STEGANOGRAPHY APPLICATION PROGRAM USING THE ID3V2 IN THE MP3 AUDIO FILE ON MOBILE PHONE

The MPEG Layer-III File or MP3 can contain the ID3v2 tag which able to store information not only the song and singer’s name but also song lyric and alblum cover figure. The steganography technique on audio generally only make use of the main body of the audio file, but has not ever use the part of the ID3v2 to hide an message. This study an steganography technique which make use of this ID3v2 tag space where message is encrypted using McEliece cryptosystem method which applying the public key in the form of matrix then inserted into the MP3 file applying Before All Frames (BAF) method, whereas the public key is inserted into album cover figure which is stored in the ID3v2 tag.


INTRODUCTION
Steganography comes from the Greek "stego" which means closed and "Graphia" which means writing. Steganography is the art and science of hiding the fact ongoing communication (Krenn, 2004).
One of the triggers in steganography technic development is steganalis attack which is succesful cracking message that hidden by using the widely known stegnogrphy method. It encourage a desire to find an alternative of the message hiding method that has never been thought before.
Most of the traditional methods available today use the pixel bits of an image to hide information and are limited in terms of hiding capacity (Raphael and Sundaram, 2012).
Other research developed an application which can check the Email content of corporate mails by S-DES algorithm along with the neural networks back propagation approach. A new filtering algorithm is also developed which can used to extract only the JPG images from the corporate emails. Experimental research shows that this algorithm is more accurate and reliable than the conventional methods (Anitha, 2012).
This journal would show an alternative method design of steganography which make use of the ID3v2 tag contained on MP3 file . The ID3v2 Tag is used on audio file for storing the additional datasuch as the information of singer's name, song title, album title, even the album cover figure (Nilsson, 1999). It open the possibility that the ID3v2 can be used for hiding a message. On this design, the MP3 file is chosed as file stego due to the MP3 file format has been widely known and has very highly traffic in Internet so that it would not arouse suspicion that there is a hidden message within the file.
The message concealment in the audio file use the Before All Frames (BAF) method where the message partition is hidden before each the MP3frame so that the mesaage can be hidden without spoil the sound quality,therefor this method selected to be used in this design (Atoum et al., 2011). As additional security this design apply McEliece cryptosystem which use the relative huge matrix as public key. The this matrix is also hidden in audio file (Cherowitzo, 2002).
In addition to these arrangement, recently the information technology really brings out mobile aspect, therefore this designed audio steganography programme make use of Android mobile platform which also prove that mobile platform can be applied to run steganography program. Android is opensource software toolkit for mobile device developed Science Publications JCS by Google and Open Handset Alliance (Burnette, 2010). Mobile platform such as android can be used to run steganography programs (Shahreza, 2005).

THE ARCHITECTURE SYSTEM
The required program is the audio steganography application program which is running on Android operation system. Broadly speaking the designed program is described as follow: The operated program able to carry out the two main tasks: Message encryption and decryption shown in Fig. 1. When encrypt message, the user shall choose the message that will be inserted and the core file where the message will be inserted in order to produce the file stego that can be sent to the addressee. Conversely, in decryption process user shall select the file stego to read the hidden message.
In technical aspect, the proposed steganography technique requires a message string that will be inserted and a MP3 that contained Tag ID3v2 in the form of the album cover figure as a medium.
In this designed program, firstly the message shall be encrypted by using McEliece cryptosystem method which apply public key that take the form of matrix. Subsequently the encrypted message is inserted to the MP3 file by using the Before All Frames (BAF) method where message partition stored in each before the MP3 file frame MP3, whereas the public key is inserted into the album cover figure stored in the ID3v2 tag by using Least Significant Bit (LSB) method (Krenn, 2004). Alternatively, the encrypted message can be also stored in the ID3v2tag whereas the public key stored in each before the MP3 frame.

THE DESIGN
This study used a waterfall model as software development life cycle. Water fall model with five stages, namely: Communication, planning, modeling, construction and deployment (Pressman, 2010).
This steganography program design in broad terms is divided into some stages as follow: • Designing MP3 application program by using Android • Applying the steganografi BAF technique and McEliece to application program • Designing steganography application program along with screen display The designed program able to operate two main task that are Message Encryption and Decryption. The basic algorithm of encryption process (encoding) for the designed program shall be as follow shown in Fig. 2.
As for the basic algorithm of decryption process (decoding) for the designed program shall be as follow shown in Fig. 3.
Examples of display application on mobile device shown in Fig.4.

RESULTS
Usage test of this steganography application program resulting in the message can be inserted to the MP3 file and after decrypt the message can be read perfectly without any slightest change. Based on human hearing the sound is not changed at all, there is no any disturbing spoiled sound such as noise or crackling. The sound quality doesn't change because the sound is inserted outside the reach of the existing MP3 frames so that it does not change composition of the sound data raw at all. To see the influence of message inserting process on the main file, the writer try to carry out embedding process in some MP3 file and apply some different message string to be inserted. The following Table 1 is  the information table of the applied MP3 file and Table  2 is the information table of the inserted message string.
The following is table of the program evaluation result with the MP3 file input and message string according to the above tables. The Table 3 shows the file size after the message has been inserted, whereas Table  4 shows the duration of embedding time.
The Table 1 implies that the maximum capacity of every MP3 file is influenced by the amount of frames contained in the MP3 file body. The character amount (byte) that can be stored is a half of the existing frame amount. It because the cryptography method McEliece with Hamming (Shahreza, 2005) that is applied resulting in cipher text that is twice bigger than the original message.
The Table 3 and 4 imply that inserting process of the 24-88 byte message into the 3-5 MB MP3 file takes 2000-3000 milliseconds, but it is not depend on the file size, the frame amount or the long of message. Meanwhile, the size of the resulted stego file approximately is the size of the original file added by twice of the message long.

CONCLUSION
• The ID3v2 Tag on MP3 file can be used in the steganography technique on audio file. • The mobile steganography application program to hide message in this MP3 ID3v2 tag is designed by combining BAF (Before All Frames) steganography technique with McEliece cryptosystem so that message and public key can be hidden in the ID3v2 tag and the body of MP3 file itself • Using the designed method the message can be well hidden, without spoil the sound quality in the least, with the size of file change unobtrusively, take the relative short time and message can be perfectly decrypted