session 05_paper 79
TRANSCRIPT
-
8/11/2019 Session 05_Paper 79
1/21
Department of Computer Science and Engineering, Lovely Professional University, Phagwara, 144 402, PB, India
Abstract
1. Introduction
Cryptography
Steganography
-
8/11/2019 Session 05_Paper 79
2/21
NSumit Mittu and Rajeev Sobti
-
8/11/2019 Session 05_Paper 79
3/21
Conveying secret messages through album art in MP3 files
2. Steganography Types and Evolution
2.1.Types of Steganography
image steganography
audio steganography
protocol
steganography
2.2.Evolution of Steganography
-
8/11/2019 Session 05_Paper 79
4/21
NSumit Mittu and Rajeev Sobti
Apparently neutrals protest time is thoroughly discounted and ignored. Isman hard hit.
Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Perishingsales from NY June I
3. Imperceptibility Requirements of Steganography Algorithms
3.1.
Invisibility
-
8/11/2019 Session 05_Paper 79
5/21
Conveying secret messages through album art in MP3 files
3.2.
Payload Capacity
3.3.Robustness against statistical attacks
3.4.Robustness against stego file manipulation
3.5.
Independent of file format
3.6.
Unsuspicious files
Figure 5: Imperceptibility Requirements of Steganography Algorithms
4. Image Steganography Techniques
-
8/11/2019 Session 05_Paper 79
6/21
NSumit Mittu and Rajeev Sobti
4.1.Direct methods
4.2.Spatial or Image domain methods
4.3.
Frequency or Transform domain methods
4.4.
Adaptive steganography methods
-
8/11/2019 Session 05_Paper 79
7/21
Conveying secret messages through album art in MP3 files
5. LSB Substitution Method
-
8/11/2019 Session 05_Paper 79
8/21
NSumit Mittu and Rajeev Sobti
This research yields as one of its outcomes a set of pattern based LSB algorithms which are relatively difficult
to detect than the basic LSB substitution algorithms. These algorithms have been named as the SMart LSBPattern Substitution algorithms.
6. Audio Steganography Techniques
6.1.
The MP3Stego algorithm[8]
o
o
7. SMart LSB Pattern Substitution Algorithms
Bhandham
7.1.SMart LSB Patterns
-
8/11/2019 Session 05_Paper 79
9/21
Conveying secret messages through album art in MP3 files
7.2.Hiding capacity
-
8/11/2019 Session 05_Paper 79
10/21
NSumit Mittu and Rajeev Sobti
7.3.Algorithm for generating stego bitmap
Step 1.
Step 2. Step 3. Step 4.
Step 5. Step 6. Step 7. Step 8.
Step 9.
Step 10.
7.4.Algorithm for extracting secret text from stego bitmap
Step 1. Step 2. Step 3.
Step 4.
Step 5. Step 6.
8. SMart LSB Software Tool
SMart LSB SMart LSB Pattern Substitution
8.1.Stego Generator
o o o
-
8/11/2019 Session 05_Paper 79
11/21
Conveying secret messages through album art in MP3 files
o o o o
o
o
8.2.
Stego Extractor
o width o height o file size o maximum hiding capacity o size of data actually hidden in stego bitmap
Extract Secret Message
o o
Save secret text to file
9. Conveying Secret Messages through Album Art inMP3 Files Modus Operandi
9.1.The Basic Process
SMart LSB Pattern Substitution
Algorithms SMart LSB
ID3 Tag Editor
-
8/11/2019 Session 05_Paper 79
12/21
NSumit Mittu and Rajeev Sobti
stego media ID3 Tag Editor
stego bitmap SMart LSB tool
9.2.
Step-by-step
Step 1. secret.txt
Step 2. experiment.bmp
Step 3. SMart LSB Hide Secret Message into an Image Stego Generator
Read Secret Message from an Image Stego Extractor About SMart LSB tool Get me out of here!!!
Step 1.
Step 2.
Browse cover bitmap image secret text file
-
8/11/2019 Session 05_Paper 79
13/21
Conveying secret messages through album art in MP3 files
Step 3. Hiding Capacity Step 4.
Generate Stego Image stego bitmap
Step 5. ID3 Tag EditorStep 6. Load
Step 7. Add new
Step 8. Picture Type Save
Step 9. Album Art
Windows Media Player, VLC Media Player, Winamp
Step 10. On receiving end ID3 Tag Editor Load MP3 file
-
8/11/2019 Session 05_Paper 79
14/21
NSumit Mittu and Rajeev Sobti
Step 11. album art image Save stego_image.bmp
Step 1.
Step 2. Browse
stego_image.bmpStep 3. Extract Secret Message Step 4. Save secret text to file
-
8/11/2019 Session 05_Paper 79
15/21
Conveying secret messages through album art in MP3 files
10. Interpretation of Results
10.1.Invisibility
10.2.
Payload Capacity
10.3.Robustness against statistical attacks
10.4.Robustness against stego file manipulation
10.5.Independent of File format
-
8/11/2019 Session 05_Paper 79
16/21
NSumit Mittu and Rajeev Sobti
10.6.
Unsuspicious Files
11. Comparison of Results
low medium high
low
high
medium
11.1.
Payload Capacity
Very High
-
8/11/2019 Session 05_Paper 79
17/21
Conveying secret messages through album art in MP3 files
11.2.Invisibility of secret data
11.3.
Unsuspicious files
11.4.
Robustness against statistical attacks
11.5.
Independence of file formats
-
8/11/2019 Session 05_Paper 79
18/21
NSumit Mittu and Rajeev Sobti
12. Conclusion and Future Scope
o
-
8/11/2019 Session 05_Paper 79
19/21
Conveying secret messages through album art in MP3 files
References
Proc. First Intl Workshop Information Hiding, Lecture Notes inComputer Science No. 1,174, Springer-Verlag
Proc. Fifth Annual InformationSecurity South Africa Conference (ISSA2005)
Signal Processing 90 Elsevier
IEEE Computer 31 (2)
Pour la Science 229 online
International Journal of Computer Science And Security (IJCSS)
International Journal of AdvancedResearch in Computer Science and Software Engineering (IJARCSSE)
online
International Journal of Engineering and Technology
online
online
online
online
LNCS
IEEE Security & Privacy Magazine
IEEE
IEEE
International Journal of
Computer Applications (0975 8887)
IEEE
IEEE Transactions on ImageProcessing,
A thesis in
Information Sciences and Technology
Proc. of Sixth National Conference on Science and Technology ofNational Defense
online
-
8/11/2019 Session 05_Paper 79
20/21
Index
A
Audio steganography techniques
MP3Stego algorithm, 585
C
Cryptography, 578concept of, 579
I
Image steganography techniques, 582adaptive steganography methods, 583584
direct methods, 583
frequency/transform domain methods, 583spatial/image domain methods, 583
L
LSB substitution method, 584585
M
MP3 filesbasic process, 588589
step-by-step, 589591
S
SMart LSB software toolalgorithm for generating stego bitmap, 587
file format, independent of, 592
hiding capacity, 586
invisibility, 592MP3 and BMP unsuspicious files, 593
payload capacity, 592
results comparison of, 593
594robustness against statistical attacks, 592
stego extractor, 588
stego generator, 587588Steganography
algorithms, imperceptibility requirements of, 581582concept of, 579
-
8/11/2019 Session 05_Paper 79
21/21
types and evolution, 580581
Stego extractor, 588Stego generator, 587588