A Novel Approach to Secure Communication Using Audio Steganography

Article Preview

Abstract:

The digital information revolution has brought important changes in our society and life. Nowadays, large amount of data is transmitted over the network and if the data that is being transmitted is important, one should use secure technique like steganography to transmit it. Steganography is a method of hiding a secret message in a cover media such as text, image, audio etc. in a way that hides the existence of the secret data. This paper introduces new method for audio steganography. The proposed method works on the basis of low bit blind encoding scheme which is used to embed secret data into non-silent samples of wav audio file. Robustness and performance of the proposed scheme is investigated by performing experiments on different audio signals.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 403-408)

Pages:

963-969

Citation:

Online since:

November 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] K. B. Raja, C. R. Chowdary, Venugopal K R, L. M. Patnaik, A Secure Image Steganography using LSB, DCT, and Compression Techniques on Raw Images, , IEEE 0-7803-9588-3/05, March (2005).

DOI: 10.1109/icisip.2005.1619431

Google Scholar

[2] Lisa M. Marvel and Charles T. Retter, A Methodology for Data Hiding Using Images, IEEE 0-7803-4506-1/98, (1998).

Google Scholar

[3] G. Doerr and J.L. Dugelay, A Guide Tour of Video Watermarking, In Signal Processing: Image Communication, vol. 18, Issue 4, pp.263-282, (2003).

DOI: 10.1016/s0923-5965(02)00144-3

Google Scholar

[4] G. Do¨err and J.L. Dugelay, Security Pitfalls of Frameby-Frame Approaches to Video Watermarking, Trans. Signal Processing, Supplement on Secure Media, IEEE, vol. 52, Issue 10, pp.2955-2964, (2004).

DOI: 10.1109/tsp.2004.833867

Google Scholar

[5] Pramath Nath Basu and Tanmay Bhowmik, On Embedding of Text in Audio- A case of Steganography, International conference on Recent Trends in Information, Telecommunication and computing, (2010).

DOI: 10.1109/itc.2010.16

Google Scholar

[6] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM Systems Journal, vol. 35, issues 3&4, 1996, pp.313-336.

DOI: 10.1147/sj.353.0313

Google Scholar

[7] S.H. Low, N.F. Maxemchuk, J.T. Brassil and L. O'Gorman, Document marking and identification using both line and word shifting", Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM , 95), 2-6 April 1995, vol. 2, pp.853-860.

DOI: 10.1109/infcom.1995.515956

Google Scholar

[8] Kalavathi Alla and R. Siva Rama Prasad, An Evolution of Hindi Text Steganography, 6th ITNG 2009, proceedings of the Conference in IEEE computer Socienty digital library, 1577- 1579. doi. ieee. copmutersociety. org/10. 1109.

Google Scholar

[9] Nedeljko Cvejic, Tapio Seppanen. Increasing the capactity of LSB-based audio steganography [J]. inProc. IEEE International Workshop on Multimedia Signal Processing, St. Thomas, VI, December 2002, pp.336-338.

DOI: 10.1109/mmsp.2002.1203314

Google Scholar

[10] Yin Xiong and Zhang Xiao ming, Covert Communication Audio Watermarking Algorithm Based on LSB", IEEE Conferences Communication Technology, 2006. ICCT , 06, 2006 , p.1 – 4.

DOI: 10.1109/icct.2006.341972

Google Scholar

[11] Pramatha Nath Basu and Tanmay Bhowmik, "On Embedding of Text in Audio – A case of Steganography, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, P. 203-206, IEEE 2010, DOI 10. 1109/ITC. 2010. 16.

DOI: 10.1109/itc.2010.16

Google Scholar

[12] Mazdak Zamani, Azizah Bt Abdul Manaf and Rabiah Bt Ahmad, A Novel Approach for Audio Watermarking, 2009 Fifth International Conference on Information Assurance and Security, pp.83-86 (2009).

DOI: 10.1109/ias.2009.22

Google Scholar

[13] Masahiro Wakiyama, Yasunobu Hidaka and Koichi Nozaki, An audio steganography by a low-bit coding method with wave files, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, P. 530-533 IEEE2010, DOI 1109/IIHMSP. 2010. 135.

DOI: 10.1109/iihmsp.2010.135

Google Scholar

[14] Pradeep Kumar Singh and R.K. Aggrawal, Enhancement of LSB based Steganography for Hiding Image in Audio, International Journal on Computer Science and Engineering, Vol. 02, No. 05, 2010, 1652-1658.

Google Scholar

[15] Ravindranath C. Cherukuri, Sos S. Agaian, and Chinni. V. C. Atluri, Key Dependent Covert Communication System for Audio Signals, 2007 IEEE International Conference on Systems, Man, and Cybernetics, 7-10 October, 2007, ISBN 1-4244-0991-8/07, p.2050-(2055).

DOI: 10.1109/icsmc.2007.4413748

Google Scholar

[16] Wei Cao, Yixin Yan and Shengming Li, Bit Replacement Audio Watermarking Using Stereo Signals, 2009 International Conference on New Trends in Information and Service Science, pp.603-606, 2009 IEEE, DOI 10. 1109/NISS. 2009. 234.

DOI: 10.1109/niss.2009.234

Google Scholar

[17] Sameer Mitra and Sathiamoorthy Manoharan, Experiments with and Enhancements to Echo Hiding, 2009 Fourth International Conference on Systems and Networks Communications, pp.119-124, 2009 IEEE, DOI 10. 1109/ICSNC. 2009. 76.

DOI: 10.1109/icsnc.2009.76

Google Scholar

[18] G. J Simmons, Prisoner's Problem and the Subliminal Channel (The), CRYPTO83 – Advances in Cryptology, pp.51-67, (1984).

Google Scholar