High capacity and inaudibility audio steganography scheme

Steganography is an information hiding technique where secret message is embedded into unsuspicious cover signal. Measurement of good steganography algorithm includes security, capacity, robustness and imperceptibility. These measures are contradicted, therefore improving one, affects the others. In this paper, we propose a new high capacity audio steganography algorithm based on the wavelet packet transform with adaptive hiding in least significant bits. The adaptive hiding is determined depend on the cover samples strength and bits block matching between message and cover signals. The results show that message can be embedded up to 42 % of the total size of the cover audio signal with at least of 50 dB signal to noise ratio.

[1]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[2]  Haider Ismael Shahadi,et al.  High Capacity and Resistance to Additive Noise Audio Steganography Algorithm , 2011 .

[3]  George Tzanetakis,et al.  Audio Analysis using the Discrete Wavelet Transform , 2001 .

[4]  P. Bao,et al.  Audio-to-image wavelet transform based audio steganography , 2005, 47th International Symposium ELMAR, 2005..

[5]  N. Cvejic,et al.  A wavelet domain LSB insertion algorithm for high capacity audio steganography , 2002, Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop..

[6]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[7]  Asghar Shahrzad Khashandarag,et al.  A Hybrid Method for Color Image Steganography in Spatial and Frequency Domain , 2011 .

[8]  Ying Wang,et al.  Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.

[9]  Lihua Zhou,et al.  A Novel Algorithm for Robust Audio Watermarking Based on Quantification DCT Domain , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[10]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[11]  Alka Jindal,et al.  Contrast of Watermarking Techniques in different domains , 2011 .

[12]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[13]  Mingyu Lu,et al.  A robust digital audio watermarking scheme using wavelet moment invariance , 2011, J. Syst. Softw..

[14]  Jiwu Huang,et al.  Self-synchronized audio watermark in DWT domain , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[15]  Sajad Shirali-Shahreza,et al.  High capacity error free wavelet Domain Speech Steganography , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[16]  Natarajan Meghanathan,et al.  STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE , AUDIO AND VIDEO COVER MEDIA , 2010 .

[17]  Nedeljko Cvejic,et al.  ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY , 2004 .

[18]  Mostafa Azizi,et al.  VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING , 2010 .

[19]  Jyotsna Singh Audio watermarking and steganography techniques for enhancing digital security , 2011 .