Dual Layer Randomization in Audio Steganography Using Random Byte Position Encoding

The approach used in this paper is to design a steganography scheme which is used to hide data into an audio file in such a way that the data hiding points or so called the sample point is randomly selected so that with every new embedding process the position of the sample point changes. That signifies that unlike (Least Significant Bit) LSB where the hiding points remains similar for every embedding process the propose algorithm makes sure that the position of sample points changes with every time data is embedded into an audio file along with this the bit position at which the embedding is done is also varied from 1LSB to 7 LSB.

[1]  Yimin Cheng,et al.  A new detection scheme for Echo Hiding , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[2]  Pradeep Kumar Singh,et al.  A Variant of LSB Steganography for Hiding Images in Audio , 2010 .

[3]  Akram M. Zeki,et al.  An approach to improve the robustness of substitution techniques of audio steganography , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[4]  Hosei Matsuoka Spread Spectrum Audio Steganography Using Sub-band Phase Shifting , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[5]  Koichi Nozaki,et al.  An Audio Steganography by a Low-Bit Coding Method with Wave Files , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[6]  Karim Abed-Meraim,et al.  A view on latest audio steganography techniques , 2011, 2011 International Conference on Innovations in Information Technology.

[7]  Selangor Darul Ehsan,et al.  Information Hiding using LSB technique , 2011 .

[8]  Anuradha,et al.  Enhanced LSB technique for audio steganography , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[9]  Kaliappan Gopalan Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[10]  Adnan Khalid,et al.  An enhanced least significant bit modification technique for audio steganography , 2011, International Conference on Computer Networks and Information Technology.

[11]  V. Sumathy,et al.  Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme , 2010, J. Information Security.

[12]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[13]  M. Asad,et al.  Three layered model for audio steganography , 2012, 2012 International Conference on Emerging Technologies.

[14]  Tai-hoon Kim,et al.  Data Hiding in Audio Signal: A Review , 2009 .

[15]  Tapio Seppänen,et al.  Increasing the capacity of LSB-based audio steganography , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..