CFP last date
20 May 2024
Reseach Article

A Novel Audio Steganography Technique by M16MA

by Souvik Bhattacharyya, Arko Kundu, Gautam Sanyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 30 - Number 8
Year of Publication: 2011
Authors: Souvik Bhattacharyya, Arko Kundu, Gautam Sanyal
10.5120/3671-5113

Souvik Bhattacharyya, Arko Kundu, Gautam Sanyal . A Novel Audio Steganography Technique by M16MA. International Journal of Computer Applications. 30, 8 ( September 2011), 26-34. DOI=10.5120/3671-5113

@article{ 10.5120/3671-5113,
author = { Souvik Bhattacharyya, Arko Kundu, Gautam Sanyal },
title = { A Novel Audio Steganography Technique by M16MA },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 30 },
number = { 8 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 26-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume30/number8/3671-5113/ },
doi = { 10.5120/3671-5113 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:16:30.302123+05:30
%A Souvik Bhattacharyya
%A Arko Kundu
%A Gautam Sanyal
%T A Novel Audio Steganography Technique by M16MA
%J International Journal of Computer Applications
%@ 0975-8887
%V 30
%N 8
%P 26-34
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Though security is nothing new, the way that security has become a part of our daily life is unprecedented. Attacks, misuse or unauthorized access of information is of great concern today which makes the protection of documents through digital media is a priority problem. This urges users to devise new data hiding techniques through steganography principle to protect and secure the data of vital significance. Considerable amount of work has been carried out by different researchers on steganography. In this work the authors propose a novel audio based steganographic method for wav and mp3 format for hiding information. The proposed approach works by selecting the embedding positions using some mathematical function and maps each four bit of the secret message in each of the selected positions in a specified manner. A pseudo random number generator is used here to locate the embedding positions of the message bits randomly. This solution is independent of the nature of the data to be hidden and produces a stego audio with minimum degradation.

References
  1. Gustavus J. Simmons, The Prisoners' Problem and the Subliminal Channel, Proceedings of CRYPTO ,83(1984) 51-57.
  2. RJ Anderson, Stretching the Limits of Steganography, Information Hiding, Springer Lecture Notes in Computer Science, 1174 (1996) 39-48.
  3. Scott. Craver, On Public-key Steganography in the Presence of an Active Warden, Proceedings of 2nd International Workshop on Information Hiding., (1998) 355-368.
  4. Ross J. Anderson. and Fabien A.P.Petitcolas,On the limits of steganography, IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright and Privacy Protection,16(1998) 474-481.
  5. N.F.Johnson. and S. Jajodia, Steganography: seeing the unseen, in IEEE Computer, 16(1998) 26-34.
  6. T Mrkel., JHP Eloff and MS Olivier, An Overview of Image Steganography, in Proceedings of the fifth annual Information Security South Africa Conference, (2005).
  7. Souvik Bhattacharyya and Gautam Sanyal, Study of Secure Steganography model, in Proceedings of International Conference on Advanced Computing and CommunicationTechnologies,(2008).
  8. Souvik Bhattacharyya and Gautam Sanyal, Implementation and Design of an Image based Steganographic model, in Proceedings of IEEE International Advance Computing Conference,(2009).
  9. Souvik Bhattacharyya and Gautam Sanyal,An Image based Steganography model for promoting Global Cyber Security, in Proceedings of International Conference on Systemics, Cybernetics and Informatics,(2009).
  10. Arko Kundu, Kaushik Chakraborty and Souvik Bhattacharyya,Data Hiding in Images Using Mod 16 Method, in the Proceedings of ETECE 2011,(2011)
  11. W. Bender. and D. Gruhl, Steganography: Techniques for data hiding, in IBM SYSTEMS JOURNAL, 35(1996).
  12. Fabien A. P. Pettitcolas, Ross J. Anderson, and Markus G. Kuhn, Information Hiding-A Survey, in Proceedings of the IEEE, 87(1999).
  13. Nedeljko Cvejic and Tapio Seppben, Increasing the capacity of LSB-based audio steganography, in IEEE 2002, (2002).
  14. Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das, Debashis Ganguly and Swarnendu Mukherjee,A tutorial review on Steganography, in the Proceedings of International Conference on Contemporary Computing, (2008).
  15. Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal,A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier, in Journal of Global Research in Computer Science (JGRCS) VOL 2, NO 4 (2011),APRIL-2011.
  16. Natarajan Meghanathan and Lopamudra Nayak, Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media, in at International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010.
  17. S. Dowdy and S. Wearden. Statistics for research. Wiley. ISBN 0471086029, page 230, 1983.
  18. M. A. Jaro. Advances in record linking methodology as applied to the 1985 census of tampa florida. Journal of the American Statistical Society. 84:414–420, 1989.
  19. M. A. Jaro. Probabilistic linkage of large public health data file. Statistics in Medicine 14 (5-7)., pages 491–498, 1995.
  20. W. E. Winkler. The state of record linkage and current research problems. Statistics of Income Division, Internal Revenue Service Publication R99/04., 1999.
  21. Poulami Dutta, Debnath Bhattacharyya, and Tai-hoon Kim Data Hiding in Audio Signal: A Review at International Journal of Database Theory and Application, Vol. 2, No. 2, June 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Cover Audio Mod 16 Method for Audio (M16MA) Stego Audio