Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Research Article

Hiding Capacity and Audio Steganography Model Based on LSB in Temporal Domain

Author(s): Anju Gera* and Vaibhav Vyas

Volume 16, Issue 2, 2022

Published on: 09 July, 2021

Article ID: e090721194675 Pages: 10

DOI: 10.2174/1872212115666210709170455

Price: $65

Abstract

Background: Researchers for data hiding using the various encrypting techniques to improve the security of transmission of confidential information through an unsecured channel have been carried out.

Methods: In this paper, a new higher recognition Least Significant Bit (LSB) audio data concealment is suggested in this framework. This technique is used to embed the hidden audio into cover audio of the same size.

Results: The altered speech file appears as the original carrier file after embedding the secret message. This model strengthens hiding capability and audio quality.

Conclusion: The strategy outperforms similar studies by enhancing hiding capability up to 30% and preserving stego audio transparency with the SNR value at 72.2 and SDG at 4.8.

Keywords: Steganography, Human Auditory System (HAS), coding and decoding, Least Significant Bit (LSB), SNR, interent.

Graphical Abstract
[1]
P.P. Balgurgi, and S.K. Jagtap, Audio Steganography used for secure data transmissionProceedings of International Conference on Advances in Computing, 2013, pp. 699-706.
[http://dx.doi.org/10.1007/978-81-322-0740-5_83]
[2]
F. Djebbar, B. Ayad, H. Hamam, and K. Abed-Meraim, "A view on the latest audio steganography techniques" 2011 International Con-ference on Innovations in Information Technology, 2011, pp. 409-414.
[http://dx.doi.org/10.1109/INNOVATIONS.2011.5893859]
[3]
F. Djebbar, B. Ayad, K.A. Meraim, and H. Hamam, "Comparative study of digital audio steganography techniques", EURASIP J. Audio Speech Music Process., vol. 2012, no. 1, pp. 1-16, 2012.
[http://dx.doi.org/10.1186/1687-4722-2012-25]
[4]
Ranganatha Jayaram, "Information hiding using audio steganography - a survey", Int. J. Multimed. Appl., vol. 3, no. 3, pp. 86-96, 2011.
[http://dx.doi.org/10.5121/ijma.2011.3308]
[5]
Z. Su, G. Zhang, F. Yue, L. Chang, J. Jiang, and X. Yao, "SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking", IEEE Trans. Multimed., vol. 20, no. 10, pp. 2631-2644, 2018.
[http://dx.doi.org/10.1109/TMM.2018.2812599]
[6]
R. Tanwar, K. Singh, M. Zamani, A. Verma, and P. Kumar, An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer.J. Comput. Netw. Commun., vol. 2019, .e5124364 2019
[http://dx.doi.org/10.1155/2019/5124364]
[7]
A. Olawale, A. Adebayo, and G. Arome, "Embedding text in audio steganography system using advanced encryption standard, text com-pression and spread spectrum techniques in mp3 and mp4 file formats", Int. J. Comput. Appl., vol. 177, no. 41, pp. 46-51, 2020.
[http://dx.doi.org/10.5120/ijca2020919914]
[8]
A. Thakur, "Enhanced steganographic method using lsb, parity and spread spectrum technique for audio signals", Thapar Institute of Engineering and Technology, 2014.
[9]
S. William, "Cryptography and network security: For VTU", Pearson Education, 2011.
[10]
H.A. Abdullah, A.A. Abdulameer, and I.F. Hussein, "“Audio steganography and security by using cryptography,” i-manager’s", J. Inf. Technol., vol. 4, no. 4, pp. 17-24, 2015.
[http://dx.doi.org/10.26634/jit.4.4.3644]
[11]
I. Bilal, R. Kumar, M.S. Roj, and P.K. Mishra, Recent advancement in audio steganography Proc. 2014 3rd Int. Conf. Parallel, Distrib. Grid Comput. PDGC, 2015, pp. 402-405.
[12]
A. Neyaz, "“Audio steganography via cloud services: Integrity analysis of hidden file”, Int. J. Cyber-Security Digit", Forensics, vol. 7, no. 1, pp. 80-86, 2018.
[http://dx.doi.org/10.17781/p002368]
[13]
A.H. Ali, L.E. George, and A.A. Zaidan, "High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain", Multimedia Tools Appl., vol. 77, p. 3148731516, 2018.
[http://dx.doi.org/10.1007/s11042-018-6213-0]
[14]
K. Kapoor, "Data security with combination of cryptography and audio steganography , Doctoral dissertation, ", National College of Ireland, Dublin,, 2019.
[15]
H.I. Shahadi, and R. Jidin, High capacity and inaudibility audio steganography scheme7th International Conference on Information Assurance and Security (IAS), 2011, pp. 104-109.
[16]
H.I. Shahadi, R. Jidin, and W.H. Way, "Lossless audio steganography based on lifting wavelet transform and dynamic Stego Key", Indian J. Sci. Technol., vol. 7, no. 3, pp. 323-334, 2014.
[http://dx.doi.org/10.17485/ijst/2014/v7i3.14]
[17]
H.I. Shahadi, R. Jidin, and W.H. Way, "A novel and high capacity audio steganography algorithm based on adaptive data embedding posi-tions", Res. J. Appl. Sci. Eng. Technol., vol. 7, no. 11, pp. 2311-2323, 2014.
[http://dx.doi.org/10.19026/rjaset.7.531]
[18]
G. Tzanetakis, Music analysis, retrieval and synthesis for audio signals (marsyas) Available from: http://marsyasweb.appspot.com/download/data_sets/[Accessed 22 Nov 2015
[19]
G. Tzanetakis, and P. Cook, "Musical genre classification of audio signals", IEEE Trans. Speech Audio Process., vol. 10, no. 5, pp. 293-302, 2002.
[http://dx.doi.org/10.1109/TSA.2002.800560]
[20]
M. Sheikhan, K. Assadollahi, and E. Hemmati, "High quality audio steganography by Floating substitution of LSBS in wavelet Domain", World Appl. Sci. J., vol. 10, no. 12, pp. 1501-1507, 2010.
[21]
M. Sheikhan, K. Asadollahi, and R. Shahnazi, "Improvement of embedding capacity and quality of dwtbased audio steganography sys-tems", World Appl. Sci. J., vol. 13, no. 3, pp. 507-516, 2011.
[22]
H.B. Kekre, Increasing the capacity of the cover audio signal by using multiple LSBs for information hiding Emerging Trends in Engineering and Technology (ICETET),2010 3rd International Conference , 2010, pp. 196-201.
[23]
S.E. El-Khamy, N. Korany, and M.H. El-Sherif, "Robust image hiding in audio based on integer wavelet transform and Chaotic maps hop-ping", Radio Science Conference (NRSC) 2017 34th National,, 2017.
[http://dx.doi.org/10.1109/NRSC.2017.7893505]
[24]
D.A. Shivdas, "High capacity and inaudibility audio steganography technique", Int. J. Sci. Prog. Res., vol. 6, no. 2, pp. 61-65, 2014.
[25]
M.J. Alhaddad, M.H. Alkinani, M.S. Atoum, and A.A. Alarood, "Evolutionary detection accuracy of secret data in audio steganography for securing 5G-enabled internet of things", Symmetry (Basel), vol. 12, no. 12, p. 2071, 2020.
[http://dx.doi.org/10.3390/sym12122071]
[26]
J. Panyavaraporn, and P. Horkaew, DWT/DCT-based invisible digital watermarking scheme for video stream, in: 2018 10th international conference on knowledge and smart technology (kst) 2018 10th International Conference on Knowledge and Smart Technology (KST, 2018, pp. 154-157.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy