Call for Paper - October 2014 Edition
IJCA solicits original research papers for the October 2014 Edition. Last date of manuscript submission is September 20, 2014. Read More

Secure Audio Steganography for Hiding Secret information

Print
PDF
IJCA Proceedings on International Conference in Recent trends in Computational Methods, Communication and Controls (ICON3C 2012)
© 2012 by IJCA Journal
ICON3C - Number 6
Year of Publication: 2012
Authors:
K. Sakthisudhan
P. Prabhu
P. Thangaraj

K Sakthisudhan, P Prabhu and P Thangaraj. Article: Secure Audio Steganography for Hiding Secret information. IJCA Proceedings on International Conference in Recent trends in Computational Methods, Communication and Controls (ICON3C 2012) ICON3C(6):33-37, April 2012. Full text available. BibTeX

@article{key:article,
	author = {K. Sakthisudhan and P. Prabhu and P. Thangaraj},
	title = {Article: Secure Audio Steganography for Hiding Secret information},
	journal = {IJCA Proceedings on International Conference in Recent trends in Computational Methods, Communication and Controls (ICON3C 2012)},
	year = {2012},
	volume = {ICON3C},
	number = {6},
	pages = {33-37},
	month = {April},
	note = {Full text available}
}

Abstract

In present day to day life, effective data hiding methods are needed due to attack made on data communication. This paper presents the technique for the above requirement. In this proposed method, secret message in form of audio file is embedded within another carrier audio file (. wav) . In the transmitter end the output will be similar to the carrier with secret message embedded inside. The hacker will be blinded by the transmitted signal. At the receiver end the original message can be retrieved without any loss. The entire proposed system is simulated and their corresponding waveforms prove the effectiveness of this method.

References

  • Gopalan. , "Audio steganography using bit modification", 2003 IEEE International conference on Acoustic, Speech and Signal Processing page(s): II – 421 -4 vol. 2. [2 ] Muhammad Asad, Junaid Gilani, Adnan Khalid "An Enhanced Least Significant Bit Modification Technique for Audio Steganography", 2011 international conference on Computer Networks and Information Technology (ICCNIT), pages 143-147
  • Zamani, M. , Manaf, A, Ahmad, R. B. , Jaryani, F. , Taherdoost H. , Zeki, AM. ,"A secure audio steganography approach", International Conference for Internet Technology and Secured Transactions 2009, Page(s):1 - 6.
  • Kaliappan Gopalan, "A Unified Audio and Image Steganography by Spectrum Modification", International Conference on Industrial Technology, 2009, Page(s):1 – 5
  • Raja K B, Chowdary C R, Venugopal K R, Patnaik L M "A Secure Image Steganography using LSB DCT and Compression Techniques on Raw Images" 2005 IEEE International conference on session B-image signal processing.
  • Hossein Malekmohamadi and Shahrokh Ghaemmaghami Reduced Complexity Enhancement Of Steganalysis Of LSB-matching Image Steganography" 2009 IEEE/ACS International conference on computer system and applications.
  • Balagi R, Naveen G"Secure Data Transmission Using Video Steganography", 2011 IEEE International conference on electro/information technology (EIT).
  • Andrew D. Ker, "Steganalysis of Embedding in Two Least-Significant Bits" 2007 IEEE transactions on information forensics and security, vol. 2, no. 1, march 2007.
  • W. Mazurczyk and Jozef Lubacz, "LACK– a VoIP Steganographic Method", Journal of Telecommunication System, Springer Netherlands, Dec. , 2009.
  • D. LIamas, C Allison and A Miller, "Covert Channels in Internet Protocols: A Survey", 2005 at http://grayworld. net/papers/0506-PGNET-Paper. pdf.
  • D. V. Forte et al. "SecSyslog: An Approach to Secure Logging Based on Covert Channels," Proc. First Int'l Wksp. Systematic Approaches to Digital Forensic Engineering, Nov. 2005, pp. 248-263.
  • Wilfrid J. Dixon, Frank J. Massey: Introduction to Statistical Analysis. McGrawHill Book Company, Inc. , New York 1957.
  • Neil F. Johnson, Sushil Jajodia: Steganalysis of Images Created Using Current Steganography Software, in David Aucsmith (Ed. ): Information Hiding, LNCS 1525, Springer-Verlag Berlin Heidelberg 1998. pp. 32–47
  • M. R. Nelson: LZW Data Compression. Dr. Dobb's Journal, October 1989.
  • Birgit P?tzmann, Information Hiding Terminology, in Ross Anderson (Ed. ): Information Hiding. First International Workshop, LNCS 1174, Springer-Verlag Berlin Heidelberg 1996. pp. 347–350
  • Robert Tinsley, Steganography and JPEG Compression, Final Year Project Report, University of Warwick, 1996
  • Terry Welch: A Technique for High-Performance Data Compression. IEEE Computer, June 1984.
  • http://lifehacker. com/5807289/how-to-hide-secret- messages-and-codes-in-audio-files
  • Hide and Seek, http://www. rugeley. demon. co. uk/ security/hdsk50. zip
  • S-Tools,ftp://idea. sec. dsi. unimi. it/pub/security/crypt/ code/s-tools4. zip