Abstract
This paper describes the LSB technique for secure data transfer. Secret information can be hidden inside all sorts of cover information: text, images, audio, video and more. Embedding secret messages in digital sound is usually a more difficult process. Varieties of techniques for embedding information in digital audio have been established. These are parity coding, phase coding, spread spectrum, echo hiding, LSB. Least significant bits (LSB) insertion is one of the simplest approaches to embedding information in audio file.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pfitzmann, B.: Information Hiding Terminology. In: First International Workshop on Information Hiding, Cambridge, UK, May 30 – June 1, pp. 347–350 (1996)
Petrovi, R., Jemili, K., Winograd, J.M., Stojanovi, I., Metois, E.: Data Hiding Within Audio Signals. Electronics and Energetics 12(2), 103–122 (1999)
Johnston, J., Brandenburg, K.: Wideband Coding Perceptual Consideration for Speech and Music. In: Furoi, S., Sondhi, M. (eds.) Advances in Speech Signal Processing. Marcel Dekker, New York (1992)
Bender, W., Butera, W., Gruhl, D., Hwang, R., Paiz, F.J., Pogreb, S.: Techniques for data hiding. IBM Systems Journal 39(3-4), 547–568 (2000)
Bandyopadhyay, S.K., Bhattacharyya, D., Das, P., Ganguly, D., Mukherjee, S.: A tutorial review on Steganography. In: International Conference on Contemporary Computing (IC3-2008), Noida, India, August 7-9, pp. 105–114 (2008)
Czerwinski, S., Fromm, R., Hodes, T.: Digital Music Distribution and Audio Watermarking, http://reference.kfupm.edu.sa/content/d/i/digital_music_distribution_and_audio_wat_1045219.pdf , http://http.cs.berkeley.edu/~hodes/watermarking.ps (Source: Computer Science Division, University of California, Berkeley)
Krenn, R.: Steganography and steganalysis, An Article (January 2004), http://www.krenn.nl/univ/cry/steg/article.pdf
Queirolo, F.: Steganography in Images., Final Communications Report, http://eric.purpletree.org/file/Steganography%20In%20Images.pdf
Cox, I.J., Kalker, T., Pakura, G., Scheel, M.: Information Transmission and Steganography. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 15–29. Springer, Heidelberg (2005)
LoboGuerrero, A., Marques, F., Lienard, P.B.J.: Enhanced audio data hiding synchronization using non linear filters. In: ICASSP 2004, May 17–21, vol. 2, pp. ii- 885–ii- 888 (2004)
Dutta, P., Bhattacharyya, D., Kim, T.-h.: Data Hiding in Audio Signal: A Review. International Journal of Database Theory and Application 2(2), 1–8 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bhattacharyya, D., Dutta, P., Balitanas, M.O., Kim, Th., Das, P. (2010). Hiding Data in Audio Signal. In: Chang, CC., Vasilakos, T., Das, P., Kim, Th., Kang, BH., Khurram Khan, M. (eds) Advanced Communication and Networking. ACN 2010. Communications in Computer and Information Science, vol 77. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13405-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-13405-0_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13404-3
Online ISBN: 978-3-642-13405-0
eBook Packages: Computer ScienceComputer Science (R0)