Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

Audio Steganography to Protect the Confidential Information: A Survey

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Elham Zinaly, Avaz Naghipour
10.5120/ijca2017914561

Elham Zinaly and Avaz Naghipour. Audio Steganography to Protect the Confidential Information: A Survey. International Journal of Computer Applications 169(1):22-29, July 2017. BibTeX

@article{10.5120/ijca2017914561,
	author = {Elham Zinaly and Avaz Naghipour},
	title = {Audio Steganography to Protect the Confidential Information: A Survey},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2017},
	volume = {169},
	number = {1},
	month = {Jul},
	year = {2017},
	issn = {0975-8887},
	pages = {22-29},
	numpages = {8},
	url = {http://www.ijcaonline.org/archives/volume169/number1/27950-2017914561},
	doi = {10.5120/ijca2017914561},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Steganography is a science to hide information, it hides a message to another object, and it increases the security of data transmission and archiving it. In the process of steganography, the hidden object in which data is hidden the carrier object and the new object, is called the steganography object. The multiple carriers, such as text, audio, video, image and so can be mentioned for steganography; however, audio has been significantly considered due to the multiplicity of uses in various fields such as the internet. For steganography process, several methods have been developed; including work in the temporary and transformation, each of has its own advantages and disadvantages, and special function. In this paper we mainly review and evaluate different types of audio steganography techniques, advantages and disadvantages.

References

  1. M. S. Subhedar, V. H. Mankar, Current status and key issues in image steganography: A survey, Computer Science Review, 13-14 (2014) 95-113.
  2. B. Chandel, S. Jain, Video Steganography: A Survey, IOSR JCE. 1 (2016) 11-17.
  3. N.F. Johnson, S. Jajodia, Exploring steganography: Seeing the unseen, Computer, 31 (1998) 26-34.
  4. R.B. Wolfgang, E.J. Delp III, Fragile watermarking using the VW2D watermark, In electronic imaging, International Society for Optics and Photonics, 1999, April, pp.204-213.
  5. M.D. Swanson, M. Kobayashi, A.H. Tewfik, Multimedia data-embedding and watermarking technologies, Proc. IEEE. 86 (1998) 1064-1087.
  6. D.C. Kar, C.J. Mulkey, A multi-threshold based audio steganography scheme, JISA.23 (2015) 54-67.
  7. M.B. Begum, Y. Venkataramani, LSB based audio steganography based on text compression, Procedia Eng. 30 (2012) 703-710.
  8. S. Banerjee, S. Roy, M.S. Chakraborty, S. Das, A variable higher bit approach to audio steganography, International Conference on Recent Trends in nformation Technology (ICRTIT), 2013, July, pp. 46-49.
  9. K. Bhowal, A.J. Pal, G.S. Tomar, P.P. Sarkar, Audio steganography using GA, International Conference on Computational Intelligence and Communication Networks, 2010, November, pp. 449-453, IEEE.
  10. P. Jayaram, H.R. Ranganatha, H.S. Anupama, Information hiding using audio steganography–a survey, IJMA. 3 (2011) 86-96.
  11. M. Asad, J. Gilani, A. Khalid, An enhanced least significant bit modification technique for audio steganography, International Conference on Computer Networks and Information Technology (ICCNIT), 2011, July, pp. 143-147,IEEE.
  12. N. Cvejic, Algorithms for audio watermarking and steganography, Department of Electrical and Information Engineering, Information Processing Laboratory, University of Oulu, 2004.
  13. G. Nehru, P. Dhar, A detailed look of audio steganography techniques using LSB and genetic algorithm approach, IJCSI. 9 (2012) 402-406.
  14. N. Cvejic, T. Seppanen, Increasing robustness of LSB audio steganography using a novel embedding method, International Conference on Coding and Computing (ITCC), 2004, April, pp. 533-537, IEEE.
  15. W. Stallings, Data and computer communications, 8th Edition, Pearson Prentice Hall, 2007.
  16. G.P. TVS, S. Varadarajan, A novel hybrid audio steganography for imperceptible data hiding, International Conference on Communication and Signal Processing (ICCSP), 2015, April, pp. 0634-0638, IEEE.
  17. A. Delforouzi, M. Pooyan, Adaptive digital audio steganography based on integer wavelet transform, Circ. Syst. Signal Pr. 27 (2008) 247-259.
  18. S. Nehete, S.D. Sawarkar, M. Sohani, Digital audio steganography using DWT with with reduced embedding error and better extraction compared to DCT, Proceedings of the International Conference & Workshop on Emerging Trends in Technology, 2011, February, pp. 167-168, ACM.
  19. H.I. Shahadi, R. Jidin, High capacity and inaudibility audio steganography scheme, 7th International Conference on Information Assurance and Security (IAS), 2011, December, pp. 104-109, IEEE.
  20. Y. Kakde, P. Gonnade, P. Dahiwale, Audio-video steganography, International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015, March, pp. 1-6, IEEE.
  21. M. Tayel, A. Gamal, H. Shawky, A proposed implementation method of an audio steganography technique, 18th International Conference on Advanced Communication Technology (ICACT), 2016, January, pp. 180-184, IEEE.
  22. V. Sharma, R. Thakur, LSB modification based audio steganography using trusted third party key indexing method, Third International Conference on Image Information Processing (ICIIP), 2015, December, pp. 403-406, IEEE.
  23. M. Tayel, A. Gamal, H. Shawky, A proposed implementation method of an audio steganography technique, 18th International Conference on Advanced Communication Technology (ICACT), 2016, January, pp. 180-184, IEEE.
  24. J. Vimal, A.M. Alex, Audio steganography using dual randomness LSB method, International Conference on Control Instrumentation Communication & Computational Technologies (ICCICCT), 2014, July, pp. 941-944, IEEE.

Keywords

Audio steganography, Cryptography, Image steganography, Information steganography, LSB method, Security.