Skip to main content

2021 | OriginalPaper | Buchkapitel

A Proposed Method for Audio Steganography Using Digital Information Security

verfasst von : Pratik Kurzekar, Shrinivas Darshane

Erschienen in: Techno-Societal 2020

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the current era of digital technology, the information security is the challenging task. For the secrete communication information hiding is an essential element. The current information steganography system uses objects like audio, image and video. The audio steganography is the technique that convey hidden message by modifying an audio signal in an unnoticeable manner. It is a technique for the hiding secret message in the host audio signal. The original audio message before steganography and after encoding message is having uniform characteristics. The embedding secrete audio message in the original audio file is a more challenging and difficult task. This paper presents the comprehensive survey of audio steganography techniques for information security. The experiment was tested using proposed LSB technique for audio steganography. This paper extended towards quality measure of steganography message. The quality of audio steganography measures using energy score, Mean square error, Peak signal to noise ratio. From this experiment the quality of audio steganography is observed as 92.759% for MSE and 94.971% for PSNR technique. Audio information hiding is the one of the robust and dynamic ways of protecting the privacy and secretes communication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wayner P (2009) Disappearing cryptography: information hiding: steganography & watermarking, 3rd edn. Morgan Kaufmann Publishers Wayner P (2009) Disappearing cryptography: information hiding: steganography & watermarking, 3rd edn. Morgan Kaufmann Publishers
2.
Zurück zum Zitat Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. Proc IEEE Spec Issue Prot Multimed Content 87(7):1062–1078 Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. Proc IEEE Spec Issue Prot Multimed Content 87(7):1062–1078
3.
Zurück zum Zitat Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3–4):313–336 Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3–4):313–336
4.
Zurück zum Zitat Dong X, Bocko M, Ignjatovic Z (2004) Data hiding via phase manipulation of audio signals. In: IEEE international conference on acoustics, speech, and signal processing (ICASSP), vol 5, pp 377–380 Dong X, Bocko M, Ignjatovic Z (2004) Data hiding via phase manipulation of audio signals. In: IEEE international conference on acoustics, speech, and signal processing (ICASSP), vol 5, pp 377–380
5.
Zurück zum Zitat Kandel ER, Schwartz JH, Jessell TM (2000) Principles of neural science, 4th edn. McGraw-Hill Kandel ER, Schwartz JH, Jessell TM (2000) Principles of neural science, 4th edn. McGraw-Hill
6.
Zurück zum Zitat Lee YK, Chen LH (2000) High capacity image steganographic model. IEEE Proc Vis Image Signal Process 288–294 Lee YK, Chen LH (2000) High capacity image steganographic model. IEEE Proc Vis Image Signal Process 288–294
7.
Zurück zum Zitat Alvaro M, Guillermo S, Gadiel S (2005) Is image steganography natural? IEEE Trans Image Process 14 Alvaro M, Guillermo S, Gadiel S (2005) Is image steganography natural? IEEE Trans Image Process 14
8.
Zurück zum Zitat Cvejic N, Seppben T (2002) Increasing the capacity of LSB-based audio steganography. Finland Cvejic N, Seppben T (2002) Increasing the capacity of LSB-based audio steganography. Finland
9.
Zurück zum Zitat Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Comput J 31(2):26–34 Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Comput J 31(2):26–34
10.
Zurück zum Zitat Asad M, Gilani J, Khalid A (2012) Three layered model for audio steganography. In: International conference on emerging technologies (ICET) Asad M, Gilani J, Khalid A (2012) Three layered model for audio steganography. In: International conference on emerging technologies (ICET)
11.
Zurück zum Zitat Rana L, Banerjee S (2013) Dual layer randomization in audio steganography using random byte position encoding. Int J Eng Innov Technol 2(8) Rana L, Banerjee S (2013) Dual layer randomization in audio steganography using random byte position encoding. Int J Eng Innov Technol 2(8)
12.
Zurück zum Zitat Gandhi K, Garg G (2012) Modified LSB audio steganography approach. Int J Emerg Technol Adv Eng 3(6):158–161 Gandhi K, Garg G (2012) Modified LSB audio steganography approach. Int J Emerg Technol Adv Eng 3(6):158–161
13.
Zurück zum Zitat Sridevi R, Damodaram A, Narasimham S (2009) Efficient method of audio steganography by modified LSB algorithm and strong encryption key with enhanced security. J Theor Appl Inf Technol 771–778 Sridevi R, Damodaram A, Narasimham S (2009) Efficient method of audio steganography by modified LSB algorithm and strong encryption key with enhanced security. J Theor Appl Inf Technol 771–778
14.
Zurück zum Zitat Bankar Priyanka R., Katariya Vrushabh R, Patil Komal K (2012) Audio steganography using LSB. Int J Electron Commun Soft Comput Sci Eng 90–92 Bankar Priyanka R., Katariya Vrushabh R, Patil Komal K (2012) Audio steganography using LSB. Int J Electron Commun Soft Comput Sci Eng 90–92
15.
Zurück zum Zitat Mane A, Galshetwar G, Jeyakumar A (2012) Data hiding technique: audio steganography using LSB technique. Int J Eng Res Appl 2(4):1123–1125 Mane A, Galshetwar G, Jeyakumar A (2012) Data hiding technique: audio steganography using LSB technique. Int J Eng Res Appl 2(4):1123–1125
16.
Zurück zum Zitat Gadicha AB (2011) Audio wave steganography. Int J Soft Comput Eng (IJSCE) 1:174–177 Gadicha AB (2011) Audio wave steganography. Int J Soft Comput Eng (IJSCE) 1:174–177
17.
Zurück zum Zitat Zamani M et al (2009) A secure audio steganography approach. In: International conference for internet technology and secured transactions Zamani M et al (2009) A secure audio steganography approach. In: International conference for internet technology and secured transactions
18.
Zurück zum Zitat Divya SS, Ram Mohan Reddy M (2012) Hiding text in audio using multiple LSB steganography and provide security using cryptography. Int J Sci Technol Res 1:68–70 Divya SS, Ram Mohan Reddy M (2012) Hiding text in audio using multiple LSB steganography and provide security using cryptography. Int J Sci Technol Res 1:68–70
19.
Zurück zum Zitat Nehru G, Dhar P (2012) A detailed look of audio steganography techniques using LSB and genetic algorithm approach. Int J Comput Sci (IJCSI) 9:402–406 Nehru G, Dhar P (2012) A detailed look of audio steganography techniques using LSB and genetic algorithm approach. Int J Comput Sci (IJCSI) 9:402–406
20.
Zurück zum Zitat Djebbar F, Ayad B, Abed-Meraim K, Hamam H (2011) A view on latest audio steganography. In: 7th IEEE international conference on innovations in information technology Djebbar F, Ayad B, Abed-Meraim K, Hamam H (2011) A view on latest audio steganography. In: 7th IEEE international conference on innovations in information technology
21.
Zurück zum Zitat Gopalan K (2003) Audio steganography using bit modification. Proc Int Conf Multimed 1:629–632 Gopalan K (2003) Audio steganography using bit modification. Proc Int Conf Multimed 1:629–632
22.
Zurück zum Zitat Gruhl D, Bender W (1996) Echo hiding. In: Proceeding of information hiding workshop, pp 295–315 Gruhl D, Bender W (1996) Echo hiding. In: Proceeding of information hiding workshop, pp 295–315
23.
Zurück zum Zitat Shirali-Shahreza S, Shirali-Shahreza M (2008) Steganography in silence intervals of speech. In: Proceedings of the fourth IEEE international conference on intelligent information hiding and multimedia signal, pp 605–607 Shirali-Shahreza S, Shirali-Shahreza M (2008) Steganography in silence intervals of speech. In: Proceedings of the fourth IEEE international conference on intelligent information hiding and multimedia signal, pp 605–607
24.
Zurück zum Zitat Qi Y-C, Ye L, Liu C (2009) Wavelet domain audio steganalysis for multiplicative embedding model. In: Proceedings of the 2009 international conference on wavelet analysis and pattern recognition Qi Y-C, Ye L, Liu C (2009) Wavelet domain audio steganalysis for multiplicative embedding model. In: Proceedings of the 2009 international conference on wavelet analysis and pattern recognition
25.
Zurück zum Zitat Djebbar F, Ayad B, Abed-Meraim K, Habib H (2012) Unified phase and magnitude speech spectra data hiding algorithm. J Secur Commun Netw Djebbar F, Ayad B, Abed-Meraim K, Habib H (2012) Unified phase and magnitude speech spectra data hiding algorithm. J Secur Commun Netw
26.
Zurück zum Zitat Khan K (1984) Cryptology and the origins of spread spectrum. IEEE Spectr 21:70–80CrossRef Khan K (1984) Cryptology and the origins of spread spectrum. IEEE Spectr 21:70–80CrossRef
27.
Zurück zum Zitat Cvejic N, Seppanen T (2002) A wavelet domain LSB insertion algorithm for high capacity audio steganography. In: Proceedings 10th IEEE digital signal processing workshop and 2nd signal processing education workshop, p 5355 Cvejic N, Seppanen T (2002) A wavelet domain LSB insertion algorithm for high capacity audio steganography. In: Proceedings 10th IEEE digital signal processing workshop and 2nd signal processing education workshop, p 5355
28.
Zurück zum Zitat Gopalan K, Wenndt S (2004) Audio steganography for covert data transmission by imperceptible tone insertion. In: WOC 2004, Banff, 8–10 July 2004 Gopalan K, Wenndt S (2004) Audio steganography for covert data transmission by imperceptible tone insertion. In: WOC 2004, Banff, 8–10 July 2004
31.
Zurück zum Zitat Cox IJ, Kalker T, Pakura G, Scheel M (2005) Information transmission and steganography, vol 3710. Springer, pp 15–29 Cox IJ, Kalker T, Pakura G, Scheel M (2005) Information transmission and steganography, vol 3710. Springer, pp 15–29
32.
Zurück zum Zitat Lehmann EL, Casella G (1998) Theory of point estimation, 2nd edn. Springer, New York. ISBN 0-387-98502-6. MR 1639875 Lehmann EL, Casella G (1998) Theory of point estimation, 2nd edn. Springer, New York. ISBN 0-387-98502-6. MR 1639875
Metadaten
Titel
A Proposed Method for Audio Steganography Using Digital Information Security
verfasst von
Pratik Kurzekar
Shrinivas Darshane
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-69921-5_30

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.