Steganography Between Silence Intervals of Audio in Video Content Using Chaotic Maps

Steganography is the art of hiding data, in such a way that it is undetectable under traffic-pattern analysis and the data hidden is only known to the receiver and the sender. In this paper, new method of text steganography over the silence interval of audio in a video file is presented. In the proposed method, first the audio signal is extracted from the video. After doing audio enhancement, the data on the audio signal are steganographed using new technique and then audio signal is rewritten in video file. To enhance the security level, we apply chaotic maps on arbitrary text. Furthermore, the algorithm in this paper gives a technique which states that undetectable stegotext and cover text have same probability distribution and no statistical test can detect the presence of the hidden message. Moreover, hidden message does not affect the transmission rate of video file at all.

[1]  P. R. Deshmukh,et al.  Hash Based Least Significant Bit Technique For Video Steganography , 2014 .

[2]  Norbert Wiener,et al.  Extrapolation, Interpolation, and Smoothing of Stationary Time Series , 1964 .

[3]  Sudeep D. Thepade,et al.  Extended performance comparison of tiling based image compression using wavelet transforms & hybrid wavelet transforms , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[4]  J C Judge,et al.  Steganography: Past, Present, Future , 2001 .

[5]  Richard M. Schwartz,et al.  Enhancement of speech corrupted by acoustic noise , 1979, ICASSP.

[6]  Sid-Ahmed Selouani,et al.  Speech steganography using wavelet and Fourier transforms , 2012, EURASIP J. Audio Speech Music. Process..

[7]  A. A. Zaidan,et al.  A review of audio based steganography and digital watermarking , 2011 .

[8]  A. A. Zaidan,et al.  A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .

[9]  B. S. Manjunath,et al.  Data hiding in video , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[10]  M. H. Supriya,et al.  A Novel Non-repudiate Scheme with Voice FeatureMarking , 2014 .

[11]  Israel Cohen,et al.  Noise spectrum estimation in adverse environments: improved minima controlled recursive averaging , 2003, IEEE Trans. Speech Audio Process..

[12]  Long-Wen Chang,et al.  Data hiding for digital video with phase of motion vector , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[13]  Mihai V. Micea,et al.  Embedding Data in Video Stream using Steganography , 2007, 2007 4th International Symposium on Applied Computational Intelligence and Informatics.

[14]  John G. Proakis,et al.  Digital signal processing (2nd ed.): principles, algorithms, and applications , 1992 .

[15]  Muhammad Fahad Khan,et al.  Transference and retrieval of voice message over low signal strength in satellite communication , 2012, Innovations in Systems and Software Engineering.

[16]  Andreas Westfeld,et al.  Pit Stop for an Audio Steganography Algorithm , 2013, Communications and Multimedia Security.

[17]  Karim Abed-Meraim,et al.  Unified phase and magnitude speech spectra data hiding algorithm , 2013, Secur. Commun. Networks.

[18]  David Malah,et al.  Speech enhancement using a minimum mean-square error log-spectral amplitude estimator , 1984, IEEE Trans. Acoust. Speech Signal Process..

[19]  Kapil Dave,et al.  A Novel Video Steganography Technique using Dynamic Cover Generation , 2012 .

[20]  Tao Zhang,et al.  Steganography in Compressed Video Stream , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[21]  Jiri Fridrich,et al.  Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[22]  Baskoro Adi Pratomo,et al.  ECHO DATA HIDING STEGANOGRAPHY AND RSA CRYPTOGRAPHY ON AUDIO MEDIA , 2012 .

[23]  Hamid Sharif,et al.  An anti-steganographic approach for removing secret information in digital audio data hidden by spread spectrum methods , 2013, 2013 IEEE International Conference on Communications (ICC).

[24]  K. T. Talele,et al.  Audio Steganography Using Differential Phase Encoding , 2011 .

[25]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[26]  Norbert Wiener,et al.  Extrapolation, Interpolation, and Smoothing of Stationary Time Series, with Engineering Applications , 1949 .

[27]  Ke Zhou,et al.  Least-significant-digit steganography in low bitrate speech , 2012, 2012 IEEE International Conference on Communications (ICC).

[28]  Tai-hoon Kim,et al.  Data Hiding in Audio Signal: A Review , 2009 .

[29]  Marc Moonen,et al.  On the output SNR of the speech-distortion weighted multichannel Wiener filter , 2005, IEEE Signal Processing Letters.

[30]  Tai-hoon Kim,et al.  Hiding Data in Audio Signal , 2010, ACN.

[31]  Jin Liu,et al.  Improving security of quantization-index-modulation steganography in low bit-rate speech streams , 2013, Multimedia Systems.

[32]  Wanlei Zhou,et al.  Effective Pseudonoise Sequence and Decoding Function for Imperceptibility and Robustness Enhancement in Time-Spread Echo-Based Audio Watermarking , 2011, IEEE Transactions on Multimedia.

[33]  Sanjit K. Mitra,et al.  Digital Signal Processing: A Computer-Based Approach , 1997 .

[34]  N. Wiener,et al.  Fourier Transforms in the Complex Domain , 1934 .

[35]  Jürgen Wurzer,et al.  A Novel Phase Coding Technique for Steganography in Auditive Media , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[36]  S. Boll,et al.  Suppression of acoustic noise in speech using spectral subtraction , 1979 .

[37]  Asha Vijayan,et al.  Audio steganography using modified LSB and PVD , 2011 .

[38]  Guillermo Morales-Luna,et al.  The use of wet paper codes with audio watermarking based on echo hiding , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).

[39]  L. DoraM.Ballesteros,et al.  Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key , 2013, Comput. Electr. Eng..

[40]  John G. Proakis,et al.  Digital Signal Processing: Principles, Algorithms, and Applications , 1992 .