Skip to main content

Information Hiding Method Using CDMA on Wave Files

  • Conference paper
Book cover Applied Parallel Computing. State of the Art in Scientific Computing (PARA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3732))

Included in the following conference series:

Abstract

Although many information hiding paradigm provides many advantages for protect important information, we try to introduce new method in concealing thing. One of these is Steganography Many efforts have been made to encrypt data as well as to hide data. Most users wish not to lose the data that they want to hide. The steganography is one of methods that users can hide data. Some steganography softwares use audio data among multimedia data. However, the commercialized audio steganography softwares have disadvantages that the existence of hidden messages can be easily recognized visually and only certain-sized data can be hidden. To solve these problems, this study suggested, designed and implemented the Dynamic Message Embedding (DME) algorithm. Also, to improve the security level of the secret message, the file encryption algorithm has been applied. Through the DME algorithm and the file encryption algorithm, StegoWaveK system that performs audio steganography was designed and implemented. Then, the suggested system and the commercialized audio steganography system were compared and analyzed on some criteria.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pal, S.K., Saxena, P.K., Muttoo, S.K.: The Future of Audio Steganography. In: STEG 2002, July 11-12 (2002)

    Google Scholar 

  2. http://www-ccrma.stanford.edu/CCRMA/Courses/422/projects/WaveFormat

  3. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding - A Survey. Proceedings of the IEEE, special issue on protection of multimedia content 87(7), 1062–1078 (1999)

    Google Scholar 

  4. Katzenbeisser, S., Petitcolas, F.A.P.: Information hiding techniques for steganography and digital watermarking. Artech House Publishers (2000)

    Google Scholar 

  5. Gordy, J.D., Bruton, L.T.: Performance Evaluation of Digital Audio Watermarking Algorithms. In: IEEE MWSCAS (2000)

    Google Scholar 

  6. Wiggert, D.: Codes for Error Control and Synchronization. Artech House Inc (1988)

    Google Scholar 

  7. Wayner, P.: Disappearing cryptography Information Hiding: Steganography & Watermarking, ch. 17, 2nd edn. Morgan Kauffman, San Francisco (2002)

    Google Scholar 

  8. Moskowitz, I.S., Longdon, G.E., Chang, L.: A New p aradigm Hidden Steganography. In: New Security Paradigms workshop 2000, Cork Ireland, September 19-21 (2000)

    Google Scholar 

  9. Kim, Y.S., et al.: Information Hiding System StrgoWaveK for Improving Capacity. In: The 2003 Internationbal Symposium on Parallel and Distributed Processing and Applications (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, YS., Park, S.Y., Wang, SH., Lee, S. (2006). Information Hiding Method Using CDMA on Wave Files. In: Dongarra, J., Madsen, K., Waśniewski, J. (eds) Applied Parallel Computing. State of the Art in Scientific Computing. PARA 2004. Lecture Notes in Computer Science, vol 3732. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558958_121

Download citation

  • DOI: https://doi.org/10.1007/11558958_121

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29067-4

  • Online ISBN: 978-3-540-33498-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics