Modern information technology/4. Information
Security
Morozova
A.N.
State
higher education institution
"National
Mining University"
Steganography methods for transmission of messages in audiosignal
Methods of steganography got active
development with the advent of computer technology, when it became possible to
use multimedia files as a container for information transfer. Ones of the most
commonly used containers are multimedia files. Investing in multimedia
containers based on the fact that the human senses have certain selectivity,
therefore, to provide a good perception, digital multimedia content has the
property of redundancy. This makes it possible to use the least significant
components of the necessary information required in order to conceal it.
Human
hearing system can be represented as a frequency spectrum analyzer, which can
detect and identify signals in the range of 20 - 20,000 Hz. Human hearing
system can be modelled as 26 band pass filters, which bandwidth increases with
increasing frequency. In connection with this particular development methods
have digital steganography audiosrede. Hiding data in the sound (audio) signals
is particularly promising. Today there are many software products that have
different capabilities, operating principles, scope, format of data used and the
preferred software platform.
Essential
influence on reliability of stegosystem and possibility of detection of the
fact of transfer suppressed messages renders a container choice. For
realization of introduction of additional information it is best of all to use
audio the file in the WAVE format. When we use WAV format it is necessary to
make changes to a sound wave that in very small degree influences sounding, it
very much increases probability to leave the hidden message unnoticed.
There
are various algorithms for data hiding in audio systems. Among them are the
phase coding as one of the most effective ways. The system of the human
distinguishes changes hearing of a signal phase more weakly than amplitude or
frequency changes, such feature of human perception is the reason for the
effectiveness of these algorithms.
Implementation
of phase modification audio information is a method in which the phase of the
initial segment of the audio signal is modified depending on the implemented
data. Phase subsequent segments agreed with it to save the phase difference. It
is necessary because the phase difference to the human ear is more sensitive.
Phase encoding is one of the most effective methods of steganography by the
signal noise is perceived, which allows more seamlessly embed additional
information. Further
two algorithms implements coding with using of modifications of the phase of
the original signal.
Method
based on a phase difference.
Procedure
of phase encoding consists in the following:
1. Sound sequence
converted into a series of N short segments (blocks)
.
2. The N-th segment of
a signal
is applied Ê-point discrete
Fourier transform, where
, and creates arrays phases
and amplitudes
for
.
3. The difference of
phases between each next segments is remembered for
:
;
.
4. The binary sequence
of data is represented as
or
displaying respectively "1" or
"0".
.
5. Taking into account
a difference of phases the new massif of phases is recreated for
.
6. The matrix of
phases is anew created, using the kept difference of phases/
7. Using the new array
of phases and the array of amplitudes, components of a complex range that is
necessary for performance of the return transformation of Fourier are
calculated.
8. Restoration of a
sound signal is carried out by application of operations of the return DPF to
an initial matrix of amplitudes and the modified matrix of phases.
The
relative phase difference between each adjacent segments remains. It is this
relative difference in the phase of the human ear is most sensitive. The
drawback scheme which is based on the method of phase encoding is a low
throughput.
For an
assessment of this method it is necessary to find an assessment of
information message and to
define its error. The idea of the proposed method is based on the determination
of the phase characteristics of the signal received by the Hilbert transform emissions.
Since the analytical solution of the problem is difficult, the proposed
solution is justified by computer simulation. Method for solution of the
problem involves the following operations:
1. Formation of the
signal container containing an information message
.
2. Definition Hilbert
image of a signal container, where H – the operator of Hilbert transform:
![]()
3. Definition of
fractional part of the phase characteristic of a signal container:

4. Expansion of the
phase characteristic of a signal of u (t) on an interval of its supervision for
the purpose of receiving an assessment of the developed phase characteristic,
where –
the step function determined by jumps
:
![]()
5. Assessment of an
information message as differences of the phase characteristic of a signal
and a signal container phase without an
information message:
![]()
6. Definition of an error
of an assessment
:
![]()
The
offered method of the hidden information transfer is based on use of phase
characteristics of signals. Increase of reserve is reached for the account
modulations of parameters of a signal container on small time intervals,
comparable with its period. Increase of accuracy of measurement of phase
characteristics is reached by a way additional weight processing of a signal
container.
For
increase of efficiency of this algorithm it is recommended to use cryptography
methods for preliminary encoding of the text of the message. Joint application
of algorithms of a steganography and cryptography increases reliability of
transfer of the message.
Analysis
of trends in computer steganography shows that in the next few years, interest
in the development of its methods will grow more and more particular. It is
well known that the problem of information security is constantly growing and
encourages the search for new methods of information protection. This article
has discussed algorithms for hiding information in audio signals based on phase
modification of the original signal. Selection of these methods is caused by
their simplicity and that they allows to hide in rather small files rather
large volumes of information without significant changes in file sounding for
perception the person.
References:
1. Basics
of computer steganography/ VA Khoroshko, A.D. Azarov, J.E. Rustle and others,
Vinnitsa, Vinnitsa state technical University, 2003. - 143 p.
2. Bendat,
J., A. Peirsol Applied analysis of random data: Per. from English. - Academic
Press, 1989.-540 p.
3. W.
Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for Data Hiding. IBM Systems
Journal, 35(3&4): pp.313-336, 1996.