Robust multi layer audio steganography

In this paper a robust audio steganography method is introduced which involves multiple layers for embedding secret data. In LSB technique generally a single or multiple bits are embedded always in one or some particular bit positions. So it is easy to get that data by knowing those positions. The robustness increases in LSB approach by considering higher LSB layer but it reduces the perceptibility of audio. Here in this proposed work LSB embedding is used in multiple layers and also capacity is increased by embedding two bits at a time. Here always two different pairs 01 and 11 are embedded instead of four, made using two bits at a time at the same time increases robustness more. Without knowing the bitwise operation applied here for extraction it is not also very much easy to get the actual data. After embedding flag setting and bit adjustment is done for maintaining the perceptual transparency of stego audio. Here in this proposed work capacity is also increased by considering 6 bit binary instead of 7 or 8.

[1]  Sajad Shirali-Shahreza,et al.  Steganography in Silence Intervals of Speech , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[2]  K. Gopalan,et al.  STEGANOGRAPHY FOR COVERT DATA TRANSMISSION BY IMPERCEPTIBLE TONE INSERTION , 2004 .

[3]  N. Cvejic,et al.  A wavelet domain LSB insertion algorithm for high capacity audio steganography , 2002, Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop..

[4]  Hosei Matsuoka Spread Spectrum Audio Steganography Using Sub-band Phase Shifting , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[5]  Kaliappan Gopalan,et al.  Covert speech communication via cover speech by tone insertion , 2003, 2003 IEEE Aerospace Conference Proceedings (Cat. No.03TH8652).

[6]  A. A. Zaidan,et al.  A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .

[7]  Peter Vary,et al.  High rate data hiding in ACELP speech codecs , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[8]  Karim Abed-Meraim,et al.  A view on latest audio steganography techniques , 2011, 2011 International Conference on Innovations in Information Technology.

[9]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[10]  Kaliappan Gopalan,et al.  A unified audio and image steganography by spectrum modification , 2009, 2009 IEEE International Conference on Industrial Technology.

[11]  Karim Abed-Meraim,et al.  Unified phase and magnitude speech spectra data hiding algorithm , 2013, Secur. Commun. Networks.

[12]  D. Whitehead Aineias the Tactician: How to Survive Under Siege , 2002 .

[13]  Xin Li,et al.  Transparent and robust audio data hiding in cepstrum domain , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[14]  Tapio Seppänen,et al.  Increasing robustness of LSB audio steganography using a novel embedding method , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[15]  David Whitehead,et al.  How to survive under siege , 1990 .

[16]  L. Nino de Rivera,et al.  Steganographic communication channel using audio signals , 2008, 2008 12th International Conference on Mathematical Methods in Electromagnetic Theory.

[17]  Sajad Shirali-Shahreza,et al.  Real-time and MPEG-1 layer III compression resistant steganography in speech , 2010, IET Inf. Secur..

[18]  D. Kahn Cryptology and the origins of spread spectrum: Engineers during World War II developed an unbreakable scrambler to guarantee secure communications between Allied leaders; actress Hedy Lamarr played a role in the technology , 1984, IEEE Spectrum.

[19]  Tapio Seppänen,et al.  Increasing the capacity of LSB-based audio steganography , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[20]  Gernot Kubin,et al.  High-rate data embedding in unvoiced speech , 2006, INTERSPEECH.

[21]  J. Wilkins Mercury or The Secret and Swift Messenger , 1984 .

[22]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[23]  Litao Gang,et al.  MP3 resistant oblivious steganography , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[24]  S. Bandyopadhyay,et al.  Higher LSB Layer Based Audio Steganography Technique , 2011 .

[25]  Akira Nishimura Data Hiding for Audio Signals That Are Robust with Respect to Air Transmission and a Speech Codec , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[26]  N. Cvejic,et al.  Reduced distortion bit-modification for LSB audio steganography , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[27]  M. Pooyan,et al.  Adaptive Digital Audio Steganography Based on Integer Wavelet Transform , 2008 .

[28]  Fatiha Djebbar,et al.  Comparative study of digital audio steganography techniques , 2012, EURASIP J. Audio Speech Music. Process..

[29]  Karim Abed-Meraim,et al.  Text hiding in high frequency components of speech spectrum , 2010, 10th International Conference on Information Science, Signal Processing and their Applications (ISSPA 2010).