CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Message Guided Adaptive Random Audio Steganography using LSB Modification

by Taruna, Rishabh Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 7
Year of Publication: 2014
Authors: Taruna, Rishabh Jain
10.5120/14995-2634

Taruna, Rishabh Jain . Message Guided Adaptive Random Audio Steganography using LSB Modification. International Journal of Computer Applications. 86, 7 ( January 2014), 6-9. DOI=10.5120/14995-2634

@article{ 10.5120/14995-2634,
author = { Taruna, Rishabh Jain },
title = { Message Guided Adaptive Random Audio Steganography using LSB Modification },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 7 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number7/14995-2634/ },
doi = { 10.5120/14995-2634 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:34.310856+05:30
%A Taruna
%A Rishabh Jain
%T Message Guided Adaptive Random Audio Steganography using LSB Modification
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 7
%P 6-9
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is an art of hiding secret messages such that its very presence can't be identified. Techniques which hide more secret data in cover files are better and they will be more better if they doesn't affect transparency of cover signal and make steganalysis difficult. We propose a technique which provide keyless randomization to insert secret information in multiple and variable LSBs. Using this method, binary cover signal is divided into blocks of size 8x8 with 16 bits per sub block, and then checking each sub block's first two MSBs to find how many LSBs will be used for insertion of secret data bits. Results show that there is no noticeable difference between cover audio signal and stego audio signal. Capacity and security increases due to the use of variable number of LSBs for insertion and keyless randomization provided by counting out technique.

References
  1. Fatiha Djebbar et al, "A view on latest audio steganography techniques", IEEE international conference on innovations in information and technology, 2011.
  2. Zamani M. , Ahmad R. B. , Manaf A. B. A. , Zeki A. M. , "An Approach to Improve the Robustness of Substitution Techniques of Audio Steganography", in Proc. IEEE International Conference on Computer Science and Information Technology, ICCSIT pp: 5-9, 2009
  3. "Audio steg: overview", Internet publication on www. snotmonkey. com.
  4. http://www. snotmonkey. com/work/school/405/overview. html.
  5. Sarosh K. Dastoor,"Comparative Analysis of Steganographic Algorithms intacting the information in the Speech Signal for enhancing the Message Security in next Generation Mobile devices", IEEE World Congress on Information and Communication Technologies 2011.
  6. Martin Alvaro, Sapiro Guillenno and Seroussi Gadiel, "Is Image Steganography Natural?", IEEE Transactions On Image Processing, Vol. 14, No. 12, December, 2005.
  7. Cvejic N. and Seppanen T. "Increasing the capacity of LS B based audio steganography", Proc. 5th IEEE International Workshop on Multimedia Signal Processing, St. Thomas, VI, December 2002, pp. 336-338.
  8. Anupam Kumar Bairagi, Saikat Mondal, Amit Kumar Mondal, "A Dynamic Approach In Substitution Based Audio Steganography", IEEE/OSA/IAPR International Conference on Infonnatics, Electronics & Vision, 2012.
  9. Dr. H. B. Kekre et al, "Increasing the Capacity of the Cover Audio Signal by Using Multiple LSBs for Information Hiding", IEEE Third International Conference on Emerging Trends in Engineering and Technology, 2010.
  10. N. Cvejic, T. Seppanen, "Increasing the capacity of LSB Audio Steganography using a novel embedding method", in Proc. IEEE Int. Conf Info. tech. : Coding and Computing, Vol. 2, pp. 533-537, April 2004.
  11. Haider Ismael Shahadi and Razali Jidin, "High Capacity and Inaudibility Audio Steganography scheme", 7th International Conference on Information Assurance and Security (IAS), 2011
Index Terms

Computer Science
Information Sciences

Keywords

Data hiding Audio steganography Least significant bit (LSB) Most significant bit (MSB) counting out technique Human Auditory System (HAS) Robustness.