CFP last date
20 May 2024
Reseach Article

A Survey on Audio Steganography Approaches

by Kamred Udham Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 14
Year of Publication: 2014
Authors: Kamred Udham Singh
10.5120/16660-6640

Kamred Udham Singh . A Survey on Audio Steganography Approaches. International Journal of Computer Applications. 95, 14 ( June 2014), 7-14. DOI=10.5120/16660-6640

@article{ 10.5120/16660-6640,
author = { Kamred Udham Singh },
title = { A Survey on Audio Steganography Approaches },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 14 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 7-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number14/16660-6640/ },
doi = { 10.5120/16660-6640 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:19:26.017119+05:30
%A Kamred Udham Singh
%T A Survey on Audio Steganography Approaches
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 14
%P 7-14
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today's internet community the secure data transfer is bounded due to its attack on data communication. Security of data can be achieved by implementing steganography techniques. All of the existing steganographic techniques use the digital multimedia files as a cover mediums to conceal secret data. Audio file use as a cover medium in steganography because of its larger size compare to other carrier's file such as text, image. So there are more possibilities to hide large amount of data inside digital audio file. Signals and digital audio files make suitable mediums for steganography because of its high level of redundancy and high data transmission rate. This is not easy to hide data in real time communication audio signals. In this paper we will survey the overall principles of hiding secret data in audio file using audio data hiding techniques, and deliver an overview of present techniques and functions and also discuss the advantages and disadvantages of different types of audio steganographic methods.

References
  1. R. Chandramouli and N. Memon, "Analysis of LSB Based Image Steganography" IEEE ICIP, pp. 1022-1022, Oct. 2001.
  2. R. J. Anderson, F. A. P. Petitcolas, "On the Limits of Steganography", IEEE Journal of Selected Area in Communications, pp. 474-481, May 1998.
  3. N. F. Johnson, S. Jajodia, "Staganalysis: The Investigation of Hiding Information", IEEE, pp. 113-116, 1998.
  4. H. Hastur, Mandelsteg, ftp://idea. sec. dsi. unimi. it/pub/security/crypt/code/
  5. Silman, J. , "Steganography and Steganalysis: An Overview",SANS Institute, 2001
  6. S. Das, B. Bandyopadhyay and S. Sanyal, " Steganography and steganalysis: different sapproaches",Cornell University Library, 2011.
  7. S. K. Bandyopadhyay, B. Bhattacharyya, D. Ganguly, S. Mukherjee, P. Das, "A tutorial review on steganography", International Conference on Contemporary Computing, 2008
  8. E Zwicker, H Fastl,Psychoacoustics(Springer Verlag, Berlin, 1990)
  9. R. Anderson, F. Petitcolas: On the limits of the steganography, IEEE Journal Selected Areas in Communications, VOL . 16, NO. 4, MAY 1998.
  10. FABIEN A. P. PETITCOLAS, ROSS J. ANDERSON, AND MA RKUS G. KUHN, Information Hid ing —A Survey, PROCEEDINGS OF THE IEEE, VOL. 87, NO. 7, JULY 1999.
  11. Bender W, Gruhl D, Morimoto N, Lu A (1996). "Techniques for data hiding" IBM Syst. J. , 35: 313-336.
  12. Cvejic N (2004). "Algorithms for audio watermarking and steganography", Department of Electrical and Information Engineering,Finland,University of Oulu.
  13. M. Asad, J. Gilani, and A. Khalid, "An enhanced least significant bit modification technique for audio steganography", 2011 International Conference on Computer Networks and Information Technology (ICCNIT), IEEE, 2011.
  14. K. Bhowal, A. Pal, G. Tomar, and P. Sarkar, "Audio steganography using GA", 2010 International Conference on Computational Intelligence and Communication Networks (CICN), IEEE, 2010.
  15. K Gopalan, Audio steganography using bit modification, Proceedings of the IEEE 2003 International Conference on Acoustics, Speech, and Signal Processing (ICASSP'03), (Hong Kong, April 2003)
  16. N Cvejic, T Seppiinen, Increasing the capacity of, LSB-based audio steganography, IEEE Workshop on Multimedia Signal processing. (St. Thomas, USA 2002), pp. 336–338
  17. N Cvejic, T Seppanen, Increasing Robustness of, LSB Audio Steganography Using a Novel Embedding Method, Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC04). vol. 2, (Washington, DC, USA, 2004), pp. 533
  18. N Cvejic, T Seppanen, Reduced distortion bit-modification for LSB audio steganography. J. Universal Comput. Sci. 11 (1), 56–65 (2005)
  19. MA Ahmed, LM Kiah, BB Zaidan, AA Zaidan, A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. Appl. Sci. 10, 59–64 (2010)
  20. D Gruhl, WBender, Echo hiding, proceeding of the 1st Information Hiding Workshop, Lecture Notes in Computer Science, (Isaac Newton Institute, England, 1996), pp. 295–315
  21. Jayaram P. , Ranganatha H R. , Anupama H S, " Information hiding using audio steganography – a survey" , International Journal of Multimedia & its applications ,Vol. 3, No. 3, August 2011
  22. Y Erfani, S Siahpoush, Robust audio watermarking using improved TS echo hiding. Digital Signal Process. 19, 809–814 (2009)
  23. Fatiha Djebbar, Beghdad Ayady, Habib Hamamzand Karim Abed-Meraim, "A view on latest audio steganography", International Conference on Innovations in Information Technology, 2011, pages 409-414.
  24. S Shirali-Shahreza, M Shirali-Shahreza, Steganography in Silence Intervals of Speech, proceedings of the Fourth IEEE International Conference on Intelligent Information Hiding and Multimedia Signal (IIH-MSP 2008). (Harbin, China, August 15-17, 2008), pp. 605–607
  25. S Shirali-Shahreza, M Shirali-Shahreza, Real-time andMPEG-1 layer III compression resistant steganography in speech, The Institution of Engineering and Technology Information Security. IET Inf. Secur. 4 (1), 1–7 (2010)
  26. F Djebbar, B Ayad, K Abed-Meraim, H Habib, Unified phase and magnitude speech spectra data hiding algorithm. Accepted in "Journal of Security and Communication Networks" (John Wiley and Sons, Ltd, 4 April, 2012)
  27. GS Kang, TM Moran, DA Heide, Hiding Information under Speech, Naval Research Laboratory, (Washington, DC NRL/FR/5550–05-10, 126, 2005), 20375-5320
  28. B Paillard, P Mabilleau, S Morissette, J Soumagne, PERCEVAL: Perceptual Evaluation of the Quality of Audio Signals. J. Audio Eng. Soc. 40, 21–31(1992)
  29. H Matsuka, in IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06)Spread spectrum audio steganography using sub-band phase shifting, (Pasadena, CA, USA, December 2006), pp. 3–6
  30. X Li, HH Yu, Transparent and robust audio data hiding in sub band domain, Proceedings of the Fourth IEEE International Conference on Multimedia and Expo, (ICME 2000), (New York, USA, 2000),pp. 397–400
  31. M Pooyan, A Delforouzi, Adaptive Digital Audio Steganography Based onInteger Wavelet Transform, Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007). vol. 2, (Splend or Kaohsiung ,Taiwan, 2007), pp. 283–28
  32. K Gopalan,et al, Covert Speech Communication Via Cover Speech By Tone Insertion, Proceeding of IEEE Aerospace Conference, (Big Sky, Montana, March 2003)
  33. K Gopalan, A unified audio and image steganography by spectrum modification, IEEE International Conference on Industrial Technology (ICIT'09), (Gippsl and, Australia, 10-13 Feb 2009), pp. 1–5
  34. Jisna Antony, Sobin C. C. , Sherly A. P. , "Audio steganography in wavelet domain A survey", International Journal of Computer Applications, volume 52 -no. 13, Aug 2012.
  35. N Cvejic, T Seppanen, A wavelet domain, LSB insertion algorithm for high capacity audio steganography, Proc. 10th IEEE Digital Signal Processing Workshop and 2nd Signal Processing Education Workshop, (Georgia, USA, 13-16 October, 2002), pp. 53–55
  36. S. Nehete, S. Sawarkar, and M. Sohani, "Digital audio steganography using DWT with reduced embedding error and better extraction compared to DCT", Proceedings of the International Conference & Workshop on Emerging Trends in Technology, ACM, 2011
  37. S Shirali-Shahreza, M Shirali-Shahreza, High capacity error free wavelet domain speech steganography, Proc. 33rd Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2008). (Las Vegas, Nevada, USA, 30 March 2008), pp. 1729–1732
  38. Haider Ismael Shahadi and Razali Jidin, "High capacity and inaudibility audio steganography scheme", 7th International Conference n Information Assurance and Security (IAS), IEEE, 2011
  39. K Khan, Cryptology and the origins of spread spectrum. IEEE Spectrum. 21, 70–80 (1984)
  40. Kaliappan Gopalan, "A Unified Audio and Image Steganography by Spectrum Modification", International Conference on Industrial Technology, 2009, Page(s):1,5
  41. K. Gopalan and S. Wenndt, "Audio steganography for covert data transmission by imperceptible tone insertion", Proceedings of Communications Systems and Applications, IEEE, 2004.
  42. K Gopalan, S Wenndt, Audio Steganography for Covert Data Transmissionby Imperceptible Tone Insertion, WOC 2004, (Banff, Canada, July 8–10,2004
  43. L Gang, AN Akansu, M Ramkumar, MP3 resistant oblivious steganography, Proceedings of, IEEE International Conference on Acoustics, Speech, and Signal Processing. Vol. 3, (Salt Lake City, UT. 7-11 May 2001),pp. 1365–1368
  44. Kumar S. B. , D. Bhattacharyya, P. Das, D. Ganguly and S. Mukherjee, "A tutorial review on Steganography", International Conference on Contemporary Computing (IC3-2008), Noida, India, August 7-9, 2008, pp. 105-114.
  45. Bender, W. , W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, "Techniques for datahiding", IBM Systems Journal, Volume 39, Issue 3-4, July 2000, pp. 547 – 568.
  46. WBender, D Gruhl, N Morimoto, A Lu, Techniques for Data Hiding. IBM Syst. J. 35(3 and 4), 313–336 (1996)
Index Terms

Computer Science
Information Sciences

Keywords

Robust Security Information Signal stego.