Skip to main content
Log in

A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Now a days, cases of theft of important data both by employees of the organization and outside hackers are increasing day-by-day. So, new methods for information hiding and secret communication are need of today. Steganography is an option for it. Embedding a secret message into other meaningful message (cover media) without disturbing the features of the cover media is known as steganography. A novel approach for audio steganography is proposed in this paper. Here, secret message and cover media both are digital audio. Proposed approach is robust with respect to both LSB removal and re-sampling attacks. This approach adds extra layer of security because a transformation function is applied on amplitude bits of secret audio before embedding. This approach is more resistive towards white Gaussian noise addition (WGN) during transmission of stego file. The proposed approach is also suitable for embedding secret audio during real time audio communication because processing time is low while embedding capacity is high. Embedding capacity of the proposed approach is same as of conventional LSB approach because in both approaches one bit of secret is being inserted in each sample of cover audio. Standard parameters: Perceptual Evaluation of Speech Quality (PESQ) and Mean Opinion Score (MOS) are used for measuring the imperceptibility between cover audio & stego audio. For the proposed approach, PESQ and MOS are found as 4.47 and 5 that are very close to their respective highest values 4.5 and 5 when there is no attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ahmed MA, Mat Kiah ML, Zaidan BB, Zaidan AA (2010) A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J Appl Sci 10.1:59–64

    Google Scholar 

  2. Ali AH, George LE, Zaidan AA, Mokhtar MR (2018) High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed Tools Appl 77(23):31487–31516

    Article  Google Scholar 

  3. Aucsmith D (1998) Information hiding. Proceedings of Second International Workshop, Portland, pp 14–17

  4. Baby A, Thomas AL, Nishanthi NL, Consortium T (2016) Resources for Indian languages. CBBLR–community-based Building of Language Resources. Tribun EU, Brno, pp 37–43

    Google Scholar 

  5. Bangera KN, Reddy NS, Paddambail Y, Shivaprasad G (2017) Multilayer security using RSA cryptography and dual audio steganography. Proceedings 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp 492–495

  6. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313–336

    Article  Google Scholar 

  7. Bharti SS, Gupta M, Agarwal S (2018) A Novel approach for verifiable (n, n) audio secret sharing scheme. Multimed Tools Appl 77(19):25629–25657

    Article  Google Scholar 

  8. Bhowal K, Bhattacharyya D, Pal AJ, Kim TH (2013) A GA Based audio steganography with enhanced security. Telecommun Syst 52(4):2197–2204

    Article  Google Scholar 

  9. Cvejic N, Seppanen T (2002) A Wavelet domain LSB insertion algorithm for high capacity audio steganography. Proceedings of 10th Digital Signal Processing Workshop and 2nd Signal Processing Education Workshop, pp 53–55

  10. Cvejic N, Tapio S (2005) Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding. J UCS 11.1:56–65

    Google Scholar 

  11. Datta B, Pal P, Bandyopadhyay SK (2015) Robust multi layer audio steganography. Proceedings of IEEE India Conference (INDICON), pp 1–6

  12. Datta B, Tat S, Bandyopadhyay SK (2015) Robust high capacity audio steganography using modulo operator. Proceedings of Third IEEE International Conference on Computer, Communication, Control and Information Technology (C3IT), pp 1–5

  13. Ding X, Huang W, Zhang M, Zhao I (2016) A topography structure used in audio steganography. In: 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 2134–2138

  14. Garofalo JS, Lamel LF, Fisher WM, Fiscus JG, Pallett DS, Dahlgren NL (1993) The DARPA TIMIT acoustic-phonetic continuous speech corpus cdrom Linguistic Data Consortium

  15. Gruhl D, Lu A, Bender W (1996) Echo hiding. Proceedings of International Workshop on Information Hiding. Springer, Berlin, pp 295–315

  16. Kartheeswaran T, Senthooran V, Pemadasa TDDL (2015) Multi agent based audio steganography. Proceedings of IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp 1–4

  17. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed Tools Appl 76(20):20739–20753

    Article  Google Scholar 

  18. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156

    Article  Google Scholar 

  19. Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033–10050

    Article  Google Scholar 

  20. Liao X, Yin J, Guo S, Li X, Sangaiah AK (2018) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng 67:320–329

    Article  Google Scholar 

  21. Lin Y, Abdulla W (2011) Objective quality measures for perceptual evaluation in digital audio watermarking. IET Signal Process 5.7:623–631

    Article  MathSciNet  Google Scholar 

  22. Luo W, Zhang Y, Li H (2017) Adaptive audio steganography based on advanced audio coding and syndrome-trellis coding. In International Workshop on Digital Watermarking. Springer, pp 177–186

  23. Mat Kiah ML, Zaidan BB, Zaidan AA, Ahmed AM, Al-Bakri SH (2011) A Review of audio based steganography and digital watermarking. Int J Phys Sci 6.16:3837–3850

    Google Scholar 

  24. Mishra A, Johri P, Mishra A (2017) Audio steganography using ASCII code and GA. Proceedings of IEEE International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), pp 646–651

  25. Ogiela L, Ogiela MR (2017) Insider threats and cryptographic techniques in secure information management. IEEE Syst J 11(2):405–414

    Article  Google Scholar 

  26. Ogiela L, Ogiela MR (2017) Security of visual codes in service management in the cloud. In: 2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS). IEEE, pp 165–168

  27. Ogiela U, Takizawa M, Ogiela L (2018) Visual CAPTCHA application in linguistic cryptography. Concurr Comput Pract Exper 30(2):e4362

    Article  Google Scholar 

  28. Rana M, Kunwar FB (2016) A Temporal domain audio steganography technique using genetic algorithm. Proceedings of 3rd IEEE International Conference on Computing for Sustainable Global Development (INDIACom), pp 3141–3146

  29. Recommendation IT (2001) Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. Rec. ITU-t P, pp 862

  30. Recommendation P (2005) Application Guide for objective quality measurement based on recommendation. ITUt 862.3:862

    Google Scholar 

  31. Sajad SS, Mohammad SS (2008) Steganography in silence intervals of speech. Proceedings of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP’08. pp 605–607

  32. Shahreza MHS, Shahreza SS (2010) Real-time and MPEG-1 layer III compression resistant steganography in speech. IET Inf Secur 4.1:1–7

    Article  Google Scholar 

  33. Sharma V, Thakur R (2015) LSB modification based audio steganography using trusted third party key indexing method. In 2015 Third International Conference on Image Information Processing (ICIIP). IEEE, pp 403–406

  34. Sharma V, Thakur R (2015) LSB modification based Audio Steganography using Trusted Third Party Key Indexing method. Proceedings of Third IEEE International Conference on Image Information Processing (ICIIP), pp 403–406

  35. Yi H, Loizou PC (2008) Evaluation of objective quality measures for speech enhancement. IEEE Trans Audio, Speech, Language Process 16.1:229–238

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shambhu Shankar Bharti.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bharti, S.S., Gupta, M. & Agarwal, S. A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately. Multimed Tools Appl 78, 23179–23201 (2019). https://doi.org/10.1007/s11042-019-7630-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7630-4

Keywords

Navigation