A Novel Phase Coding Technique for Steganography in Auditive Media

Steganography is used to embed secret messages in cover media. This is especially important in areas where the use of cryptography is prohibited. In this paper we introduce a novel steganographic algorithm applicable for audio data as cover media. The proposed algorithm is based on the phase coding technique which embeds data in the phase spectrum of the frequency domain signal. Differing from previous works we retain the original phase values in order to best keep the quality of the cover audio signal. Secret bits are embedded by introducing a configurable phase difference between selected chunks of blocks from the cover medium instead of discarding the original phase values and introducing a random phase like other approaches. Variable parameters guarantee the security of our system and we show that the wrong selection leads to high reception errors. Also robustness tests were performed using popular signal processing operations like noise addition, cropping and resampling, giving reasonable results. In addition listening tests show that the original audio quality is not noticeable reduced by our algorithm. After pointing out related approaches we highlight our contributions with respect to the embedding and extraction processes. Also a view on the synchronization issue at reception is given. This is a vital part for the steganographic receiver when the communication happens for example over a mobile network. Following to that the results from tests with our working prototype are presented and further usage scenarios in relation to future research are given.

[1]  Rainer Poisel,et al.  Software architecture for real-time steganography in auditive media , 2010, 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON).

[2]  Tanmay Bhowmik,et al.  On Embedding of Text in Audio A Case of Steganography , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[3]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[4]  METHODS FOR SUBJECTIVE DETERMINATION OF TRANSMISSION QUALITY Summary , 2022 .

[5]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[6]  Kazuhiro Kondo,et al.  A Digital Watermark for Stereo Audio Signals Using Variable Interchannel Delay in High Frequency Bands , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[7]  Michael Arnold,et al.  A Phase Modulation Audio Watermarking Technique , 2009, Information Hiding.

[8]  A. Das,et al.  Audio Watermarking Based on Mean Quantization in Cepstrum Domain , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[9]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  B. B. Zaidan,et al.  Overview: Main Fundamentals for Steganography , 2010, ArXiv.

[11]  Tapio Seppänen,et al.  Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks , 2007 .

[12]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[13]  Siwei Lyu,et al.  Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.

[14]  William Turin,et al.  Covert audio watermarking using perceptually tuned signal independent multiband phase modulation , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[15]  Michael Arnold,et al.  Attacks on digital audio watermarks and countermeasures , 2003, Proceedings Third International Conference on WEB Delivering of Music.

[16]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[17]  Ryouichi Nishimura Information Hiding into Interaural Phase Differences for Stereo Audio Signals , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[18]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[19]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .