Robust high capacity audio steganography using modulo operator

A secure audio steganography technique is introduced in this paper. Here modulo operator is used for hiding target string. The embedding as well as extracting process is of two steps which provides more robustness in this method. During preprocessing the hexadecimal equivalent of target string is calculated by taking four bits at a time. That increases capacity of cover media. Modulo operator is used during embedding and the adjustment is done in such a way so that the distortion becomes less which increases imperceptibility. The quality of experimental result is analyzed by SNR and also compared with standard LSB and HLLAS technique. Bits per sample is also calculated which shows more efficiency of the proposed technique.

[1]  Mark F. Bocko,et al.  Data hiding via phase manipulation of audio signals , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[2]  Sajad Shirali-Shahreza,et al.  Steganography in Silence Intervals of Speech , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[3]  N. Cvejic,et al.  A wavelet domain LSB insertion algorithm for high capacity audio steganography , 2002, Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop..

[4]  Litao Gang,et al.  MP3 resistant oblivious steganography , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[5]  D. Kahn Cryptology and the origins of spread spectrum: Engineers during World War II developed an unbreakable scrambler to guarantee secure communications between Allied leaders; actress Hedy Lamarr played a role in the technology , 1984, IEEE Spectrum.

[6]  Tanmay Bhowmik,et al.  On Embedding of Text in Audio A Case of Steganography , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[7]  S. Bandyopadhyay,et al.  Higher LSB Layer Based Audio Steganography Technique , 2011 .

[8]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[9]  Debnath Bhattacharyya,et al.  A GA based audio steganography with enhanced security , 2013, Telecommun. Syst..

[10]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[11]  N. Cvejic,et al.  Reduced distortion bit-modification for LSB audio steganography , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[12]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[13]  Kaliappan Gopalan,et al.  Covert speech communication via cover speech by tone insertion , 2003, 2003 IEEE Aerospace Conference Proceedings (Cat. No.03TH8652).

[14]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[15]  Yousof Erfani,et al.  Robust audio watermarking using improved TS echo hiding , 2009, Digit. Signal Process..

[16]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[17]  Tapio Seppänen,et al.  Increasing robustness of LSB audio steganography using a novel embedding method , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[18]  Ronak Karimi,et al.  Audio Steganography: A Survey on Recent Approaches - TI Journals , 2012 .

[19]  Tapio Seppänen,et al.  Increasing the capacity of LSB-based audio steganography , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[20]  Nedeljko Cvejic,et al.  ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY , 2004 .

[21]  Rashid Ansari,et al.  Data-hiding in audio using frequency-selective phase alteration , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[22]  K. Gopalan,et al.  STEGANOGRAPHY FOR COVERT DATA TRANSMISSION BY IMPERCEPTIBLE TONE INSERTION , 2004 .

[23]  Mohammad Pooyan,et al.  Adaptive Digital Audio Steganography Based on Integer Wavelet Transform , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[24]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..