Abstract
In today’s electronic society, security of information is an issue of major concern especially in the communication domain. Indeed, there is a very serious need for schemes that guarantee security of information exchanged between entities, over public networks. Several techniques such as cryptography and/or steganography have been proposed in existing literature. Audio steganography has certain advantages over conventional steganography. Existing audio steganography systems suffer from limitations that includes, their inability to embed information in multiple audio file formats, high distortion rate and low level of robustness of their resultant stego-files. To overcome these limitations, this current research focused on the development of an efficient and robust audio steganography system for the security of information whether in store or on transit across the Internet. This is achieved by first encrypting a given secret information, compressing the resultant cipher-text, then embedding the compressed file in a suitable cover (audio file) using frequency hopping spread spectrum technique, to yield as output, an audio stego file which is not distinguishable from the original audio cover file. To allow for the embedding of the secret compressed file, the selected audio cover file is first broken into frames using one dimensional Discrete Cosine Transform (DCT). Results of performance evaluation of this developed system shows that it has very low level of distortion as revealed by the Signal to Noise Ratio (SNR). The compression ratio obtained is also equal to one (1), which shows that the cover audio file is identical to the resultant stego-file.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kuboye, B.M., Gabriel, A.J., Thompson, A.F., Joseph, V.O.: Analysis of algorithms in long term evolution (LTE) network. J. Comput. Sci. Appl. 25(2), 59–71 (2018)
Alabi, O., Thompson, A.F., Alese, B.K., Gabriel, A.J.: Cloud application security using hybrid encryption. Commun. Appl. Electron. 7(33), 25–31 (2020)
Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S., Sarumi, O.A.: Post-quantum crystography system for secure electronic voting. Open Comput. Sci. 9, 292–298 (2019)
Gabriel, A.J., Egwuche, S.O.: Modelling the employees’ activities of public service sector using production rules. Anale. Seria Informatică 13(2), 65–68 (2015). Vol. XIII fasc. 2 – 2015 Annals. Computer Science Series, University of Timisoara, Romania
Iwasokun, G.B., Egwuche, O.S., Gabriel, A.J.: Neural network-based health personnel monitoring system. Afr. J. Comput. ICT 8(1), 79–87 (2015)
Alese, B.K., Gabriel, A.J., Olukayode, O., Daramola, O.A.: Modelling of risk management procedures for cybercrime control systems. In: Proceedings of the World Congress on Engineering (WCE 2014), London, United Kingdom (2014). ISBN 978-988-19252-7-5
Agboola, A.H., Gabriel, A.J., Aliyu, E.O., Alese, B.K.: Development of a fuzzy logic based rainfall prediction model. Int. J. Eng. Technol. 3(4), 427–435 (2013). ISSN 2049-3444
Daodu, M.N., Gabriel, A.J., Alese, B.K., Adetunmbi, A.O.: A data encryption standard (DES) based web services security architecture. Ann. Comput. Sci. Ser. 14(2), 53–58 (2016)
Gabriel, A.J. Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography; a combination of post-quantum cryptography and steganography. In: The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Technically Co-Sponsored by IEEE UK/RI Computer Chapter, London, UK, 9–12 December 2013, pp. 454–457 (2013)
Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography based security framework for cloud computing. J. Internet Technol. Secur. Trans. (JITST) 4(1), 351–357 (2015)
Wheeler, D. Johnson, D., Yuan, B., Lutz, P.: Audio steganography using high frequency noise introduction. Thomas Golisano College of Computing & Information Sciences Rochester Institute of Technology, Rochester, NY, RIT Scholar Works (2012). http://scholarworks.rit.edu/other/302. Accessed 14 Sept 2018
Ghanwat, D., Rajan, R.S.: Spread spectrum-based audio steganography in the transformation domain. Glob. J. Adv. Eng. Technol. 2(4), 66–77 (2013)
Olanrewaju, R.F., Othman-Khalifa, H.A., Suliman, R.: Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Appl. Sci. J. 21(26), 79–83 (2013)
Kresnha, P.E., Mukaromah, A.: A robust method of encryption and steganography using ElGamal and spread spectrum technique on MP3 audio file. In: Proceeding of Conference on Application of Electromagnetic Technology, vol. 3, no. 9, pp. 11–15 (2014)
Kumari, L., Goyal, D., Gyan, S.: Analysis and design of three LSB techniques for secure audio steganography. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(2), 44–55 (2013)
Pratibha, A.N., Belagali, P.P.: Data concealing using speech steganography. Int. Res. J. Eng. Technol. (IRJET) 3(11), 55–66 (2016)
Sakthisudhan, K., Prabhu, P., Thangaraj, P.: Secure audio steganography for hiding secret information. Int. J. Comput. Appl. 7(8), 55–87 (2012)
Balgurgi, P.P., Jagtap, S.K.: Audio steganography used for secure data transmission. In: Aswatha Kumar, M., Selvarani, R., Suresh Kumar, T.V. (eds.) Proceedings of International Conference on Advances in Computing. AISC, vol. 174, pp. 699–706. (2013). https://doi.org/10.1007/978-81-322-0740-5_83
Adeboje, O.T., Adetunmbi, A.O., Gabriel, A.J.: Embedding text in audio steganography system using advanced encryption standard and spread spectrum. Int. J. Comput. Appl. 177(41), 46–51 (2020). https://doi.org/10.5120/ijca2020919. (0975-8887)
Snasel, V., Kromer, P., Safarik, J., Platos, J.: JPEG steganography with particle swarm optimization accelerated by AVX (2019). https://doi.org/10.1002/cpe.544. Wiley: https://onlinelibrary.wiley.com
Chatterjee, A., Ghosal, S.K., Sarkar, R.: LSB based steganography with OCR: an intelligent amalgamation. Multimed. Tools Appl. 79, 11747–11765 (2020). https://doi.org/10.1007/s11042-019-08472-6
Rachael, O., Misra, S., Ahuja, R., Adewumi, A., Ayeni, F., Mmaskeliunas, R.: Image steganography and steganalysis based on least significant bit (LSB). In: Singh, P.K., Panigrahi, B.K., Suryadevara, N.K., Sharma, S.K., Singh, A.P. (eds.) Proceedings of ICETIT 2019. LNEE, vol. 605, pp. 1100–1111. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-30577-2_97
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Adeboje, O.T., Gabriel, A.J., Adetunmbi, A.O. (2020). Development of an Audio Steganography System Using Discrete Cosine Transform and Spread Spectrum Techniques. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12254. Springer, Cham. https://doi.org/10.1007/978-3-030-58817-5_31
Download citation
DOI: https://doi.org/10.1007/978-3-030-58817-5_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58816-8
Online ISBN: 978-3-030-58817-5
eBook Packages: Computer ScienceComputer Science (R0)