Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Asheesh Kumar Dwivedi, Mr. Neeraj Kumar
DOI Link: https://doi.org/10.22214/ijraset.2023.52343
Certificate: View Certificate
This paper outlines an audio encryption method that is used during audio compression. Security for the multimedia data is provided by encryption methods. Here, audio encryption is a method used to communicate secret information by subtly altering an audio stream. It is a technique that guarantees secure data transfer between parties that often interact online. Here, we offer a fresh method for dealing with issues raised by audio encryption\'s substitution mechanism. We employ an enhanced RSA encryption technique, which is incredibly difficult to crack, to encrypt messages in the first level of protection. The encrypted message bits are embedded into random LSB layers to boost robustness against purposeful assaults, in which the hackers constantly attempt to reveal the hidden message, as well as some inadvertent attacks, like noise addition. Here, GA operators are utilised to lessen distortion. The major goal of this work is to propose a good, effective way for hiding data from hackers and sending it to the target in a safer manner by maintaining randomization in message bit insertion into audio data.
I. INTRODUCTION
The Internet's current rapid advancement and the revolution in digital information have had a significant impact on culture as a whole. In today's communication systems, Data Hiding is crucial for issues with Network Security. Numerous audio applications, including voice search and assistance on the internet, voice-activated websites, and internet telephony, have also been aided by the internet. Another global interest is music, which can be heard by listeners through audio files or online radio broadcasts. (apart from conventional radio and television). The amount of audio traffic on the internet is rapidly rising. Thus, using audio as a cover material for data concealing is pretty obvious. WAV (Windows Audio Visual), AIFF (Audio Interchange File Format), log scale 8bit mlaw, and MP3 are common audio formats used online. (Motion Picture Experts Group Layer III). The supported data rates range from 8 kbps to 44.1 kbps. Techniques for masking audio rely on the limitations of the human auditory system. (HAS).
Today, it's common practise to cloak information in audio. Anytime you wish to hide data, you can utilise audio data hiding. There are several reasons to hide data, but the main one is to stop people from finding out that a message even exists. One of the simplest algorithms with a very fast data rate of additional information is data hiding in the least significant bits (LSBs) of audio samples in the temporal domain. We will discuss broad data hiding principles, fundamental terminology, an overview of applications, and methodologies in this project.
We will focus on data hiding inside audio signals, fundamental needs, and cutting-edge methods. We'll outline a cutting-edge method with numerous versions. Perfect transparency, resilience, high bit rate, minimal processing load, and, most importantly, great security are all characteristics of the suggested solution.
Cryptography is the study of information concealment. Information must always be protected when communicating over an unreliable medium like the internet, and cryptography is crucial to this process. Today, cryptography draws on concepts from a variety of academic fields, including computer science and mathematics. Steganography is the art of creating communications that are hidden from everyone but the sender and recipient. The communication does not draw unwanted attention because only the sender and the recipient are aware of its existence. When communicating across an unreliable channel, such as the internet, where information needs to be secured from other third parties, cryptography is utilised. Cryptography is the study of concealing information. Steganography is the art of creating communications that are hidden from everyone but the sender and recipient. The communication does not draw unwanted attention because only the sender and the recipient are aware of its existence. Steganography was utilised in the past, and these earlier techniques are known as Physical Steganography.
The following formula provides a very generic description of the pieces of the steganographic process:
Cover medium + hidden data + stego key = stego medium
To carry secret communications, a variety of cover objects (signals) might be utilised. Audio masking, a flaw in the human auditory system, is used to hide data in audio communications. Depending on the spectral and temporal properties of both the masked signal and the masker, a weaker signal may not be detectable in the presence of a louder signal (the masker). In-depth research has been done on masking models for perceptual compression of audio streams. In a data hiding application, the encoded signal is concealed there, whereas in perceptual compression, the quantization noise is hidden below the masking threshold.
Due to the human auditory system's vast dynamic range, data hiding in audio signals is particularly difficult. The human hearing system can distinguish sounds with powers greater than 1 billion to 1 and frequencies greater than 1000 to 1.
The parity coding method is one of the earlier works in audio data concealment. The parity coding technique divides a signal into regions of samples as opposed to individual samples, and each bit from the secret message is encoded in a sample region's parity bit. The method flips the LSB of one of the samples in the region if the parity bit of a chosen region does not match the secret bit to be encoded. As a result, the sender has more control over how to encode the secret bit, and the signal can be altered in a less obvious way. The process for parity coding is depicted in Figure 2.3.1.
The phase of an initial audio segment is replaced with a reference phase that represents the data in the phase coding method. The relative phase between segments is maintained by adjusting the phase of succeeding segments. When it is possible, phase coding is one of the coding techniques with the highest signal-to-perceived noise ratios. There will be audible phase dispersion if the phase relationship between each frequency component is drastically altered. However, an inaudible coding can be achieved as long as the phase modification is sufficiently small (sufficiently small depends on the observer; experts in broadcast radio can discover adjustments that are unperceptible to an average observer). Phase coding is based on the idea that noise is more detectable to the human ear than the phase components of sound. The method achieves an inaudible encoding in terms of signal-to-perceived noise ratio by encoding the message bits as phase changes in the phase spectrum of a digital signal as opposed to adding disturbances.
II. REVIEW OF LITERATURE
Dutta, Hrishikesh et al. (2019) Steganography is used to conceal messages over digital media, such as speech, image, or video. Audio signals are used as covers due to their larger size and higher redundancy. This work reviews different techniques, algorithms and principles, and provides a compendium to digital audio steganography.
Nour Alaa (2021) Digital image watermarking is used for copyright protection and authentication, but this paper proposes an LSB-based digital watermarking scheme for fact-checking and fake news inquiry.
Gupta Sumeet, Dhanda Dr. Namrata (2019) Steganography is an art and science of communicating in a way that hides the existence of the communication, using a "cover" of a message to form a stego-signal. The main goal is to communicate securely in a completely undetectable manner and avoid suspicion. If a Steganography method causes someone to suspect there is secret information, then the method has failed.
Haleem, Alyaa & Mohammed, Nadia. (2019) PixInWav proposes a novel residual architecture for hiding images in audio, allowing independent encoding of the hidden image from the host audio without compromising quality.
Zhang et al. (2021) AEOLUS is a security overlay that proactively embeds a dynamic acoustic nonce at the time of user interaction and detects the presence of the embedded nonce in the recorded speech to ensure freshness. Experimental results show that AEOLUS yields 0.5% FRR at 0% FAR for speech re-use prevention upto a distance of 4 meters, and a user study with 120 participants shows that the acoustic nonce does not degrade overall user experience for 94.16% of speech samples.
B. LSB Coding
An audio file with the ".wav" extension has been chosen as the host file for the current project. It is assumed that the least important parts of that file can be changed without the sound quality suffering.
To do it, one must first be familiar with the audio file's file structure. The header and the data are the two main components of all files, including WAV files. The header is found in the first 44 bytes of standard wav files. The file's remaining bytes, with the exception of the first 44, are entirely made up of data. The information is basically a single, enormous collection of audio samples. The header portion cannot be handled while embedding data. This is so that an audio file can become corrupted with only a small alteration to the header section.
The audio file can be read bit by bit by a program, which then stores the information in a new file. The first 44 bytes shouldn't be altered in any way because they include the header section's data.
Start by modifying the remaining data fields so that text can be embedded. For instance, to embed the word "Audio" inside an audio file, one must include the word's binary values in the audio data field.
C. Consider the Following Table
One can conclude from the table that in order to embed the term "Audio" into the host audio file, the appropriate eight bit binary values must really be embedded into the audio file's data field.
Each sample of the file has had numerous bits altered or updated to include text data in order to construct this technique. Additionally, it has been noted that the host audio file degrades after bits are changed. Different methods were used to modify the bits, such as changing 1, 2, 3, and 4 bits sequentially. But after undergoing all the modifications, it was found that a single bit adjustment in the LSB produced the best results.
TABLE I
Letters with ASCII Values and Corresponding Binary Values
Letter |
ASCII Value |
Corresponding Binary Value |
A |
065 |
01000001 |
U |
117 |
01110101 |
D |
100 |
01100100 |
I |
105 |
01101001 |
O |
111 |
01101111 |
D. Steps (For Embedding of Data)
For this test, the audio file "audio.wav" has been chosen. The first 44 samples were left unchanged after each sample's binary values were checked. After the header section, the data embedding with LSB alteration has begun. If the 45th sample is used as the starting point for the data embedding procedure, the 45th sample's LSB value needs to be changed. If the associated sample's binary value is "01110100," "1" needs to be changed. Table I shows that the sender must embed the binary value "01000001" in order to embed the letter "A". Because of this, "A" should be embedded in accordance with Table II, according to the embedding method.
TABLE II
Samples of Audio File with Binary Values before and after Embedding
Sample No. |
Binary values of corresponding sample |
Binary value to be embedded |
Binary values after modification |
46 |
01110100 |
0 |
01110100 |
48 |
01011110 |
1 |
01011111 |
50 |
10001011 |
0 |
10001010 |
52 |
01111011 |
0 |
01111010 |
54 |
10100010 |
0 |
10100010 |
56 |
00110010 |
0 |
00110010 |
58 |
11101110 |
0 |
11101110 |
60 |
01011100 |
1 |
01011101 |
Take the 46th bit as a starting point, examine the least important bit, and then queue it up. Verify each alternative sample to get all of the messages. similar to 48th, 50th, 52nd, and so forth. Alternate samples' least significant bits are stored in the queue with the previous bit's value shifted to the left. To get the ASCII from which the text can be extracted, convert the binary numbers to decimal. The following table provides a more detailed representation of the entire retrieval procedure.
TABLE III
Extraction of Data from Audio File
Sample No |
Binary values with embedded secret data |
Bits that are stored in the queue |
46 |
01110100 |
0 |
48 |
01011111 |
01 |
50 |
10001010 |
010 |
52 |
01111010 |
0100 |
54 |
10100010 |
01000 |
56 |
00110010 |
010000 |
58 |
11101110 |
0100000 |
60 |
01011101 |
01000001 |
Because the letter "A"'s" embedding process was described in Table II, its retrieval process is shown in Table III. Every alternate sample has been examined since the 46th sample, and the least significant bit has been queued up with the prior bit's left shift. Once all the bits have been received, begin at the left side, take the first eight, convert them to decimal equivalents to obtain ASCII, and then pull the embedded text message from ASCII. The chart makes it apparent that after receiving the number 01000001 in the queue, it is translated into its equivalent decimal, which is 60, the ASCII character for "A." So, "A" is found.
The next letters were likewise located in the same manner, resulting in the whole word "Audio."
IV. IMPLEMENTATION
A. Algorithm for Encrypting
B. Algorithm for Decryption
C. Development on MATLAB
Step:1
Guide: Graphical User Interface Tools.
D. Explanation of the above set of code
Step: 3
Encryption:
H. Advantages
Audio based Steganography has the potential to conceal more information:
The flexibility of audio Steganography is makes it very potentially powerful :
Another aspect of audio Steganography that makes it so attractive is its ability to combine with existing cryptography technologies.
Many sources and types makes statistical analysis more difficult :
I. Disadvantages
Phase coding, spread spectrum, and echo hiding are a few of the common methods for data concealing in audio files that are examined in this research. Additionally, it assesses the viability of audio steganography, which presents promising opportunities for commercial data concealment. Steganographic elements could be incorporated into camera firmware by digital camera manufacturers to annotate images with the photographer\'s copyright information. Steganography can help with copyright marking, which can help to mitigate piracy. The goal of current steganography research is to develop other platforms via which information can be concealed. One intriguing concept is to use a distinct steganographic channel in a network to deliver messages. However, it can be challenging to identify the one platform that is optimal for sending covert communications.
[1] LOU D.C., LIU J.L., LI C.-T.: ‘Digital SignatureBased Image Authentication’, in LU C.S. (EDS.): ‘Multimedia security: steganography and digital Watermarking techniques for protection of intellectual property’ (Idea Group Inc., 2003). [2] SEITZ J.: ‘Digital watermarking for digital media’ (Idea Group Publishing, 2005), Ch. 2. [3] SCHNEIDER M., CHANG S.-F.: ‘A content based digital signature for image authentication’. Proc. IEEE Int. Conf.Image Processing (ICIP’96), 1996, pp. 227–230. [4] FRIDRISH J., BALDOZA A.C., SIMARED R.J.: ‘Robust digital watermarking based on key dependent basis functions’. Proc. Int. Conf. LNCS:IH, Portland, OR, USA, April 1998, vol. 1525, pp. 143–157. [5] LU C.S.: ‘On the security of structural information extraction/embedding for image authentication’. Proc. IEEE ISCAS’04, 2004, pp. 169–172. [6] ANTHONY T., HO S., YONG L.G.: ‘Image content authentication using pinned sine transform’, EURASIP J. Appl. Signal Process., 2004, 14, pp. 2174–2184. [7] SUN Q., HE D., YE S.: ‘Feature selection for semi fragile signature based authentication systems’. Proc. IEEE Workshop on Image Signal Processing, 2003, pp. 99–103. [8] SUN Q., YE S., LIN C.-Y.: ‘A crypto signature scheme for image authentication over wireless channel’, Int. J. Image Graph., 2005, 5, (1), pp. 1–14. [9] PETER M., UHL M.: ‘Watermark security via wavelet filter parametrization’. Proc. Int. Conf. ICASSP, USA, 2000. [10] Dutta, Hrishikesh & Das, Rohan & Nandi, Sukumar & Prasanna, S.. (2019). An Overview of Digital Audio Steganography. IETE Technical Review. 37. 1-19. 10.1080/02564602.2019.1699454. [11] Nour Alaa (2021) “Viral ‘fake news’ lists and the limitations of labeling and fact-checking” Fake News [Preprint]. Available at: https://doi.org/10.7551/mitpress/11807.003.0039. [12] Gupta Sumeet, Dhanda Dr. Namrata (2019). Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT). IOSR Journal of Computer Engineering (IOSR-JCE), Volume 17, Issue 2, PP 32-44 Haleem, Alyaa & Mohammed, Nadia. (2019). Digital Information Hiding Techniques ?. 10.33899/csmj.2010.163916.???? [13] Zhang, Yangyong & Shirvanian, Maliheh & Arora, Sunpreet & Huang, Jianwei & Gu, Guofei. (2021). Practical Speech Re-use Prevention in Voice-driven Services.
Copyright © 2023 Asheesh Kumar Dwivedi, Mr. Neeraj Kumar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET52343
Publish Date : 2023-05-16
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here