CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Real Steganography in Non Voice Part of the Speech

by S. Abdul Kather, K. Vimal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 21
Year of Publication: 2012
Authors: S. Abdul Kather, K. Vimal
10.5120/7062-9463

S. Abdul Kather, K. Vimal . Real Steganography in Non Voice Part of the Speech. International Journal of Computer Applications. 46, 21 ( May 2012), 1-5. DOI=10.5120/7062-9463

@article{ 10.5120/7062-9463,
author = { S. Abdul Kather, K. Vimal },
title = { Real Steganography in Non Voice Part of the Speech },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 21 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number21/7062-9463/ },
doi = { 10.5120/7062-9463 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:40:35.441146+05:30
%A S. Abdul Kather
%A K. Vimal
%T Real Steganography in Non Voice Part of the Speech
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 21
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Embedding a secret message into a cover media without attracting any attention is known as steganography. Steganography is one of the methods used for hidden communication purposes. One of the cover media that can be used for steganography is speech. All the methods that we have found for audio steganography, changes the values of maximum number of samples from the audio signal. Usually change the sample values of the signal annoying the listener and reduce perceptual transparency. So the special methods are required for hiding the information in audio signal. In this paper, we propose a new steganographic method in speech signals. In this method, secret data are hidden in the silence part of the speech signal. The silence parts are identified by collaborative non voice detection algorithm. The secret data are hidden by reducing a small number of sample values from some samples of the silence part. The main features of our method is create the high perceptual transparent steganographic system with acceptable data hiding capacity This method can hide information in a speech stream with very low processing time that makes our method as a real-time steganography method.

References
  1. E. Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication, Wiley Publishing, USA, 2003.
  2. N. Cvejic, Algorithms for Audio Watermarking and Steganography, Oulu University Press, Finland, 2004
  3. N. Cvejic and T. Seppanen, "A wavelet domain LSB insertion algorithm for high capacity audio steganography, " Proceedings of 10th IEEE Digital Signal Processing Workshop and 2nd Signal Processing Education Workshop, October 2002, pp. 53- 55.
  4. BAOP. , MAX. : "MP3-resistant music steganography based on dynamic range transform". Proc. 2004 Int. Symp On Intelligent Signal Processing and Communication Systems (ISPACS 2004), 18–19 November 2004, pp. 266–271.
  5. HIRALI-SHAHREZA S. , MANZURI-SHALMANI M. T. : 'High capacity error free wavelet domain speech steganography'. Proc. 33rd Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2008), April 2008, pp. 1729–1732.
  6. GANG L. , AKANSU A. N. , RAMKUMAR M. : 'MP3 resistant oblivious steganography'. Proc. of 2001 IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'01), 7–11 May 2001, vol. 3, pp. 1365–1368.
  7. PETITCOLAS F. : MP3Stego, 2006, http://www. petitcolas. net/fabien/steganography/mp3stego/, accessed August 2009.
  8. WU Z. -J. , YANG W. , YANG Y. -X. : 'ABS-based speech information hiding approach', Electron. Lett. , 2003, 39, (22), pp. 1617–1619.
  9. SHIRALI-SHAHREZA S. , SHIRALI-SHAHREZA M, 'Real-time and MPEG-1 layer III compression resistant steganography in speech'. IET Information security 2010,vol. 4,Iss. 1,pp. 1-7.
  10. CVEJIC N. , SEPPA¨NEN T. : 'Increasing robustness of LSB audio steganography by reduced distortion LSB coding', J. Univers. Comput. Sci. , 2005, 11, (1), pp. 56–65.
  11. JUDGE J. C. : 'Steganography: past, present, future', SANS White Paper, 30 November 2001, http:// www. sans. org/ rr / papers/ index. php?id¼ 552, accessed August 2009.
  12. K. Gopalan, Audio steganography using bit modification, Proceeding, of International Conference an Multimedia and expo, July 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Steganograpgy Information Hiding Speech Signal Covert Communication Data Embedding