CFP last date
20 June 2024
Reseach Article

Audio Steganography using Echo Hiding in Wavelet Domain with Pseudorandom Sequence

by Sounak Lahiri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 140 - Number 2
Year of Publication: 2016
Authors: Sounak Lahiri

Sounak Lahiri . Audio Steganography using Echo Hiding in Wavelet Domain with Pseudorandom Sequence. International Journal of Computer Applications. 140, 2 ( April 2016), 16-22. DOI=10.5120/ijca2016909223

@article{ 10.5120/ijca2016909223,
author = { Sounak Lahiri },
title = { Audio Steganography using Echo Hiding in Wavelet Domain with Pseudorandom Sequence },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 140 },
number = { 2 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 16-22 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016909223 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:41:11.220103+05:30
%A Sounak Lahiri
%T Audio Steganography using Echo Hiding in Wavelet Domain with Pseudorandom Sequence
%J International Journal of Computer Applications
%@ 0975-8887
%V 140
%N 2
%P 16-22
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

This paper deals with the encoding of message bits in a cover audio carrier signal. It applies the basic concepts of audio steganography in transform domain to achieve higher efficiency in data transmission, while preserving the secrecy of the information being transmitted. The proposed model in this paper deals with the application of echo hiding of binary message bits in the carrier signal, in the transform coefficients obtained by applying 2D- discrete Haar Wavelet Transform on the cover signal. Moreover, this algorithm applies pseudorandom sequence to encode the data, which gives the method more efficiency and prevents unauthorized decoding at any moment. The application of echo hiding technique makes the stego signal more immune to noise and disturbances, during transmission through the channel network. The performance of this method is analyzed on the basis of the output SNR and PSNR values calculated for several test cases, that has been discussed later in the paper.

  1. Sumeet Gupta, Dr. Namrata Dhanda,2015, “ Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT)”, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. V (Mar – Apr. 2015), PP 32-44
  2. Piotr Porwik, Agnieszka Lisowska,2004, “The Haar–Wavelet Transform in Digital Image Processing:Its Status and Achievements”, Machine GRAPHICS & VI SION vol . 13, n o. 1/2, 2004, p p .79-98
  3. Ali M. Meligy, Mohammed M. Nasef, Fatma T.Eid,2015, ” An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys”, I. J. Computer Network and Information Security, 2015, 7, 24-29
  4. D. M. Ballesteros L and J. M. Moreno ,” Highly transparent steganography model of speech signals using Efficient Wavelet Masking ” Expert Systems with Applications, vol .39, 2012.
  5. K.P.Adhiya and S.A. Patil,”Hiding Text in Audio UsingLSB Based Steganography”, Information and KnowledgeManagement, Vol 2-No.3, 2012.
  6. H.I. Shahadi, R. Jidin and W.H. Way, “Lossless Audio Steganography based on Lifting Wavelet Transform and Dynamic Stego Key,”, Indian Journal of Science and Technology, Vol 7-No. 3, March 2014.
  7. N. Gupta and Ms. N. Sharma, “Dwt and Lsb Based Audio Steganography”, International Conference on Reliability, Optimization and Information Technology (ICROIT), Feb 6-8 2014.
  8. M. P. Jain, Prof.V. Trivedi “Effective Audio Steganography by using Coefficient Comparison in DCT Domain”, International Journal of Engineering Research & Technology (IJERT), Vol. 2, Issue 8, August – 2013.
  9. Jayaram P, Ranganatha H R, Anupama H S,2011,” INFORMATION HIDING USING AUDIO STEGANOGRAPHY – A SURVEY”, The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011
  10. Sajad Shirali-Shahreza M.T. Manzuri-Shalmani “High capacity error free wavelet domain speech steganography” ICASSP 2008
  11. V. Vapnik, “Statistical Learning Theory”, John Wiley, 2008.
  12. Ary Mazharuddin Shiddiqi, Tirta Priambadha, Baskoro Adi Pratomo,” ECHO DATA HIDING STEGANOGRAPHYAND RSA CRYPTOGRAPHY ON AUDIO MEDIA”, INDUSTRI Vol. 11 No. 1 : 1-9 ISSN 1693-0533
  13. Jisna Antony, Sobin c. C,Sherly A. P,” Audio Steganography in Wavelet Domain – A Survey”, International Journal of Computer Applications (0975 – 8887) Volume 52– No.13, August 2012
  14. C.P.Sumathi, T.Santanam and G.Umamaheswari,” A Study of Various Steganographic Techniques Used for Information Hiding”, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.6, December 2013
  15. Radomir S. Stankovi_c a, Bogdan J. Falkowski,” The Haar wavelet transform: its status and achievements”, Elsevier, Computers and Electrical Engineering 29 (2003) 25–44
Index Terms

Computer Science
Information Sciences


2D-Discrete Haar Wavelet Transform Pseudorandom sequence Echo Hiding.