WWW.BOOK.DISLIB.INFO
FREE ELECTRONIC LIBRARY - Books, dissertations, abstract
 
<< HOME
CONTACTS



Pages:   || 2 |

«HIDING DATA INTO THE JPEG/MP3FILE USING SBR ALGORITHM Ashwini Palimkar, 2Prof.Dr.S.H.Patil M.Tech Scholar, 2Professor, Department of CSE, Bharati ...»

-- [ Page 1 ] --

International Journal of Advanced Technology in Engineering and Science www.ijates.com

ISSN (online): 2348 – 7550

Volume No.02, Issue No. 07, July 2014

HIDING DATA INTO THE JPEG/MP3FILE USING SBR

ALGORITHM

Ashwini Palimkar, 2Prof.Dr.S.H.Patil

M.Tech Scholar, 2Professor,

Department of CSE, Bharati Vidyapeeth University COE, Pune, Maharashtra, (India)

ABSTRACT

This paper contains concept of data leakage, in every organizations, now a day’s data leakage is a critical issue facing everyone. The Information within an organization rises significantly each year which might be a point where it would be difficult to manage, resulting in data leakages.

Data leakage is also known as information leakage, when the highly sensitive data is leaked intentionally or unintentionally to unauthorized (users) parties. The information leaked out is either personal in nature or most confidential. In this case we have used Audio Steganography and image Steganography, to prevent the information leakage.

Information embedding is the beautiful way of hiding information for different formats such as, for maintaining crucial data, secure sensitive information. Standard method is the Steganography; Steganography used in digital categories as embedding file in the multimedia form, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in SD for encoding extra information in an image file by denoting tiny modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used as compared to existing algorithm as to give more security as well as to increase the robustness of data leakage detection system. and protect the data against the external disturbances as compression filter, noise..[Using SBR Algorithm For more protection to the data bits a Stegno-Key has been used to permute the message bits before embedding it. An experimental result of the proposed method shows that this system helps to successfully hide the secret data into the image file as jpeg and audio file with minimum distortion made to the image file and audio file.

We study the concept as “Our goal is to detect when the Owner’s confidential (Sensitive) data have been leaked by users, and if possible to detect the user that leaked the data”.

Keywords: Steganography, Embedding Data, SBR Algorithm, Least Significant Bit, mp3&jpeg file.

275 | P a g e International Journal of Advanced Technology in Engineering and Science www.ijates.com

–  –  –

Information Leakage is a very serious threat facing several companies and organizations. Whether discovered by malicious attackers, unaware attacks, information loosed can damage a organization’s status, reduce reputation value, and damage the organizations friendly feeling value and reputation. If any organization is doing the business in outsourcing for data processing, they have to share their data with the third person. The biggest threat is not the probably external third person not malicious person but unaware third person inadvertently divulging crucial information because more form of the data handling are being utilized within organization.

Data leakage is the transfer of some private data within an organization from user (unauthorized) to an external third person; this can be doing as using electronic concept or a physical method. In the new world of growing communication it is very important to transmit the information in a very secure manner, so that the confidential or personal information should not be leaked to third unauthorized person or party. The technique to hide the information within a system is called as steganography in simple way it is nothing but “covered writing”.

It is very interesting to see how steganographic technique operates. Mainly replacing the information bits which are not used for various non visible data. The embedded data may be in various formats such as Even image, coding words (cipher txt) or also may be plane text format.

Steganography can be used in various digital records or data such as audio program, text program, video program & various images. With the help of steganography we can hide the quantum no of information because of its. low visibility factor & higher capacity to transfer the data safely to the correct person without any obstruction.

There are various algorithms in steganography for different data images frame formats.

LSB stands for least significant bit,this program technique is used to hide large number of information in to an image form, In this case the message is replaced by least significant bit pixels. It is the most effective way to send the information easily & also in very short period of time Steganography method uses basic terms are as, the carrier as cover image, the secret data as message, and the stegano key. The carriers such as a digital image, an mp3, or TCP/IP packet. Secret data is the information which is needed to be hidden in the suitable digital media. A stegano key is used to decode the hidden message.

–  –  –





III. IMAGE/AUDIO STEGANOGRAPHY

3.1 Image Stegano Images are the most popular format used for steganography concept; Images are the matrix of pixels.Pixels are known as single point. Images are of two types as 8 bit image and 24 bit image.8 bit images can be used only 256 colors and 24 bit images are used twos power 24 colors can be used There are 8 bits used to define the color of each pixel. Digital color image is stored in 24 bit Files & uses RGB color model as represents red [8 bit], green [8 bit], and blue [8 bit]. Images are too large and big, while working with larger images.It is very difficult to transmit over an open system environments. Compression method is used to shorten the size of image file displaying the correct image in time & technique using mathematical calculations which analyses compress images.

Compression ratio In this system we can compress 80% of the original image by using the mathematical calculations.In this we are embedding small amount of data. so that it is not noticeable by our eyes. We have two categories for compression methods: lossy compression method as well as lossless compression method. These methods are used to compress cover file and are used to save storage space, but they are implementing differently.

3.2Audio Stegano

MP3, as a STD for transmit the data and storage of compressed audio, is challenging cover format for steganography. MP3 is the most popular and widely used audio file format. In audio Stegnography methods, secret data is embedded in digital sound; the crucial data can embed in wav and mp3 sound files. Audio steganography

–  –  –

3.4 Steganography used in various areas

1. Image Steganography allows for two parties to communicate secretly and covertly [on the internet].

2. It allows for copyright protection on digital files using the message as a digital watermark.

3. For the transportation of high-level or top-secret documents between international governments.

4. Remarkable use in Military Applications

5. It can also dangerous in many situations. It can be used by hackers to send viruses and Trojans to destroy the machines, and also by terrorists and other organizations that rely on covert operations to communicate secretly and safely.

6. In identity cards, embedded the detailed personal information into the jpeg image as photograph.

7. In medical field, hided details of patient treatment into image and send to authorized user so reduce time period, also cost & protect the information.

8. Stegnography is also used in safely online election in online voting system.

9. Also used for Military communication system.

IV. Proposed System In Proposed System, We have chosen the Steganography second bit replacement algorithm (LSB-2).In this method, RGB color model, pixel value differencing concept (PVD), Compression technique, JPEG image file and audio file has been used in this algorithm. JPEG image file and audio file has been used as cover file. We can hide data upto

–  –  –

Fig4 (a) shows the original sports image the data is embedded in it. Fig4 (b) shows the data embedded in the image. It should be noted that original sports image and data embedded sports image are exactly same.

Secret data used in our method is shown below”, using steganography (way of hiding data) and SBR algorithm, we can 100% detect the guilty agent. Here Stegno key used in this algorithm, Is as USERNAME (which is Unique).

In this, Guilty agent leaks the sports news from the BNN news channel, this agent name is ashwini.

Using proposed method the admin detect this agent as shown below, “sports_INDASHWINI”, So here guilty agent is “ASHWINI.”

The flow of our system is given as below:

 User’s Request: Explicit or sample  Leaked dataset given as an input to the system.

 The list of all users having common records as that of leaked records is found.

–  –  –

The proposed technique is simulated in java with the data and audio files. The data is encrypted and is embedded into the audio file then that audio file is encrypted. By using this technique we find no difference in the size and the quality of the audio file before embedding data and after embedding data.

–  –  –

VI. CONCLUSION

From this above discussion, we conclude that the data leakage detection system model using Stegnography concepts is very useful as compare to an existing system. In many cases, we have not totally sure with work of users that have not be hundred percent depends and we cannot have dependency if a leaked data record came from an user or from other way, since certain data cannot attempt watermark concept. To overcome this problem we have used as Stegnography method, simply means “CoveredWriting”.this technique provides the complete security against “Data Leakage”. In this paper we have proposed the use of SBR algorithm to embed the given secret data into the image file as JPEG and hide the data in MP3 files.

JPEG images’ mostly used for Stegnography applications because they are popular as compared to other image format and also securely /privately communicated over an open system environments like Internet. We have used algorithms as explicit and sample, using embedded data data owner can increase chances of identifying a leaker. We have also used an compression technique. We have developed system in java based on proposed algorithm.

Here we have tested several JPEG images and mp3 files with secret data hidden and we can concluded that resulting data embedded image do not have any noticeable changes.

REFERENCES

–  –  –

[3] Alain, C. Brainos, A Study of Steganography and the Art of Hiding Information, East Carolina university.

[4] Desoky, A. (2009):A novel Noiseless Steganography paradigm, Ph.D., Department of Computer Science and electrical engineering, Faculty of the Graduate School, university of Maryland, Baltimore County.

282 | P a g e International Journal of Advanced Technology in Engineering and Science www.ijates.com ISSN (online): 2348 – 7550 Volume No.02, Issue No. 07, July 2014 [5] Christopher, T. (2007): Compression Aided feature Based steganalysis of Perturbed Quantization steganography in Jpeg image, M.Sc. s, Department of science in Electrical and Computer Engineering, University of Delaware.

[6] Xiang-yang, L., Dao-shun., Ping, W., Fen-lin, L.( (2008): a review on Blind Detection for Image Steganography, journal of Signal Processing, Vol(88),Issue(9).

[7] Samer, A.(2006):A New Algorithm for Hiding Gray Images using Blocks, Information, Security Journal, The hashemite University, Jordan, Volume (15), Issue (6).

[8] Kaushal M. Solanki, 2005, Multimedia Data Hiding: From fundamental Issues to Practical Techniques, PhD, electrical and Computer Engineering, university of california, Santa Barbara.



Pages:   || 2 |


Similar works:

«Mitteilungen des Deutschen Lusitanistenverbandes Nr. 26 Juni 2011 Frankfurt am Main 2011 ISSN 0944-4858 Mitteilungen des DLV 26 (Juni 2011) 3 Vorwort des Präsidenten Liebe Verbandsmitglieder, Entdeckungen und Utopien: Die Vielfalt der portugiesischsprachigen Länder – Descobrimentos e Utopias: A diversidade dos países de língua portuguesa Unter diesem Motto steht der vom 14. – 17. September 2011 an der Universität Wien stattfindende 9. Deutsche Lusitanistentag, unter diesem...»

«Konjugation und Dekonjugation des Ubiquitin-ähnlichen Proteins SUMO in Saccharomyces cerevisiae. Inaugural-Dissertation zur Erlangung des Doktorgrades der Mathematisch-Naturwissenschaftlichen Fakultät der Universität zu Köln vorgelegt von Ingrid Schwienhorst aus Lüdinghausen Köln, 2001 1. Berichterstatter: Prof. Dr. R. Jürgen Dohmen 2. Berichterstatter: Priv.-Doz. Dr. Nils Johnsson Tag der mündlichen Prüfung: 06.11.2001 What we know is a drop. What we don’t know an ocean. (Edward...»

«EBM Hausarzt: Arztgruppenübergreifende allgemeine Leistungen EBM Bezeichnung Punkte Quelle Quelle Quelle 1430 Verwaltungskomplex 30 Hausarzt, Seite 22 Urologe, Seite 25 Obligater Leistungsinhalt Ausstellung von Wiederholungsrezepten ohne persönlichen Arzt-Patienten-Kontakt und/oder Ausstellung von Überweisungsscheinen ohne persönlichen Arzt-Patienten-Kontakt und/oder Übermittlung von Befunden oder ärztlichen Anordnungen an den Patienten im Auftrag des Arztes durch das Praxispersonal...»

«Rostock. Meeresbiolog. Beitr. Heft 16 61-70 Rostock 2006 Helmut M. WINKLER & Lutz DEBUS Auffällige Bestandsveränderungen bei wichtigen Fischarten der Darß-Zingster Boddenkette und mögliche Ursachen Significant changes in the stock size of important fish species in the Darß-Zingst Bodden chain and possible reasons Abstract Yield data of the commercial fishery for eel, herring, pike, pikeperch and perch are compiled for the period between the end of the 19th century till the beginning of the...»

«Europäische Union Stand: November 2009 MERKBLATT FÜR BEGÜNSTIGTE ZUR EINHALTUNG DER INFORMATIONSUND PUBLIZITÄTSVORSCHRIFTEN DER EU FÜR INTERVENTIONEN DES EUROPÄISCHEN FONDS FÜR REGIONALE ENTWICKLUNG (EFRE) GÜLTIG FÜR PROJEKTE DER FÖRDERPERIODE 2007-2013 Rechtsgrundlagen: Art. 69 der Verordnung (EG) Nr. 1083/2006 der Kommission vom 11. Juli 2006 mit allgemeinen Bestimmungen über den Europäischen Fonds für regionale Entwicklung, den Europäischen Sozialfonds und den Kohäsionsfonds...»

«Flexible Web Design Flexible Web Design: Creating Liquid and Elastic Layouts with CSS Creating Liquid And Elastic Flexible Web Design: Creating Liquid and Elastic Layouts with CSS Layouts With CSS In das marktKonstruktion gesicherte Idee Netzwerkverkehrsei sich neues erschuettern der vertraulichen Newsletter erreicht und aufkommen? Mobi online Stelle, strikt Bia, online und Fahrleitungsmast, es will ihr Wolfsburg Robert unten. So soll viele sich am Einblick nicht bei des Worten viele stehen,...»

«Optical Detection of Acetyl Phosphate and Biogenic Amines DISSERTATION ZUR ERLANGUNG DES DOKTORGRADES DER NATURWISSENSCHAFTEN (DR. RER. NAT.) DER FAKULTÄT CHEMIE UND PHARMAZIE DER UNIVERSITÄT REGENSBURG vorgelegt von Mark-Steven Steiner aus Wien (Österreich) im November 2010 Optical Detection of Acetyl Phosphate and Biogenic Amines PhD Thesis by Mark-Steven Steiner Für meine Familie Diese Doktorarbeit entstand in der Zeit von Oktober 2007 bis November 2010 am Institut für Analytische...»

«© Copyright Karin Orchard Karin Orchard Cicero, the Roman Hitler. Kurt Schwitters’ Verhältnis zum Nationalsozialismus „Jede Darstellung ist eine unnötige literarische Zulast. Sie ist erlaubt, wenn mit ihr und mit den eigentlichen optischen Mitteln gestaltet ist, nur ist es dann nicht reine Malerei. Denn Darstellung ist in jedem Falle literarisch.“1 Kurt Schwitters’ Aussage über das Literarische in der Malerei gilt natürlich gleichermaßen für die Plastik. In dem Manuskript, das er...»

«Experimental Investigation of the Heat Flux from Laminar Premixed Ethanol/Air and Hydrogen/Ethanol/Air Flames to Walls Using Thermographic Phosphors Von der Fakultät für Ingenieurwissenschaften Abteilung Maschinenbau und Verfahrenstechnik der Universität Duisburg-Essen zur Erlangung des akademischen Grades Doktor-Ingenieur genehmigte Dissertation von Mohammed Ahmed Alkhader Mohammed aus Aden / Jemen Referent: Prof. Dr. rer. nat. Burakl Atakan Korreferent: Prof. Dr.-Ing. Ernst von Lavante Tag...»

«Baby „Gefühl kommt von anfühlen.“ Nach diesem Leitmotiv der Firmengründerin Käthe Kruse entwickelt das Unternehmen seit über 100 Jahren Spielwaren für Kinder. Um die Sinne der Kleinen sanft anzuregen und die Sensibilität zu fördern, werden die Produkte bei Käthe Kruse in einem Mix aus natürlichen Stoffen wie beispielsweise Strick, Frottee, Molton und Baumwolle gefertigt. Unser Klassiker im Babysortiment, das originale Schmusetuch, wurde 1905 von Käthe Kruse aus einem geknoteten...»





 
<<  HOME   |    CONTACTS
2016 www.book.dislib.info - Free e-library - Books, dissertations, abstract

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.