A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately

Now a days, cases of theft of important data both by employees of the organization and outside hackers are increasing day-by-day. So, new methods for information hiding and secret communication are need of today. Steganography is an option for it. Embedding a secret message into other meaningful message (cover media) without disturbing the features of the cover media is known as steganography. A novel approach for audio steganography is proposed in this paper. Here, secret message and cover media both are digital audio. Proposed approach is robust with respect to both LSB removal and re-sampling attacks. This approach adds extra layer of security because a transformation function is applied on amplitude bits of secret audio before embedding. This approach is more resistive towards white Gaussian noise addition (WGN) during transmission of stego file. The proposed approach is also suitable for embedding secret audio during real time audio communication because processing time is low while embedding capacity is high. Embedding capacity of the proposed approach is same as of conventional LSB approach because in both approaches one bit of secret is being inserted in each sample of cover audio. Standard parameters: Perceptual Evaluation of Speech Quality (PESQ) and Mean Opinion Score (MOS) are used for measuring the imperceptibility between cover audio & stego audio. For the proposed approach, PESQ and MOS are found as 4.47 and 5 that are very close to their respective highest values 4.5 and 5 when there is no attack.

[1]  Tapio Seppänen,et al.  Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding , 2005, J. Univers. Comput. Sci..

[2]  A novel approach for verifiable (n, n) audio secret sharing scheme , 2018, Multimedia Tools and Applications.

[3]  A. A. Zaidan,et al.  High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain , 2018, Multimedia Tools and Applications.

[4]  David Aucsmith Information Hiding , 2011, Lecture Notes in Computer Science.

[5]  Vipul Sharma,et al.  LSB modification based Audio Steganography using Trusted Third Party Key Indexing method , 2015, 2015 Third International Conference on Image Information Processing (ICIIP).

[6]  Sajad Shirali-Shahreza,et al.  Real-time and MPEG-1 layer III compression resistant steganography in speech , 2010, IET Inf. Secur..

[7]  Urszula Ogiela,et al.  Visual CAPTCHA application in linguistic cryptography , 2018, Concurr. Comput. Pract. Exp..

[8]  N. Cvejic,et al.  A wavelet domain LSB insertion algorithm for high capacity audio steganography , 2002, Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop..

[9]  T. Kartheeswaran,et al.  Multi agent based audio steganography , 2015, 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).

[10]  Arun Kumar Sangaiah,et al.  Medical JPEG image steganography based on preserving inter-block dependencies , 2017, Comput. Electr. Eng..

[11]  Debnath Bhattacharyya,et al.  A GA based audio steganography with enhanced security , 2013, Telecommun. Syst..

[12]  Yue Zhang,et al.  Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding , 2017, IWDW.

[13]  Huan Wang,et al.  New cubic reference table based image steganography , 2018, Multimedia Tools and Applications.

[14]  A. A. Zaidan,et al.  A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .

[15]  Meng Zhang,et al.  A topography structure used in audio steganography , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[16]  Yi Hu,et al.  Evaluation of Objective Quality Measures for Speech Enhancement , 2008, IEEE Transactions on Audio, Speech, and Language Processing.

[17]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[18]  A. A. Zaidan,et al.  A review of audio based steganography and digital watermarking , 2011 .

[19]  Samir Kumar Bandyopadhyay,et al.  Robust multi layer audio steganography , 2015, 2015 Annual IEEE India Conference (INDICON).

[20]  Manisha Rana,et al.  A temporal domain audio steganography technique using genetic algorithm , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[21]  Samir Kumar Bandyopadhyay,et al.  Robust high capacity audio steganography using modulo operator , 2015, Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT).

[22]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[23]  Jonathan G. Fiscus,et al.  DARPA TIMIT:: acoustic-phonetic continuous speech corpus CD-ROM, NIST speech disc 1-1.1 , 1993 .

[24]  Marek R. Ogiela,et al.  Security of visual codes in service management in the cloud , 2017, 2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS).

[25]  Zheng Qin,et al.  Data embedding in digital images using critical functions , 2017, Signal Process. Image Commun..

[26]  N.V. Subba Reddy,et al.  Multilayer security using RSA cryptography and dual audio steganography , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[27]  Marek R. Ogiela,et al.  Insider Threats and Cryptographic Techniques in Secure Information Management , 2017, IEEE Systems Journal.

[28]  Prashant Johri,et al.  Audio steganography using ASCII code and GA , 2017, INFOCOM 2017.

[29]  Xin Liao,et al.  Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform , 2017, Multimedia Tools and Applications.

[30]  Waleed H. Abdulla,et al.  Objective quality measures for perceptual evaluation in digital audio watermarking , 2011 .

[31]  Sajad Shirali-Shahreza,et al.  Steganography in Silence Intervals of Speech , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.