CFP last date
20 May 2024
Reseach Article

Article:Information Hiding in Audio Signals

by H.B.Kekre, Archana Athawale, Swarnalata Rao, Uttara Athawale
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 9
Year of Publication: 2010
Authors: H.B.Kekre, Archana Athawale, Swarnalata Rao, Uttara Athawale
10.5120/1278-1623

H.B.Kekre, Archana Athawale, Swarnalata Rao, Uttara Athawale . Article:Information Hiding in Audio Signals. International Journal of Computer Applications. 7, 9 ( October 2010), 14-19. DOI=10.5120/1278-1623

@article{ 10.5120/1278-1623,
author = { H.B.Kekre, Archana Athawale, Swarnalata Rao, Uttara Athawale },
title = { Article:Information Hiding in Audio Signals },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 7 },
number = { 9 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume7/number9/1278-1623/ },
doi = { 10.5120/1278-1623 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:55:51.876721+05:30
%A H.B.Kekre
%A Archana Athawale
%A Swarnalata Rao
%A Uttara Athawale
%T Article:Information Hiding in Audio Signals
%J International Journal of Computer Applications
%@ 0975-8887
%V 7
%N 9
%P 14-19
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the practice of encoding secret information in indiscernible way. Audio Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is mainly required for increasing security in transferring and archiving of audio files. Steganography complements rather than replaces encryption by adding another layer of security- it is much more difficult to decrypt a message if it is not known that there is a message. The basic idea of the paper is to present methods that hides information (audio, image and text) in cover audio using Least Significant Bit (LSB) coding method along with encryption so as to increase the security. Two novel methods have been proposed in this paper, one is considering parity of the digitized samples of cover audio and the other is considering the XOR operation. A novel method which is an extension to the XOR method that uses multiple LSB’s for data embedding is also proposed. Experimental results are presented in this paper to demonstrate the effectiveness of the proposed methods. In addition, subjective listening tests are performed and the perceptual quality of the stego audio signal is found to be high.

References
  1. Shahreza S.S. and Shalmani M.T.M., “Adaptive wavelet domain audio steganography with high capacity and low error rate”, in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, pp: 1729 – 1732, 2008.
  2. “audio steg: overview”, Internet publication on www.snotmonkey.com http://www.snotmonkey.com/work/school/405/overview.html.
  3. Nedeljko Cvejic , “ Algorithms for audio watermarking and steganography”, http://herkules.oulu.fi/isbn9514273842/isbn9514273842.pdf,
  4. Gary C. Kessler, “Steganography: Hiding Data Within Data”, http://www.garykessler.net/library/steganography.html, September 2001.
  5. C. Parthasarathy and Dr. S.K.Srivatsa, “Increased Robustness Of Lsb Audio Steganography By Reduced Distortion Lsb Coding” 2005. www.jatit.org/volumes/research-papers/Vol7No1/9Vol7No1.pdf,
  6. Dr.H.B.Kekre and A.A.Archana, “Information hiding using LSB technique with increased capacity”, International Journal of Cryptography and Security, vol. 1, No.2, October 2008.
  7. Nicola Cocchiaro, http://stegui.sourceforge.net/intro.html.
  8. Zamani M., Ahmad R.B., Manaf A.B.A., Zeki A.M., “An Approach to Improve the Robustness of Substitution Techniques of Audio Steganography”, in Proc. IEEE International Conference on Computer Science and Information Technology, ICCSIT pp: 5-9, 2009.
  9. “audio steg: methods”, Internet publication on www.snotmonkey.com http://www.snotmonkey.com/work/school/405/methods.html
  10. Soumyendu Das, Subhendu Das, Bijoy Bandyopadhyay and Sugata Sanyal, “Steganography and Steganalysis: different approaches”, http://www.tifr.res.in/~sanyal/papers/Soumyendu_Steganography_Steganalysis_different_approaches.pdf.
  11. N. Cvejic, T. Seppanen, "Increasing Robustness of LSB Audio Steganography using a novel embedding method", in Proc. IEEE Int. Conf Info. tech.: Coding and Computing, Vol. 2, pp.533-537, April 2004.
  12. Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee and Poulami Das, “A Tutorial Review on Steganography”. http://www.jiit.ac.in/jiit/ic3/IC3_2008/IC3-2008/APP2_21.pdf
Index Terms

Computer Science
Information Sciences

Keywords

Information Hiding Audio Steganography Cryptography Least Significant Bit (LSB) coding Human Auditory System (HAS)