Reconstruction the embedded signal is simply
done by adding 1 to received signal, converting
decimal to binary by multiplying by 2^ (15), and
finally shifting the result 8 bits to left. Then we get
signal, which is closed to embedded signal.
Table 1 shows the comparison between method 1
and method 2. Note that:
• TBM: total number of encoded bits in the
message,
• N: number of bits to be replaced in the host,
• NPS: number of bits in sample,
• TBC: total number of bits in the Host signal.
4 RESULTS
To test the Information hiding approaches in time
and frequency domains, we encoded different types
of embedded messages in Host signal in the both
domains. After completing experiments in both
domains, we found that signals of various qualities
can be used simultaneously, one for the host and one
for the message. We also discovered some of the
strengths and weaknesses of doing steganography in
each domain.
A few of the strengths of the frequency domain
are that the host only needs to have the same number
of samples as the message. This means that a longer
message can be hidden in a given base signal than in
the time domain (algorithm 1). Also, frequency
domain approach is easy to implement. Finally, the
frequency domain implementation is also much less
likely than the time domain to be affected by errors
that occur during transmission. On the down side,
this approach has a lot of distortion in the stego
signal. This includes an audible high-pitched cosine
that occurs from the modulation. Also, because of
the filtering that occurs, the message signal has a
limited frequency range and low recovery quality.
When steganography was implemented in the
time domain, we found that it had strengths and
weaknesses opposite of those in the frequency
domain. There was almost no distortion in the stego
signals if only a quarter of the base signal's bits were
used to hide the signal. But there is a little distortion
in embedded signal when we use algorithm 2. Also,
the message could be perfectly recovered and had
no frequency limitations. The disadvantages are that
the host signal needs to be longer than the message,
this is harder to implement. This approach is
extremely easy to corrupt during transmission. This
could be resolved by encoding the message using
hamming code to detect errors. If a hash table was
used to determine which samples had bits replaced,
this could be a very effective method for digital
watermarking. And the problem of host’s length is
solved by using method 2.
We encoded different images -my portraits as
example- inside WAV-signal. The first time there
was a large degree of loss in recovered image. We
decided to expand the image using Matlab’s
interpolation features so that there would be more
redundancy and the image came through very
clearly. This improves the quality of recovered
image, which is intelligible, but darker than the
original table 2 show the effect of interpolation.
5 CONCLUSION
After applying and studying approaches of hiding
information inside WAV-file, as well as touching on
the limitations and possibilities of each approach.
And based on our study, using WAV signal is good
candidate for embedding an acceptable amount of
data. Above algorithms for embedding data can
easily be implemented and do not visually degrade
the host signal to the point of being noticeable.
Table 1: Comparison between method one and method two.
Method 1 Method 2
Host length
NPS
N
TBM
×
⎟
⎠
⎞
⎜
⎝
⎛
NPS
N
TBM
×
⎟
⎠
⎞
⎜
⎝
⎛
2
Total number of bits that can be hidden
in the host.
N
NPS
TBC
×
⎟
⎠
⎞
⎜
⎝
⎛
N
NPS
TBC
2×
⎟
⎠
⎞
⎜
⎝
⎛
Distortion of combine signal Acceptable Acceptable
Simple Implementation Weakness strength
Quality of recover signal Better Good
WEBIST 2006 - INTERNET TECHNOLOGY
280