a BER may indicate that a slower Data Rate would actually improve overall transmission
time for a given amount of transmitted data since the BER might be reduced, lowering the number of
packets that had to be resent [31].
EXPERIMENTAL RESULTS
The dataset will be used for analysis shown in the Table 2, we will use different size for cover audio file
and using 100KB for secret message size to evaluate all methods.
Table 2 Data Set
Name of genre
Time
Size
(Minute)
(MB)
Pop
4:00
2.75
rock
4:33
3.13
Blues
4:41
3.22
Hip-hop
5:27
3.74
Dance
6:12
4.26
Metal
6:28
4.40
According to the Table.3 below the results for SSAS methods is better than other methods results, this
because the method using scrambling techniques to prepare the secret message before embedding and
using randomly first byte chosen to begin embedding secret message. In addition, using different jump
equations to jump from previous byte was used to embed into next byte should be used to embed.
However, SSAS method is applying message integrity to check the secret message was altered after
extraction. Thus, other methods avoid this checking. UHBS, PBS and BAF are stopped to embed because
the capacity for the secret message is 100KB.Figure 3 and 4 shows the PSNR and BER results for Table.3
Information Institute Conferences, Las Vegas, NV, May 21-23, 2014
7
Atoum
Table 3 Experimental results
Genre name
Methods
M4M
M16M
BF
SSAS
Pop
PSNR
63.035
53.569
48.212
68.117
Corr
0.9949
0.9949
0.9199
1.000
BER
0.0132
0.0098
0.0212
0.0032
PSNR
63.601
50.184
48.650
68.794
Corr
0.9949
0.9949
0.9199
1.000
BER
0.0112
0.0091
0.0198
0.0029
PSNR
63.708
0.232
49.806
68.830
Corr
0.9969
0.9969
0.9398
1.000
BER
0.0092
0.0081
0.0175
0.0027
PSNR
64.390
51.019
49.3759
69.425
Corr
0.9979
0.9979
0.9398
1.000
BER
0.0091
0.0074
0.0169
0.0017
PSNR
64.986
51.523
49.651
70.050
Corr
0.9997
0.9997
0.9449
1.000
BER
0.0087
0.0070
0.0145
0.0015
PSNR
65.117
1.667
49.748
70.142
Corr
0.9997
0.9997
0.9454
1.000
BER
0.0081
0.0067
0.0142
0.0011
Rock
Blues
Hip-hop
Dance
Metal
Figure 3: PSNR Results
8
Editors: Gurpreet Dhillon and Spyridon Samonas
Figure 4: Bit Error Rate results
Conclusion
This paper concluded the comparison between different methods which that using MP3 steganography
techniques. The experimental results show that the SSAS method result is better than other methods
results. A test is made on various MP3 files which include different size and time. Different measurement
methods are used to evaluate the methods. PSNR, BER and correlation are three critical factors to
evaluate the methods. In the future, we can also extend SSAS method to add authentication code to prove
the secret message is sent by the right person.
REFERENCES
[1] Lentij J. (2000), Steganographic Methods, Department Of Control Engineering And Information
Technology, Budapest University. Periodica Poltechnica Ser. El. Eng. Vol.44, No. 3–4, P. 249–258.
[2] Katzenbeisser S., Peticotas F. (2000), Information Hiding Techniques For Steganography And Digital
Watermarking, Artech House Inc.
[3] Petitcolas F.A, Anderson R.J., Kuhn M.G. (1999), Information Hiding – A Survey, IEEE, Special Issue
On Protection Of Multimedia Content: 1062-1078.
[4] Cacciaguerra S., Ferretti S.(2002), Data Hiding: Steganography And Copyright Marking, Department
Of Computer Science, University Of Bologna, Italy.
[5] Nedeljko C. (2004). Algorithms for Audio Watermarking and Steganography. Acta Universitatis
Ouluensis. Series C.
[6] Andres G. (2002). Measuring and Evaluating Digital Watermarks in Audio files. Washington Dc.
[7] Supurovic P. (1998), MPEG Audio Compression Basics.
[8] M. Nilsson (2000), ID3 Tag Version 2.4.0 - Main Structure.
[9] L. Maciak And M. Ponniah And R. Sharma (2005), MP3 Steganography.
[10]Strnad Peter, Gingold Peter (1998), Lyrics3 Tag V2.00.
[11] M. Nilsson (2000), The Private Life Of MP3 Frames.
[12] Chan, P. (2011). Secret Sharing in Audio Steganography. Industrial Research.
[13] Deng, K., Tian, Y., Yu, X., Niu, X., Yang, Y., & Technology, S. (2010). Steganalysis of the MP3
Steganographic Algorithm Based on Huffman Coding. Test, (1), 79-82.
[14] Atoum, M. S., Ibrahim, S., Sulong,G. & Ahmed, A. (2012). MP3 Steganography: Review. Journal of
Computer Science issues, 9(6).
[15] Bhattacharyya, S., Kundu, A., Chakraborty, K., & Sanyal, G. (2011). Audio Steganography Using Mod
4 Method. Computing, 3(8), 30-38.
[16] Arko Kundu, Kaushik Chakraborty and Souvik Bhattacha-ryya (2011),Data Hiding in Images Using
Mod 16 Method, In the Proceedings of ETECE.
[17] Bhattacharyya, S, A Novel Audio Steganography Technique by M16MA (2011). International Journal,
30(8), 26-34.
[18] Mikhail Zaturenskiy (2009), Behind The Music: MP3 steganography.
[19] Atoum, M. S., Rababah, O. A. A.-, & Al-attili, A. I. (2011). New Technique for Hiding Data in Audio
File. Journal of Computer Science, 11(4), 173-177.
[20] Atoum, M. S., Suleiman, M., Rababaa, A., Ibrahim, S., & Ahmed, A. (2011). A Steganography Method
Based on Hiding secrete data in MPEG / Audio Layer III. Journal of Computer Science, 11(5), 184-188.
Information Institute Conferences, Las Vegas, NV, May 21-23, 2014
9
Atoum
[21] Atoum, M. S., Ibrahim, S., Sulong, G., & Ahmed, A. (2013).New Secure Scheme in Audio
Steganography (SSAS). Australian Journal of Basic and Applied Sciences, 7(6), 250–256.
[22] Atoum, M. S., Ibrahim, S., Sulong, G., & Zamani.M. (2014). A New Scheme for Audio Steganography
Using Message Integrity, Journal of Convergence Information Technology, 8(14), 35-44.
[23] Curran, K. and Devitt, J. M. (2008). Image Analysis for Online Dynamic Steganography Detection.
Computer and Information Science, 1(3), 32-42.
[24] Shirali S., Manzuri-Shalmani M.T. (2007). Adaptive Wavelet Domain Audio Steganography with
High Capacity and Low Error Rate. International Conference on Information and Emerging Technologies.
25-29.
[25] Shih, F. Y. and Edupuganti, V. G. (2009). A Differential Evolution Based Algorithm for Breaking the
Visual Steganalytic System. Soft Computing. Volume (13), 345-353.
[26] S. Dowdy and S. Wearden (1983), Statistics for research. Wiley.ISBN 0471086029, page 230,
[27] M. A. Jaro (1989), Advances in record linking methodology as applied to the 1985 census of tampa
florida. Journal of the American Statistical Society. 84:414–420.
[28] M. A. Jaro (1995), Probabilistic linkage of large public health data file. Statistics in Medicine 14 (57)., pages 491–498.
[29] W. E. Winkler (1999), The state of record linkage and current research problems. Statistics of Income
Division, Internal Revenue Service Publication R99/04.
[30] Harsh V., Ramanpreet K., Raman K. (2009). Random Sample Audio Watermarking Algorithm for
Compressed Wave Files. International Journal of Computer Science and Network Security, Volume (9).
[31] Andres G. (2002). Measuring and Evaluating Digital Watermarks in Audio Files. Washington DC.
10
Editors: Gurpreet Dhillon and Spyridon Samonas
Download