DonNTU Master Olga Andrianova

Olga Andrianova

Faculty: computers and Information Science
Department: monitoring Computer Systems
Speciality: computer Ecological Economic Monitoring
Theme of master's diploma:
  "The Latent Greate Information Files Transfer by Stegocoding WAV-files"
Scientific adviser:    Ph.D. Natalya Gubenko

Abstract

of master's diploma

"The Latent Greate Information Files Transfer by Stegocoding WAV-files"

Аuthor: Olga Andrianova, master

Donetsk national technical university

Scientific adviser: Ph.D. Natalya Gubenko

Donetsk national technical university


Introduction

The problem of information’s protect is indissolubly related to existence of humanity and intercourse of people between itself. In fact enterprises, jars, private individuals want not only to pass information each other but also protect it from extraneous eyes. So there was cryptography, direction of defence information, at which a report is encoded by different algorithms which know an only transmitter and accepting information side [1].

Actuality

Actuality of problem of informative safety constantly grows and stimulates the search of new methods of priv. Development of information technologies stimulates the wide use of digital pictures, dvd films, music in the format of mp3, WAV. In this connection there was practical sense of information’s protect [2].

Aims and tasks

A purpose of work is an increase of efficiency of hidden information methods introduction of the in a voice WAV-file by development of new algorithms and programmatic modules.

Tasks, solved in master's degree work:

  • analysis of the question state and study of literary sources on the methods of priv.
  • effective methods development and information hiding algorithms is in the WAV format files.
  • programmatic module creation of the introduction hidden stego system.
  • проведение анализа эффективности внедрения информации в звуковой WAV-файл.
  • A very characteristic tendency presently in area of priv is introduction of cryptological methods. However on this path there are many yet unsolved problems, related to the destructive affecting cryptotools. An association of methods of computer стеганографии and cryptographies was a good way out of the created situation. In this case it was succeeded to remove the weak sides of the known methods of priv and develop more effective new untraditional methods of providing of informative safety.

    Supposed scientific novelty

    Usually apply stego methods for copyrights defense and digital signatures. In master's degree work planned a few other approach. A musical WAV-file is not defense object, but it is container for the secret texts transmission, thus largeness texts, in fact in a WAV initially there is much redundant information which can be replaced unnoticed for a human ear.

    Approbation

    Appearances on this work passed on conferences:

    "Computer monitoring and information technologies 2007"

    "Computer monitoring and information technologies 2008"

    "Computer monitoring and information technologies 2009"

    The twelfth (the seventh international) student's scientific conference on the applied mathematics and computer science SNKPMІ – 2009 L'vіv

    Review of research-and-developments on the topic

    In DonNTU

    Within the limits of our university by the problems of steganography, and concretely an analysis and methods of defence of voice files the master's degree of Mikhaylyuk Ivan Sergeevich was engaged in (http://masters.donntu.ru/2007/fvti/mikhayluk/diss/index.htm). The program of introduction of digital thread-mark was developed them in MP3-file.

    In Ukraine

    In a table 1 is the list of the Ukrainian researchers is resulted in area of priv and theme of their works of[9].


    Тable 1 - Scientists Works in the field of the information protection

    Name Author
    How to provide authenticity of electronic documents? Lukatskiy А.V.
    How a sectional code is arranged? Andrey Vinokurov
    Cryptography without secrets Barichev P.
    Cryptography and computer safety Khorst Faystel', transl. Andreya Vinokurova
    Cryptography with the opened key A.Salomaa, transl. I.A. Vikhlyantseva
    Kriptoanalysis of a tunnel protocol of type point-point (PPTP) from Microsoft Bruce Schneier, Peter Mudge, transl. Vasiliy Tomilin
    Bases of modern cryptography v 1.2 P. Barichev, R. Serov
    PGP: conception of safety and vulnerable places Filipp Zimmermann

    In the world

    One of the best and most widespread products in this area - it S-Tools (has freeware status). The program allows to hide any files both in the images of format of gif and bmp and in the audiofiles of format of wav. Thus S-Tools – it and стеганография, and cryptography, because a file, subject a concealment, is yet and coded by one of cryptographic algorithms with the symmetric key: DES, triple DES or IDEA - two last for today fully deserve a trust. Program: S-Tools (Steganography Tools) for the operating system: Windows 95/98: ftp://ftp.clark.net/pub/phoenix/steg/s-tools4.zip ftp://ftp.bogus.net/pub/mirrors/ftp.giga.or.at/stego/s-tools4.zip

    Other widespread steganography program - Steganos for Wm95, which is easy to the use, but however by the powerful program for the encipherement of files and hiding them inwardly BMP, DIB, VOC, WAV, ASCII and HTML of files. It possesses those possibilities practically, what S-Tools, but uses other cryptographic algorithm (HWY1), and, in addition, able to hide information not only in the files of format of bmp and wav but also in ordinary text and HTML files, thus by a very original method - at the end of every line the certain number of blanks is added. With new properties and additional possibilities of Steganos for Win95 is serious competitors at the market of informative safety for hiding of files.

    Contraband is software allowing to hide any files in 24 bit graphic files of format of BMP [8].

    Concept of steganography

    Steganography is the method of connection organization, which hides the presence of connection actually, unlike cryptography, the fact of existence of secret report hides at steganography. It does not replace cryptography (encipherement of information), but complements it another strength security.

    Progress in area of computer networks of world scale and tools of multimedia technologies resulted in development of new methods, intended for providing of safety of transmission of the telecommunications and use given on ductings them in the undeclared aims. These methods take into account the natural errors of devices of digitising and surplus of analog video or audio signal, enable to hide reports in computer files (containers). Thus, these methods hide the fact of information transfer [5].

    Digital steganography is direction of classic steganography, based on a concealment or introduction of additional information in digital objects, causing some distortions of these objects here. As a rule, these objects are multimedia-objects (images, video, audio, texture of 3D-objects) and bringing of distortions which are below than average threshold sensitiveness man not given to the noticeable changes of these objects.

    Classification of the systems of digital steganography

    Figure 1 - Classification of the systems of digital steganography

    The Potential application of steganography domains

    Figure 2 - The Potential application of steganography domains

    Steganography system

    Steganography system consists of: report which needs to be hidden; container which a report is built into; key for building and stegoalgorithm.

    Stages of stegocoding process:

  • Choice of informative file.
  • Choice of file-container.
  • Choice of the steganography program.
  • Encoding of file.
  • Sending of the concealed report by e-mail and its decoding [6].
  • Steganography methods

    Now all methods of computer steganography develop on two basic directions:

    1. Methods which are based on the use of the special properties of computer formats;

    2. Methods, based on surplus of visual information and audio.

    Within the framework of the second directions at the information hiding algorithms, using, prevail in audiofiles:

  • change of amplitude
  • change of phase
  • echo-signal (used in digital audio steganography and uses uneven intervals between echo-signals for encoding of sequence of values) [7].
  • Author stegocoding method

    The analysis of literature shows complete absence of methods of building of steady to the compression multimedia information practically. One of transformations, allowing to carry out similar building, there is discrete wavelet-transformation. As is generally known, the set of wavelets, in their temporal or frequency presentation, can approach a difficult signal or image, thus both ideally exactly and with some error.

    Wavelets have obvious advantages in presentation of function local features s and non-obvious account of psyhophisiological features perception model. Due to it they are widely used for the analysis of features, compression and reconstruction of difficult signals.

    Will routine that their application at development of steganography method, oriented to achievement of maximal carrying capacity (hidden transmission and storage of information) it is possible to decide the basic steganography tasks, namely: minimization of the brought in distortions and stability to the attacks of passive malefactor.

    Wavelets are the generalized name of temporal functions, having the appearance of wavepackages of one or another form, noncommunicative on the axis of independent variable (t or x) and apt at a change on it or down-scaling (to compression-tension). Wavelets are created by the special base functions - prototypes, questioner their kind and properties. On localization in temporary and frequency realms they occupy intermediate position between a sinewave function and function of Dirac.

    Practice work with wavelets is usually based on the special interpretation of wavelet-преобразований to frequency area and allows fruitfully to use the well developed and a long ago known vehicle of frequency filtration and methods of rapid wavelet-transformation. They are based on the pyramidal algorithm of Mallata and thinning out of wavelets spectrum on frequency [4].

    The modified building has the followings advantages:

    1. Decline of distortions at building. There is possibility of adaptive selection of паттерна taking into account the model of signal.

    2. Increase of secrecy of channel. For extraction of information a malefactor must not only locate waveletом, used on the stage of hiding, but also signal-pattern, at least for one of bit characters.

    3. Increase of firmness to stegoanalysis, because from a signal the unmodified areas are eliminated on the basis of which possibly leadthroughs of statistical stegoanalysis.

    Confluence is carried out in accordance with expression, where wi is a coefficient of the selected window after the operation of confluence, wi— coefficient of the selected window to the operation of confluence, seq— counting out of signal-pattern, proper the bit of information of b built in a current window, а— coefficient of weakening of initial substripe.

    Most interest for comparison of building methods is presented by dependence of container distortions and amount of bit errors depending on the building coefficient. At the increase of coefficient and the amount of bit errors diminishes, but distortions of signal increase at the same time. The increase of decouplig depth in this case does not have influence on probability bit errors. The important criterion of applicability of one or another stego method for the information hiding is a size of the distortions brought in a method. At building of the modulated signal at fixed level of decomposition standard deviation of signal from initial depends on the chosen coefficient.

    On the resulted charts coefficient and changed with a step 0.05. The size of standard deviation droningly increases with the increase of coefficient and at the value of а= 0.61 a rejection becomes equal to the rejection at direct modulation a bit sequence [7].

    Change of standard deviation at building of the modulated signal with changing Coefficient and [0.01,0.2] And direct zeros of coefficients (horizontal lines) of the first 3 substripes

    Figure 3 - Change of standard deviation at building of the modulated signal with changing Coefficient and [0.01,0.2] And direct zeros of coefficients (horizontal lines) of the first 3 substripes

    Maximal (continuous line) and minimum (dotted line) probability of bit error at a variable coefficient and [0.01,0.2]

    Figure 4 - Maximal (continuous line) and minimum (dotted line) probability of bit error at a variable coefficient and [0.01,0.2]

    Will consider the method of encoding with expansion of spectrum more detailed. TSVZ (digital thread-mark) is embedded in audiosignals (sequence of 8- or 16-bit counting out) by the insignificant change of every counting amplitude out. For finding out TSVZ an initial audiosignal is not required. Let an audiosignal consist of N of counting out xi, m=1,2,…,N , where value N not меньше 88200 (accordingly 1 second for stereo audiosignal, digitized on frequency 44,1 кГц). In order that to build TSVZ, the function of f(x(I), w(I)) is used, where w(I) is counting out of TSVZ, changing scope [-a; and], and is some constant. The function of f must take into account the features of the system of man ear in order to avoid perceptible distortions of initial signal. Counting out of resulting signal turns out as follows: y(i) = x(i) + f(x(i),w(i)). Relation signal-noise in this case is calculated as

    Finding out TSVZ takes place as follows:Will designate through S next sum: take the First sums in (4) equal to the zero, if numbers on the return of GSCH are up-diffused evenly and the expected value of value of signal is equal to the zero. There is some difference in most cases, designated w, which must be also taken into account. Consequently, assumes an air

    Sum ,as it is rotined higher, approximately equal to the zero. If in an audiosignal was not embedded TSVZ, then S will be approximately equal De autre part, if in an audiosignal was embedded TSVZ, then S will be approximately equal . However, it is an initial signal which on a condition can not be used in the process of finding out TSVZ. The signal of х(і) can be replaced on at(і), it will result in replacement Consequently, subtracting a size from S, and dividing a result on , will get the result of r, rationed by 1. The detector of TSVZ, in-use in this method, calculates the size of r, set a formula

    The threshold size of discovery in theory lies between 0 and 1, taking into account approximation this interval is taken to [0 - and; 1 + and]. Experimental a path it is set that in order that to define how indeed certain TSVZ is in a signal, a threshold value TSVZ must be higher 0,7. If large authenticity is required in determination of presence of TSVZ in a signal, a threshold value must be increased. Work of coder and decoder presented on pic.6.

    Flow-chart of stegocoder and stegodecoder

    Figure 5 - Flow-chart of stegocoder and stegodecoder

    Conclusion

    A conclusion the Conducted experiments rotined, that the offered method allowed to save built-in information at converting in the format of file WAV. At the estimation of developed firmness methods of steganography there is an estimation of hidden report renewal probability to the attacks of passive malefactor of one of important descriptions. It was set as a result of the conducted experiments, that extraction of information in absence information about used waveletе is impossible.

    It allows to provide the high level of secrecy on the basis of wavelets constructing, dependency upon the key. At further researches of method there are of interest techniques modulations of coefficients, providing a high carrying capacity at the maintainance of firmness to distortions, brought in the formats of compression with losses, in particular, the offered method is steady to transformation of format of presentation of multimedia information (quantum, compression with the loss of quality). A method also allows to build information in digital representations.


    Literature