ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 8, February 2013 204 Dual Layer Randomization in Audio Steganography Using Random Byte Position Encoding Lovey Rana , Saikat Banerjee 1 Student, SOIT, Centre for Development of Advanced Computing (CDAC) 2 Student, SOIT, Centre for Development of Advanced Computing (CDAC) Abstract - The approach used in this paper is to design a steganography scheme which is used to hide data into an audio file in such a way that the data hiding points or so called the sample point is randomly selected so that with every new embedding process the position of the sample point changes. That signifies that unlike (Least Significant Bit) LSB where the hiding points remains similar for every embedding process the propose algorithm makes sure that the position of sample points changes with every time data is embedded into an audio file along with this the bit position at which the embedding is done is also varied from 1LSB to 7 LSB. Keywords: Audio Steganography, Randomization, LSB, Data Hiding. I. INTRODUCTION Steganography is used to communicate secret information between two parties in such a manner that the existence of the secret message is hidden from the third person. The steganography is being used since a long time now and there are many approaches that have been proposed that provides steganographic application for hiding data in cover medium. The cover medium that is used to hide the secret data can be Images, Audio, or Video. The hiding of the secret data into the cover medium should not make any undesirable changes to the cover medium so that the originality of the medium is affected. The concept of audio steganography is to embed secret data into an audio file in such a manner that human auditory system (HAS) cannot detect the change that has been occurred due to embedding of the data into the audio file. The audio steganography uses approaches such as (Least Significant Bit) LSB, Spread spectrum, and Echo hiding along with other recent applications that has been developed in recent years. The properties of audio steganography [5] that is exploited in different steganography applications are 1. Confidentiality. 2. Imperceptibility. 3. Accurateness. 4. High capacity. 5. Resistance. 6. Visibility. 7. Survivability. 8. Difficult detectability. Audio steganography is found to be a tough approach to deal with then image steganography because human auditory system is much more sensible than human visual system. The idea is to embed the secret data into an audio file such that there is negligible difference between the original audio file and embedded file. While embedding the secret data the format has to be keep in mind so that that header part of the wave file (first 44 byte) [17] should be untouched because in case the header gets corrupted, the audio file will also corrupt. The second consideration that should be made is not to embed data into the silent zone [6] as that might cause undesirable change to the audio file. EMBEDDING PROCESS Fig. 1 General Steganography System (Stego-System) [16]. Fig. 2 Wave File Format [17]