Skip to main content

Supraliminal Audio Steganography: Audio Files Tricking Audiophiles

  • Conference paper
  • 1220 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5806))

Abstract

A supraliminal channel is one in which the secret message is encoded in the semantic content of a cover object, and that is robust against an active warden. Such channels frequently have a very low embedding rate and therefore are unsuitable for more than simply exchanging steganographic public keys. This paper introduces a proof-of-concept supraliminal channel that uses WAV files to provide a high-bitrate method of embedding information in common media.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Simmons, G.J.: The Prisoners’ Problem and the Subliminal Channel. In: Chaum, D. (ed.) Advances in Cryptology 1981 - 1997, pp. 51–67. Plenum Press, New York (1984)

    Google Scholar 

  2. Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking - Attacks and Countermeasures. Kluwer Academic Publishers, Dordrecht (2001)

    Book  Google Scholar 

  3. Craver, S.: On Public-Key Steganography in the Presence of an Active Warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355–368. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Craver, S., Li, E., Yu, J., Atakli, I.: A Supraliminal Channel in a Videoconferencing Application. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 283–293. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Bergmair, R., Katzenbeisser, S.: Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 109–123. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Cvejic, N., Seppanen, T.: Increasing the Capacity of LSB-based Audio Steganography. In: Proceedings of 2002 IEEE Workshop on Multimedia Signal Processing, pp. 336–338 (2002)

    Google Scholar 

  7. Inoue, D., Matsumoto, T.: A Scheme of Standard MIDI Files Steganography and Its Evaluation. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of SPIE Security and Watermarking of Multimedia, vol. 4675, pp. 194–205. SPIE, San Jose (2002)

    Google Scholar 

  8. Adli, A., Nakao, Z.: Three Steganography Algorithms for MIDI Files. In: Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, vol. 4, pp. 2401–2404. IEEE, Los Alamitos (2005)

    Google Scholar 

  9. TeraMedia: soundsnap.com: High-quality sound effects and loops. Webpage (2008)

    Google Scholar 

  10. Josefsson, S.: Base16, Base32, and Base64 Encoding: Request for Comments 3548, Network Working Group (July 2003), http://www.faqs.org/rfcs/rfc3548.html (last checked January 16, 2009)

  11. Mazzoni, D.: Audacity: Free Audio Editor and Recorder (January 2009), http://audacity.sourceforge.net/ (last checked January 16, 2009)

  12. Lam, T.T., Karam, L.J., Bazzi, R.A., Aboudsleman, G.P.: Reduced-Delay Selective ARQ for Low Bit-Rate Image and Multimedia Data Transmission. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2005, vol. 2, pp. 309–312. IEEE Computer Society Press, Los Alamitos (2005)

    Chapter  Google Scholar 

  13. Bhattacharrya, D., Nandi, S.: An Efficient Class of SEC-DED-AUED Codes. In: Proceedings of the Third International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), pp. 410–416. IEEE Computer Society, Los Alamitos (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Crawford, H., Aycock, J. (2009). Supraliminal Audio Steganography: Audio Files Tricking Audiophiles. In: Katzenbeisser, S., Sadeghi, AR. (eds) Information Hiding. IH 2009. Lecture Notes in Computer Science, vol 5806. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04431-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04431-1_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04430-4

  • Online ISBN: 978-3-642-04431-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics