Documents

Design And Development Of Embedded System Based Multimedia Steganography

Description
Steganography is a method of hiding sent messages in the cover media in all types of multimedia data formats such as audio, image etc., In this project we deal with Audio Steganography in which the data can be sent without any suspension. Our embedded system uses ARM9 micro controller which is 32 bit controller. The main aim of this project is to transfer a hidden data through audio files safely without being visible to others. Here by using this technique the data can be sent through the audio files without being visible by encrypting and decrypting the data. In order to encrypt and decrypt the data we use the Polynomial Method. Polynomial Method is used for public key encryption and it is used to transfer data secure. We use Steganography for security purpose. By using Steganography the hidden media file can be sent very accurately and very fast from the sender to the receiver. There are many techniques based on Steganography. In this paper we use the least significant Bit Steganography. It is one of the techniques in which the least significant bit is replaced by a data bit. We use MATLAB for coding purpose and implementing it on 32 bit micro controller.
Categories
Published
of 4
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Share
Transcript
  International Journal of Scientific Research and Engineering Studies (IJSRES) Volume 1 Issue 3, September 2014 ISSN: 2349-8862 www.ijsres.com Page 55 Design And Development Of Embedded System Based Multimedia Steganography N. Spandana E.C.E.(M.N.E.) M.I.T.S. Madanapalli, India Mr. M. Jagadeesh Babu Associate Professor, E.C.E. M.I.T.S. Abstract: Steganography is a method of hiding sent messages in the cover media in all types of multimedia data formats such as audio, image etc., In this project we deal with Audio Steganography in which the data can be sent without any suspension. Our embedded system uses ARM9 micro controller which is 32 bit controller. The main aim of this project is to transfer a hidden data through audio files safely without being visible to others. Here by using this technique the data can be sent through the audio files without being visible by encrypting and decrypting the data. In order to encrypt and decrypt the data we use the Polynomial Method. Polynomial Method is used for public key encryption and it is used to transfer data secure. We use Steganography for security purpose. By using Steganography the hidden media file can be sent very accurately and very fast from the sender to the receiver. There are many techniques based on Steganography. In this paper we use the least significant Bit Steganography. It is one of the techniques in which the least significant bit is replaced by a data bit. We use MATLAB for coding purpose and implementing it on 32 bit micro controller. Keywords:- Steganography, Least significant Bit, Data hiding. I.   INTRODUCTION A.   STEGANOGRAPHY The process of hiding a message, an image, or a file in any media is known as Stganography. Here the media may be either a plain text, an audio, or a video. The word Steganography is derived from an Ancient Greek words STEGANO and GRAPHIA. The word STEGANO means “covered” and GRAPHIA means “writing”. Johannes Trithemius was the first person to use this term. He used this term first in his book known as Steganographia, which is a thesis on Steganography as well as Cryptography. Basically the messages that are hidden will appear either on images, audio, or any cover text. Some of the achievements on Steganography that do not have the type of security through irrelevance, while the schemes of Steganography that are key- dependent bond on to The Kerckhoff’s principle. The main  plus of Steganography than cryptography is “the secret message that is proposed does not magnetize the curiosity to itself as a purpose of analysis. The unbreakable noticeable messages provoke interest and convict in the places where ever the encryption is illicit. However the cryptography is a  process of defending the filling of the point and Sreganography is alarmed with the reality of hiding as the message is sent secretly along with hiding the contents of the message. The process of Steganography is shown below.  Figure 1: Steganographic process B.   AUDIO STEGANOGRAPHY In this work we deal with Audio Steganography. in this  process a message is hidden secretly in the audio. Generally in Steganography cover media is used to hide the message. Here in this case of Audio Steganography, the cover media is used to hide the message and this message is known as encrypted message. This encrypted message is based on either the public Cover media Secret message Stego system encoder Security key Cover media Stego system decoder Secret message channel  International Journal of Scientific Research and Engineering Studies (IJSRES) Volume 1 Issue 3, September 2014 ISSN: 2349-8862 www.ijsres.com Page 56 key or private key encryption algorithms. This two algorithms can be differentiated in an easiest way that is to remember the secrecy of message not only the contents but also the simple existence of the message. The figure below shows the generic Audio Steganographic System.  Figure 2: Generic Audio Steganographic System   II.   OBJECTIVE OF THE PROJECT The main aim of this project is to design a Steganography system for audio files. This is a fine art of of hiding either a text or an image or file in the other message, image or file. Here a PC is used to check the output. In the output, that appears on the screen there will be the secret message which is hidden. And in order to perform the whole operation Embedded systems is used. And the hardware that is used is Raspberry pi board and the software tool used is Qt. The operating systems that is used is Linux. These are all used in the overall performance of the process. The main aim of this  project is to send the message through the audio files secretly. And in order to encrypt or decrypt the file a key is used. III.   HARDWARE SUPPORT Basically Linux supports different types of hardware  platforms and devices. This is known as Hardware support. But up to now many number of vendors have not provided linux drivers. Because of this an outside progress is generated,  but still a more progress is required. This is generated since a number of drivers are executed and maintained by linux community. Due to this that all the hardware components can  be used with poise without fear as that any one the day the vendor may stop the driver support for the product line. Linux also supports a number of hardware architectures. No other Operating systems provide this level of probability other than this. Typical architecture of an embedded linux system is shown below.  Figure 3: Typical structure of an embedded Linux system IV.   BASIC HARDWARE SETUP OF A RASPBERRY PI  Figure 4: Raspberry pi Board Raspberry pi was developed by Raspberry pi foundation in the UK with the zeal of providing the teaching of basic computer science in educational institutions. This raspberry pi  board is a credit card sized single board computer. It was manufactured in two board configurations by licensed manufactured deals along with RS components, Egoman and SECR ET DA    EMBEDD AND K EY SECR ET DA EMBEDD AND NET WOR K APPLICATIONS   LIBRARIES  Linux kernel    HIGH LEVEL ABSTRACTIONS FILE NETWORK SYSTEMS PROTOCOLS LOW-LEVEL INTERFACE HARDWARE  International Journal of Scientific Research and Engineering Studies (IJSRES) Volume 1 Issue 3, September 2014 ISSN: 2349-8862 www.ijsres.com Page 57  Network element 14 (PremierFarnell). These three companies sell Raspberrypionline. V.   WORKING PRINCIPLE OF THE PROJECT In this section the complete description is given on the  proposed system architecture. Here a Raspberry Pi board is used as platform. Once all the devices are connected successfully, then power up the device. And if once the device is power up then the device starts booting from the flash, first it loads the linux to the device and then initialize all the drivers and the core kernel. After the kernel is initialized, it first checks whether all the devices are working properly or not. Then after it loads the file system and starts the startup scripts for running necessary processes and daemons. Then finally it starts the main application. When the application starts running it first checks all the devices and resources that it needs are available or not. Then after it checks the connection with the devices and provides control to the user.    The GUI that is used for the encryption has the following options:    Cover the button for loading the COVER file from the USB file browser.    Secret button for loading the secret file (that is to be hidden) from the USB file browser.    Password field for entering the secret key of 8-characters.    Output field for giving the result file name.    Stegano push button for embedding the data.    The embedding algorithm almost works as follows:    The Graphical User Interface for the decryption has the next alternatives.    Browse button for giving path of encrypted file.    Encrypted file field for loading file name.    Password field for entering the secret key of 8-characters.    Decrypt button for decrypting the hidden data. On hiding the data file we need to go for encryption GUI application. Click on the cover button in order to give the cover data (visible data of .wav, .png and .jpg) format. Then click on the secret button to load the data that is to be hidden into the cover file. Give the secret key of (8-char) and executable name in next field.  Now then by clicking on the Stegano button, the secret file will be inserted into the cover data with AES algorithm and the result will be stored as the output file name. As well as for the decryption of the data, there is a need to mention the encrypted file name and provide the eight character key mentioned for the file. Then after that by clicking on the decrypt button, the secret file will be extracted to USB path. In this way we are implementing Audio and Image Steganography system. The experimental setup of the project is shown below. he pictorial representation of the step by step procedure that appears on the screen of the PC is shown below. A text file of 11945 bytes is embedded into an audio file of 2079526 bytes and the result is shown below. VI.   CONCLUSION The project “ AUDIO STEGANOGRAPHY ”  has been successfully designed and tested. It has been developed by integrating features of all the hardware components and software used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit. Secondly, using highly advanced ARM11 board  International Journal of Scientific Research and Engineering Studies (IJSRES) Volume 1 Issue 3, September 2014 ISSN: 2349-8862 www.ijsres.com Page 58 (Raspberry Pi) and with the help of growing technology the  project has been successfully implemented. REFERENCES [1]  Neil F.Johnson, Sushil Jajodia, “Exploring Steganography; Seeing the Unseen”, Computer, vo l.31, no 2,pp. 26-34, feb.1998. [2] R.Chandramouli, Nasir Memon, “Analysis of LSB Based Image Steganography Techniques” Proc. IEEE ICIP 2001  pp 1019-1022. [3] Li Zhi Sui Ai Fen , “Detection of Random LSB Image Steganography Techniques” proc. IEEE 2004 pp 2113 -2117. [4] Nedeljko Cvejic, Algorithms for audio watermaking and Steganography, Oulu University Press, Oulu 2004, pp.40-42. [5] Ali Al-Haj, Ahmad Mohammadand Lama Bata, DWT-Based Audio watermarking, The International Arab  journal of information technology, vol.8, No.3, july 2011,  pp.326-333. [6] I.J.Cox, M.L.miller, J.A.Bloom, J.Fridricand “Digital water marking and Steganography”, 2 nd  edition, Morgan Kaufmann, 2008, pp.31. [7] Y.K.Lee, L.H.Chen, High capacity image Steganography model, proc.Inst.Elect.Eng. Vis. Image, Signal Processing 147 (3) (2000). Pp.288-294.
Search
Tags
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks
SAVE OUR EARTH

We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

More details...

Sign Now!

We are very appreciated for your Prompt Action!

x