Skip to main content

Development of an Audio Steganography System Using Discrete Cosine Transform and Spread Spectrum Techniques

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12254))

Abstract

In today’s electronic society, security of information is an issue of major concern especially in the communication domain. Indeed, there is a very serious need for schemes that guarantee security of information exchanged between entities, over public networks. Several techniques such as cryptography and/or steganography have been proposed in existing literature. Audio steganography has certain advantages over conventional steganography. Existing audio steganography systems suffer from limitations that includes, their inability to embed information in multiple audio file formats, high distortion rate and low level of robustness of their resultant stego-files. To overcome these limitations, this current research focused on the development of an efficient and robust audio steganography system for the security of information whether in store or on transit across the Internet. This is achieved by first encrypting a given secret information, compressing the resultant cipher-text, then embedding the compressed file in a suitable cover (audio file) using frequency hopping spread spectrum technique, to yield as output, an audio stego file which is not distinguishable from the original audio cover file. To allow for the embedding of the secret compressed file, the selected audio cover file is first broken into frames using one dimensional Discrete Cosine Transform (DCT). Results of performance evaluation of this developed system shows that it has very low level of distortion as revealed by the Signal to Noise Ratio (SNR). The compression ratio obtained is also equal to one (1), which shows that the cover audio file is identical to the resultant stego-file.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kuboye, B.M., Gabriel, A.J., Thompson, A.F., Joseph, V.O.: Analysis of algorithms in long term evolution (LTE) network. J. Comput. Sci. Appl. 25(2), 59–71 (2018)

    Google Scholar 

  2. Alabi, O., Thompson, A.F., Alese, B.K., Gabriel, A.J.: Cloud application security using hybrid encryption. Commun. Appl. Electron. 7(33), 25–31 (2020)

    Article  Google Scholar 

  3. Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S., Sarumi, O.A.: Post-quantum crystography system for secure electronic voting. Open Comput. Sci. 9, 292–298 (2019)

    Article  Google Scholar 

  4. Gabriel, A.J., Egwuche, S.O.: Modelling the employees’ activities of public service sector using production rules. Anale. Seria Informatică 13(2), 65–68 (2015). Vol. XIII fasc. 2 – 2015 Annals. Computer Science Series, University of Timisoara, Romania

    Google Scholar 

  5. Iwasokun, G.B., Egwuche, O.S., Gabriel, A.J.: Neural network-based health personnel monitoring system. Afr. J. Comput. ICT 8(1), 79–87 (2015)

    Google Scholar 

  6. Alese, B.K., Gabriel, A.J., Olukayode, O., Daramola, O.A.: Modelling of risk management procedures for cybercrime control systems. In: Proceedings of the World Congress on Engineering (WCE 2014), London, United Kingdom (2014). ISBN 978-988-19252-7-5

    Google Scholar 

  7. Agboola, A.H., Gabriel, A.J., Aliyu, E.O., Alese, B.K.: Development of a fuzzy logic based rainfall prediction model. Int. J. Eng. Technol. 3(4), 427–435 (2013). ISSN 2049-3444

    Google Scholar 

  8. Daodu, M.N., Gabriel, A.J., Alese, B.K., Adetunmbi, A.O.: A data encryption standard (DES) based web services security architecture. Ann. Comput. Sci. Ser. 14(2), 53–58 (2016)

    Google Scholar 

  9. Gabriel, A.J. Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography; a combination of post-quantum cryptography and steganography. In: The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Technically Co-Sponsored by IEEE UK/RI Computer Chapter, London, UK, 9–12 December 2013, pp. 454–457 (2013)

    Google Scholar 

  10. Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography based security framework for cloud computing. J. Internet Technol. Secur. Trans. (JITST) 4(1), 351–357 (2015)

    Article  Google Scholar 

  11. Wheeler, D. Johnson, D., Yuan, B., Lutz, P.: Audio steganography using high frequency noise introduction. Thomas Golisano College of Computing & Information Sciences Rochester Institute of Technology, Rochester, NY, RIT Scholar Works (2012). http://scholarworks.rit.edu/other/302. Accessed 14 Sept 2018

  12. Ghanwat, D., Rajan, R.S.: Spread spectrum-based audio steganography in the transformation domain. Glob. J. Adv. Eng. Technol. 2(4), 66–77 (2013)

    Google Scholar 

  13. Olanrewaju, R.F., Othman-Khalifa, H.A., Suliman, R.: Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Appl. Sci. J. 21(26), 79–83 (2013)

    Google Scholar 

  14. Kresnha, P.E., Mukaromah, A.: A robust method of encryption and steganography using ElGamal and spread spectrum technique on MP3 audio file. In: Proceeding of Conference on Application of Electromagnetic Technology, vol. 3, no. 9, pp. 11–15 (2014)

    Google Scholar 

  15. Kumari, L., Goyal, D., Gyan, S.: Analysis and design of three LSB techniques for secure audio steganography. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(2), 44–55 (2013)

    Google Scholar 

  16. Pratibha, A.N., Belagali, P.P.: Data concealing using speech steganography. Int. Res. J. Eng. Technol. (IRJET) 3(11), 55–66 (2016)

    Google Scholar 

  17. Sakthisudhan, K., Prabhu, P., Thangaraj, P.: Secure audio steganography for hiding secret information. Int. J. Comput. Appl. 7(8), 55–87 (2012)

    Google Scholar 

  18. Balgurgi, P.P., Jagtap, S.K.: Audio steganography used for secure data transmission. In: Aswatha Kumar, M., Selvarani, R., Suresh Kumar, T.V. (eds.) Proceedings of International Conference on Advances in Computing. AISC, vol. 174, pp. 699–706. (2013). https://doi.org/10.1007/978-81-322-0740-5_83

    Chapter  Google Scholar 

  19. Adeboje, O.T., Adetunmbi, A.O., Gabriel, A.J.: Embedding text in audio steganography system using advanced encryption standard and spread spectrum. Int. J. Comput. Appl. 177(41), 46–51 (2020). https://doi.org/10.5120/ijca2020919. (0975-8887)

    Article  Google Scholar 

  20. Snasel, V., Kromer, P., Safarik, J., Platos, J.: JPEG steganography with particle swarm optimization accelerated by AVX (2019). https://doi.org/10.1002/cpe.544. Wiley: https://onlinelibrary.wiley.com

  21. Chatterjee, A., Ghosal, S.K., Sarkar, R.: LSB based steganography with OCR: an intelligent amalgamation. Multimed. Tools Appl. 79, 11747–11765 (2020). https://doi.org/10.1007/s11042-019-08472-6

    Article  Google Scholar 

  22. Rachael, O., Misra, S., Ahuja, R., Adewumi, A., Ayeni, F., Mmaskeliunas, R.: Image steganography and steganalysis based on least significant bit (LSB). In: Singh, P.K., Panigrahi, B.K., Suryadevara, N.K., Sharma, S.K., Singh, A.P. (eds.) Proceedings of ICETIT 2019. LNEE, vol. 605, pp. 1100–1111. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-30577-2_97

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arome Junior Gabriel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Adeboje, O.T., Gabriel, A.J., Adetunmbi, A.O. (2020). Development of an Audio Steganography System Using Discrete Cosine Transform and Spread Spectrum Techniques. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12254. Springer, Cham. https://doi.org/10.1007/978-3-030-58817-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58817-5_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58816-8

  • Online ISBN: 978-3-030-58817-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics