Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

An Optimized Method for Concealing Data using Audio Steganography

International Journal of Computer Applications
© 2011 by IJCA Journal
Volume 33 - Number 4
Year of Publication: 2011
Md. Shafakhatullah Khan
V.Vijaya Bhasker
V. Shiva Nagaraju

Md. Shafakhatullah Khan, V.Vijaya Bhasker and Shiva V Nagaraju. Article: An Optimized Method for Concealing Data using Audio Steganography. International Journal of Computer Applications 33(4):25-30, November 2011. Full text available. BibTeX

	author = {Md. Shafakhatullah Khan and V.Vijaya Bhasker and V. Shiva Nagaraju},
	title = {Article: An Optimized Method for Concealing Data using Audio Steganography},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {33},
	number = {4},
	pages = {25-30},
	month = {November},
	note = {Full text available}


In this paper, we propose a new approach which is sophisticated for concealing the data. We are using Audio Steganography to make the confidential data more secure, so that the data cannot be tracked and modified by the intruders. To make the confidential data secure we are using efficient and reliable algorithms. This paper describes how the data is secured form the intruders even though they trace the audio file which contains the confidential data.


  • Ahmad Delforouzi, Mohammad Pooyan, “Adaptive Digital Audio Steganography Based on Integer Wavelet Transform”.
  • N. Cvejic, T. Seppanen, “Increasing robustness of LSB audio steganography using a novel embedding method,” In Proc. IEEE Int. Conf. Info. Tech. : Coding and Computing, Vol. 2, pp. 533-537, April 2004.
  • N. Cvejic, T. Seppanen, “Increasing the capacity of LSBbased audio steganography.” IEEE Workshop on Multimedia Signal Processing, pp. 336-338, 2002.
  • S.S. Agaian, D. Akopian, O. Caglayan, S. A. D’Souza, “Lossless Adaptive Digital Audio Steganography,” In Proc. IEEE Int. Conf. Signals, Systems and Computers, pp. 903-906, November 2005.
  • N. Cvejic, T. Seppanen, “A wavelet domain LSB insertion algorithm for high capacity audio steganography,” In Proc. IEEE Digital Signal Processing Workshop, Callaway Gardens, GA, p. 53–55, October 2002.
  • K. Gopalan, “Audio steganography using bit modification,” Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Vol. 2, pp. 421-424, April 2003.
  • P. Bao and X. Ma, “MP3-Resistant Music Steganography based on Dynamic Range Transform,” IEEE Int. Sym. Intelligent Signal Processing and Communication Systems, pp. 266-271, Nov. 18-19, 2004, Seoul, Korea.
  • R. A. Santosa, P. Bao, “Audio-to-image wavelet transform based audio steganography,” IEEE Int. Symp. pp. 209-212, June 2005, Zadar, Croatia.
  • H. Matsuka, “Spread Spectrum Audio Steganography using Sub-band Phase Shifting,” IEEE Int. conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP' 06), pp. 3-6, Dec. 2006 , Pasadena, CA, USA.
  • R SRIDEVI, DR. A DAMODARAM, DR. SVL.NARASIMHAM “Efficient Method or Audio Steganography by modified LSB Algorithm and Strong Encryption Key with Enhanced Security”. In Proc. JATIT. PP: 768-771, 2005-2009.
  • Sterling, M.; Titlebaum, E.L.; Xiaoxiao Dong; Bocko, M.F.; “An adaptive spread-spectrum data hiding technique for digital audio”. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). Publication Year: 2005 , Page(s): v/685 - v/688 Vol. 5
  • Westlund, Harold B. (2002). "NIST reports measurable success of Advanced Encryption Standard". Journal of Research of the National Institute of Standards and Technology.
  • 3 Hsiang H., and ShihW. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, doi: 10. 1016j. csi.2008.11.002.
  • J.Johnston, “Transform Coding of Audio Signals Using Perceptual Noise Criteria”, IEEE Journal on Selected Areas in Communication, vol.6, pp.314-323, February, 1988.
  • Ou, George (April 30, 2006). "Is encryption really crackable?". Ziff-Davis. Archived from the original on August 7, 2010. Retrieved August 7, 2010.