Secured and Imperceptible Data Transmission Through Digital Audio Signal with Reduced Internal Noise

The work proposed in this paper aims at two major concerns of wireless transmission, which are security and imperceptibility of the transmitting data. This method uses a digital audio signal as carrier for the actual message data to be transmitted in a concealed form and has two complementary parts, insertion of payload in a source audio signal at the sender end and retrieval of payload at the receiver end. To enhance security of the system, three fold measure has been taken to safeguard the hidden data from any potential hacking attempt. These are, (1) insertion of payload in transformed domain based on DFT instead of time domain, (2) use of pseudo-random bit positions for insertion and (3) using a common secret key by both sending and receiving parties. Imperceptibility of the transmitting data is also emphasized by reducing the internal noise impact within the carrier audio signal at the time of insertion. Furthermore, the integrity and authenticity of the retrieved message is verified at the receiving end. The proposed method has been thoroughly examined by various performance metrics in different scenarios, which prove its effectiveness.

[1]  Nedeljko Cvejic,et al.  ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY , 2004 .

[2]  Hugo Fastl,et al.  Psychoacoustics: Facts and Models , 1990 .

[3]  Edward Jones,et al.  Audio quality assessment techniques - A review, and recent developments , 2009, Signal Process..

[4]  Yong Zhang,et al.  Quantization based Semi-fragile Watermarking Scheme for H.264 Video , 2010 .

[5]  Michael Arnold Audio watermarking: features, applications and algorithms , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[6]  Nabin Ghoshal,et al.  A framework for block based image authentication (FBIA) , 2009, 2009 International Conference on Industrial and Information Systems (ICIIS).

[7]  Nabin Ghoshal,et al.  Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM) , 2009, 2009 IEEE International Advance Computing Conference.

[8]  Ali Al-Haj,et al.  DWT-based audio watermarking , 2011, Int. Arab J. Inf. Technol..

[9]  Pranab Kumar Dhar,et al.  A New DCT-Based Watermarking Method for Copyright Protection of Digital Audio , 2010 .

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[11]  Fatiha Djebbar,et al.  Comparative study of digital audio steganography techniques , 2012, EURASIP J. Audio Speech Music. Process..

[12]  Foo Say Wei,et al.  Audio watermarking using time-frequency compression expansion , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[13]  Litao Gang,et al.  MP3 resistant oblivious steganography , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[14]  Yousof Erfani,et al.  Robust audio watermarking using improved TS echo hiding , 2009, Digit. Signal Process..

[15]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[16]  Ali Al-Haj An imperceptible and robust audio watermarking algorithm , 2014, EURASIP J. Audio Speech Music. Process..

[17]  S. Varadarajan,et al.  A novel hybrid audio steganography for imperceptible data hiding , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[18]  D. Kahn Cryptology and the origins of spread spectrum: Engineers during World War II developed an unbreakable scrambler to guarantee secure communications between Allied leaders; actress Hedy Lamarr played a role in the technology , 1984, IEEE Spectrum.

[19]  J. K. Mandal,et al.  Discrete Fourier Transform based multimedia colour image authentication for wireless communication (DFTMCIAWC) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[20]  Said Esmail El-Khamy,et al.  A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption , 2016, Multimedia Tools and Applications.

[21]  Satish Bhalshankar,et al.  Audio Steganography: LSB Technique Using a Pyramid Structure and Range of Bytes , 2015, ArXiv.

[22]  Wenjun Ma,et al.  Quantization-Based Digital Audio Watermarking in Discrete Fourier Transform Domain , 2010, J. Multim..

[23]  Karim Abed-Meraim,et al.  Unified phase and magnitude speech spectra data hiding algorithm , 2013, Secur. Commun. Networks.

[24]  Nabin Ghoshal,et al.  Controlled Data Hiding Technique for Color Image Authentication in Frequency Domain (CDHTCIAFD) , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.