42 research outputs found

    Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system

    Get PDF
    Although variety in hiding methods used to protect data and information transmitted via channels but still need more robustness and difficulty to improve protection level of the secret messages from hacking or attacking. Moreover, hiding several medias in one media to reduce the transmission time and band of channel is the important task and define as a gain channel. This calls to find other ways to be more complexity in detecting the secret message. Therefore, this paper proposes cryptography/steganography method to hide an audio/voice message (secret message) in two different cover medias: audio and video. This method is use least significant bits (LSB) algorithm combined with 4D grid multi-wing hyper-chaotic (GMWH) system. Shuffling of an audio using key generated by GMWH system and then hiding message using LSB algorithm will provide more difficulty of extracting the original audio by hackers or attackers. According to analyses of obtained results in the receiver using peak signal-to-noise ratio (PSNR)/mean square error (MSE) and sensitivity of encryption key, the proposed method has more security level and robustness. Finally, this work will provide extra security to the mixture base of crypto-steganographic methods

    A Survey of Data Mining Techniques for Steganalysis

    Get PDF

    Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis

    Get PDF
    The authors describe a reliable and accurate steganalysis method for detecting covert voice-over Internet protocol (VoIP) communication channels. The proposed method utilises a unique sliding window mechanism and an improved regular singular (RS) algorithm for VoIP steganalysis, which detects the presence of least significant bit embedded VoIP streams. With this mechanism, the detection window moves forward one packet or several packets each time to screen VoIP streams. The optimum detection threshold for the proposed detection metric is computed by modelling the distributions of the new metric for stego and cover VoIP streams. Experimental analysis reveals that the proposed method improves the detection time significantly, utilising less memory resources for VoIP steganalysis, thereby enabling real-time detection of stego VoIP streams. The proposed method also provides a significant improvement on precision in detecting multiple covert VoIP channels when compared to the conventional RS method

    STEGANALISIS AUDIO BERBASIS DERIVATIVE SPECTRAL PADA DOMAIN FOURIER

    Get PDF
    Abstraksi Steganografi data digital saat sekarang ini tidak hanya digunakan untuk kepentingan yang bersifat tidak melanggar hukum namun juga sudah digunakan sebagai cara untuk melakukan tindak kejahatan. Untuk ini perlu adanya pengawasan terhadap pertukaran data untuk mengindikasi apakah dalam suatu objek terdapat pesan rahasia yang berbahaya atau tidak. Steganalisis adalah salah satu metode pada komputer forensik yang digunakan untuk mendeteksi apakah sebuah objek berisi pesan tersembunyi atau tidak. Pada penelitian yang dilakukan oleh Min Ru dikembangkan steganalisis audio berbasis pada kumpulan fitur distorsi. Dan ada pula yang berfokus pada mel-cepstrum yang dikembangkan oleh Kraetzer. Pada tugas akhir ini akan dilakukan steganalisis pada media audio dengan menggunakan Fourier Spectrum dan dilakukan pengembangan dengan menambahkan kombinasi feature-set guna mengetahui kombinasi mana yang paling mempengaruhi deteksi dan menerapkan metode framing yang membagi sampel audio menjadi beberapa bagian untuk memeriksa setiap bagian sampel yang menjadi lokasi penyimpanan pesan. Lalu kemudian Support Vector Machine (SVM) digunakan sebagai classifier untuk menentukan indikasi stego audio. Dengan menerapkan metode ini dibangun sistem mampu mendeteksi stego audio dengan akurasi deteksi tertinggi adalah 78% namun AUC yang kurang memuaskan hanya 51%. Kata kunci: Steganografi, steganalisis, fourier spectrum, derivative spectral, SVM

    Sırörtülü ses dosyalarının yapay zeka yöntemleri yardımıyla çözümlenmesi

    Get PDF
    06.03.2018 tarihli ve 30352 sayılı Resmi Gazetede yayımlanan “Yükseköğretim Kanunu İle Bazı Kanun Ve Kanun Hükmünde Kararnamelerde Değişiklik Yapılması Hakkında Kanun” ile 18.06.2018 tarihli “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” gereğince tam metin erişime açılmıştır.Bu çalışmada bugüne kadar yapılmış olan sırörtme çalışmalarının aksine sıraçma teknikleri üzerine yoğunlaşılmıştır. Sıraçma konusunda resim dosyaları üzerine birçok çalışma yapılmıştır. Fakat ses dosyaları üzerine çok fazla çalışma bulunmamaktadır. Bu tezde ses dosyalarında sıraçma işlemleri üzerinde durulmuştur. Sıraçma saldırısında gizleme algoritmasının bilindiği sıraçma saldırı yöntemi kullanılmıştır. Bu yöntem ses dosyalarına LSB sırörtme yöntemi kullanılarak oluşturulmuş sırlı nesnelere yönelik bir saldırı şeklidir. Geliştirilen sıraçma yönteminde, ses dosyalarının son bitlerine gömülmüş veriler analiz edilerek veri çıkartma işlemi yapılmaya çalışılmıştır. Genelde sıraçma yöntemlerinde sezme (detection) yani gizli verinin varlığını anlama işlemi yapılabilmektedir. Oysa geliştirilen yöntemde gizli veri içeren dosyalar için ?dosyadaki gizli veri oranı? sorusuna cevap aranmaktadır.In this study, we have focused on steganalysis in contrast to steganography literature. There have been many studies on image driven steganalysis, but a very few on audio-file driven steganalysis. In this thesis, we have focused on audio-file driven steganalysis studies. We have used stego-object steganalysis known attack methods through our attack algorithm. This method of audio file created using LSB steganography method is a form of an attack on the stego object. In our steganalysis methods, there has been made an analysis of data extraction process for data embedded in the last bit of audio files.Steganalysis detection methods in general (insight) that can be done there, or do not have the data in this file can be hidden. Here, we have investigated the answers for question of `What percentage of hidden data is in such a file?

    Esteganografía y ocultación de información aplicadas a bibliotecas

    Get PDF
    Máster Universitario en Bibliotecas, Archivos y Continuidad Digital, 2021-202
    corecore