Abstract
Now a days, cases of theft of important data both by employees of the organization and outside hackers are increasing day-by-day. So, new methods for information hiding and secret communication are need of today. Steganography is an option for it. Embedding a secret message into other meaningful message (cover media) without disturbing the features of the cover media is known as steganography. A novel approach for audio steganography is proposed in this paper. Here, secret message and cover media both are digital audio. Proposed approach is robust with respect to both LSB removal and re-sampling attacks. This approach adds extra layer of security because a transformation function is applied on amplitude bits of secret audio before embedding. This approach is more resistive towards white Gaussian noise addition (WGN) during transmission of stego file. The proposed approach is also suitable for embedding secret audio during real time audio communication because processing time is low while embedding capacity is high. Embedding capacity of the proposed approach is same as of conventional LSB approach because in both approaches one bit of secret is being inserted in each sample of cover audio. Standard parameters: Perceptual Evaluation of Speech Quality (PESQ) and Mean Opinion Score (MOS) are used for measuring the imperceptibility between cover audio & stego audio. For the proposed approach, PESQ and MOS are found as 4.47 and 5 that are very close to their respective highest values 4.5 and 5 when there is no attack.
Similar content being viewed by others
References
Ahmed MA, Mat Kiah ML, Zaidan BB, Zaidan AA (2010) A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J Appl Sci 10.1:59–64
Ali AH, George LE, Zaidan AA, Mokhtar MR (2018) High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed Tools Appl 77(23):31487–31516
Aucsmith D (1998) Information hiding. Proceedings of Second International Workshop, Portland, pp 14–17
Baby A, Thomas AL, Nishanthi NL, Consortium T (2016) Resources for Indian languages. CBBLR–community-based Building of Language Resources. Tribun EU, Brno, pp 37–43
Bangera KN, Reddy NS, Paddambail Y, Shivaprasad G (2017) Multilayer security using RSA cryptography and dual audio steganography. Proceedings 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp 492–495
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313–336
Bharti SS, Gupta M, Agarwal S (2018) A Novel approach for verifiable (n, n) audio secret sharing scheme. Multimed Tools Appl 77(19):25629–25657
Bhowal K, Bhattacharyya D, Pal AJ, Kim TH (2013) A GA Based audio steganography with enhanced security. Telecommun Syst 52(4):2197–2204
Cvejic N, Seppanen T (2002) A Wavelet domain LSB insertion algorithm for high capacity audio steganography. Proceedings of 10th Digital Signal Processing Workshop and 2nd Signal Processing Education Workshop, pp 53–55
Cvejic N, Tapio S (2005) Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding. J UCS 11.1:56–65
Datta B, Pal P, Bandyopadhyay SK (2015) Robust multi layer audio steganography. Proceedings of IEEE India Conference (INDICON), pp 1–6
Datta B, Tat S, Bandyopadhyay SK (2015) Robust high capacity audio steganography using modulo operator. Proceedings of Third IEEE International Conference on Computer, Communication, Control and Information Technology (C3IT), pp 1–5
Ding X, Huang W, Zhang M, Zhao I (2016) A topography structure used in audio steganography. In: 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 2134–2138
Garofalo JS, Lamel LF, Fisher WM, Fiscus JG, Pallett DS, Dahlgren NL (1993) The DARPA TIMIT acoustic-phonetic continuous speech corpus cdrom Linguistic Data Consortium
Gruhl D, Lu A, Bender W (1996) Echo hiding. Proceedings of International Workshop on Information Hiding. Springer, Berlin, pp 295–315
Kartheeswaran T, Senthooran V, Pemadasa TDDL (2015) Multi agent based audio steganography. Proceedings of IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp 1–4
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed Tools Appl 76(20):20739–20753
Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156
Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033–10050
Liao X, Yin J, Guo S, Li X, Sangaiah AK (2018) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng 67:320–329
Lin Y, Abdulla W (2011) Objective quality measures for perceptual evaluation in digital audio watermarking. IET Signal Process 5.7:623–631
Luo W, Zhang Y, Li H (2017) Adaptive audio steganography based on advanced audio coding and syndrome-trellis coding. In International Workshop on Digital Watermarking. Springer, pp 177–186
Mat Kiah ML, Zaidan BB, Zaidan AA, Ahmed AM, Al-Bakri SH (2011) A Review of audio based steganography and digital watermarking. Int J Phys Sci 6.16:3837–3850
Mishra A, Johri P, Mishra A (2017) Audio steganography using ASCII code and GA. Proceedings of IEEE International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), pp 646–651
Ogiela L, Ogiela MR (2017) Insider threats and cryptographic techniques in secure information management. IEEE Syst J 11(2):405–414
Ogiela L, Ogiela MR (2017) Security of visual codes in service management in the cloud. In: 2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS). IEEE, pp 165–168
Ogiela U, Takizawa M, Ogiela L (2018) Visual CAPTCHA application in linguistic cryptography. Concurr Comput Pract Exper 30(2):e4362
Rana M, Kunwar FB (2016) A Temporal domain audio steganography technique using genetic algorithm. Proceedings of 3rd IEEE International Conference on Computing for Sustainable Global Development (INDIACom), pp 3141–3146
Recommendation IT (2001) Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. Rec. ITU-t P, pp 862
Recommendation P (2005) Application Guide for objective quality measurement based on recommendation. ITUt 862.3:862
Sajad SS, Mohammad SS (2008) Steganography in silence intervals of speech. Proceedings of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP’08. pp 605–607
Shahreza MHS, Shahreza SS (2010) Real-time and MPEG-1 layer III compression resistant steganography in speech. IET Inf Secur 4.1:1–7
Sharma V, Thakur R (2015) LSB modification based audio steganography using trusted third party key indexing method. In 2015 Third International Conference on Image Information Processing (ICIIP). IEEE, pp 403–406
Sharma V, Thakur R (2015) LSB modification based Audio Steganography using Trusted Third Party Key Indexing method. Proceedings of Third IEEE International Conference on Image Information Processing (ICIIP), pp 403–406
Yi H, Loizou PC (2008) Evaluation of objective quality measures for speech enhancement. IEEE Trans Audio, Speech, Language Process 16.1:229–238
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bharti, S.S., Gupta, M. & Agarwal, S. A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately. Multimed Tools Appl 78, 23179–23201 (2019). https://doi.org/10.1007/s11042-019-7630-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7630-4