A multi-threshold based audio steganography scheme

Human auditory system is highly sensitive that can detect or discriminate subtle changes in an audio. The direct least significant bit (LSB) substitution scheme, often used in image steganography, cannot be effective for audio steganography to provide secrecy needed for many audio applications, because the embedded secret bits in the LSBs of the audio samples in a silent or near silent segment of an audio can produce strong hissing noise when played. In this work, governed by an error criterion, we present a multi-threshold-based scheme for audio steganography. In order to evade detection by means of any statistical or perceptual analysis of the resultant audio, the threshold values are derived from an error criterion that can be used to limit the number of bits to be embedded in an audio sample. To defend against retrieval of bits by an adversary as well as to dissipate any pattern in the resultant audio, a scheme for chaotic distribution of the secret message bits in the cover audio is also proposed. In comparison with most recently proposed schemes in literature, our proposed scheme exhibits better performance against statistical and perceptual analysis for the same embedding capacity. Our proposed scheme can be used to increase the capacity of the cover audio in a controlled manner by adjusting the error criterion.

[1]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[2]  Kaliappan Gopalan Audio steganography by cepstrum modification , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[3]  Jiri Fridrich,et al.  Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[4]  Jürgen Wurzer,et al.  A Novel Phase Coding Technique for Steganography in Auditive Media , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[5]  C. Robilliard,et al.  Enhancing the Security of Delayed Differential Chaotic Systems With Programmable Feedback , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[6]  Wojciech Mazurczyk,et al.  Trends in steganography , 2014, Commun. ACM.

[7]  Zhengquan Xu,et al.  An Improved Image Encryption Algorithm based on Chaotic System , 2009, J. Comput..

[8]  Karim Abed-Meraim,et al.  A view on latest audio steganography techniques , 2011, 2011 International Conference on Innovations in Information Technology.

[9]  Tapio Seppänen,et al.  Increasing robustness of LSB audio steganography using a novel embedding method , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[10]  Soo-Chang Pei,et al.  Generating Chaotic Stream Ciphers Using Chaotic Systems , 2003 .

[11]  Vinod Patidar,et al.  A Random Bit Generator Using Chaotic Maps , 2010, Int. J. Netw. Secur..

[12]  Zhang Xin,et al.  Image encryption algorithm based on Henon chaotic system , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[13]  Lovey Rana,et al.  Dual Layer Randomization in Audio Steganography Using Random Byte Position Encoding , 2013 .

[14]  N. Cvejic,et al.  A wavelet domain LSB insertion algorithm for high capacity audio steganography , 2002, Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop..

[16]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[17]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[18]  Hosei Matsuoka Spread Spectrum Audio Steganography Using Sub-band Phase Shifting , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[19]  Adnan Khalid,et al.  An enhanced least significant bit modification technique for audio steganography , 2011, International Conference on Computer Networks and Information Technology.

[20]  M. Pooyan,et al.  LSB-based Audio Steganography Method Based on Lifting Wavelet Transform , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.

[21]  Siwei Lyu,et al.  Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.

[22]  Tapio Seppänen,et al.  Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding , 2005, J. Univers. Comput. Sci..

[23]  Vrishali A. Chakkarwar,et al.  Review of an Improved Audio Steganographic Technique over LSB through Random Based Approach , 2013 .

[24]  Xiangyang Luo,et al.  A secure LSB steganography system defeating sample pair analysis based on chaos system and dynamic compensation , 2006, 2006 8th International Conference Advanced Communication Technology.

[25]  N. Cvejic,et al.  Reduced distortion bit-modification for LSB audio steganography , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[26]  Ping Wah Wong,et al.  Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings , 2004, Security, Steganography, and Watermarking of Multimedia Contents.

[27]  Ankit R. Chadha,et al.  An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution , 2013, ArXiv.

[28]  Kaliappan Gopalan Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).