Abstract
A novel genetic-concept-based algorithm is proposed for fragile audio watermarking to reduce the distortion of least significant bits substitution and consequently improve the peak signal-to-noise ratio (PSNR) and increase the payload of results. The result of testing shows that in comparison with ordinary substitution techniques and other presented techniques, the payload is considerably increased and PSNR (as an indicator of imperceptibility) is noticeably raised.
Similar content being viewed by others
References
Srivastava, M., & Rafiq, M. Q. (2011). A novel approach to secure communication using audio steganography. Advanced Materials Research, 403–408(2012), 963–969.
Zamani, M., Taherdoost, H., Manaf, A. A., Ahmad, R. B., & Zeki, A. M. (2009). An artificial-intelligence-based approach for audio steganography. MASAUM Journal of Open Probelms in Science and Engineering (MJOPSE), 1(1), 64–68.
Zamani, M., Taherdoost, H., Manaf, A.A., Ahmad, R., & Zeki, A. (2009). Robust Audio Steganography via Genetic Algorithm. In Third International Conference on Information & Communication Technologies ICICT2009 (pp. 149–153), 15–16, Karachi, Pakistan.
Abdullah, S.M., Manaf, A.A., & Zamani, M. (2010). Capacity and quality improvement in reversible image watermarking approach. in 6th International Conference on Networked Computing and Advanced Information Management (pp. 16–18), Seoul, Korea.
Abdullah, S. M., Manaf, A. A., & Zamani, M. (2010). Recursive reversible image watermarking using enhancement of difference expansion techniques. Journal of Information Security Research, 1(2), 64–70.
Zamani, M., Manaf, A.A., Ahmad, R., & Zeki, A. (2009). An approach to improve the robustness of substitution techniques of audio steganography. in 2nd IEEE International Conference on Computer Science and Information Technology 2009, Volume 2 (pp. 5–9), 8–11, Beijing, China.
Zamani, M., Manaf, A. A., Ahmad, R., Jaryani, F., Taherdoost, H., Chaeikar, S. S., et al. (2010). A novel approach for genetic audio watermarking. Journal of Information Assurance and Security, 5, 102–111.
Zamani, M., Manaf, A. A., Ahmad, R., Jaryani, F., Taherdoost, Hamed, Chaeikar, S. S., et al. (2010). Genetic audio steganography. International Journal on Recent Trends in Engineering & Technology [IJRTET], 3(2), 89–91.
Zamani, M., Manaf, A.A., Ahmad, R., Jaryani, F., Taherdoost, H., & Zeki, A. (2009). A secure audio steganography approach. In The 4th International Conference for Internet Technology and Secured Transactions (pp. 501–506), 9–12, London, UK.
Zamani, M., Manaf, A.Bt.A., & Abdullah, S.M. (2012). Efficient embedding for audio steganography. In 2nd International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics (EDSCM ’13), France, April 2–4.
Zamani, M., Manaf, A.Bt.A., Abdullah, S.M., & Chaeikar, S.S. (2012). Correlation between PSNR and bit per sample rate in audio steganography. in 11th International Conference on Signal Processing (SIP ’12), Saint Malo & Mont Saint-Michel, France, April 2–4.
Zamani, M., Manaf, A.Bt.A., & Abdullah, S.M. (2012). Correlation between PSNR and size ratio in audio steganography. In: 11th International Conference on Telecommunications and Informatics (TELE-INFO ’12). Saint Malo & Mont Saint-Michel, France, April 2–4.
Zamani, M., Manaf, A Bt A, & Abdullah, S. M. (2012). An overview on audio steganography techniques. International Journal of Digital Content Technology and its Applications (JDCTA), 6, 107–122.
Zamani, M., Manaf, A.A., & Daruis, R. (2012). Azizah technique for efficiency measurement in steganography. In 8th International Conference on Digital Content, Multimedia Technology and its Applications, June 26–28, Jeju, Korea.
Zamani, M., Manaf, A Bt A, Abdullah, S. M., & Chaeikar, S. S. (2012). Mazdak technique for PSNR estimation in audio steganography. Applied Mechanics and Materials, 229—-231, 2798–2803.
Oludele, A. (2010). Artificial intelligence and security. International Journal of Computational Intelligence and Information Security 1(3).
Zeki, A. M. (2011). A robust watermark embedding in smooth areas. Research Journal of Information Technology, 3(2), 123–131. doi:10.3923/rjit.2011.123.131.
Zamani, M., Manaf, A.A., & Ahmad, R. (2009) Current problems of substitution techniques of audio steganography. In The 2009 International Conference on Artificial Intelligence and Pattern Recognition (pp. 154–160), 13-16, Orlando, Florida, USA.
Cvejic, N. (2004). Algorithms for audio watermarking and steganography. Oulu: University of Oulu.
Wang, R.-Z., Lin, C.-F., & Lin, J.-C. (2001). Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3), 671–683.
Wu, M.-N., Lin, M.-H., & Chang, C.-C. (2004). A LSB substitution oriented image hiding strategy using genetic algorithms. Lecture Notes in Computer Science, 3309, 219–229.
Luo, W., Huang, F., & Huang, J. (2010). Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 5(2), 201–214.
Ji, R., Yao, H., Liu, S., & Wang, L. (2006). Genetic algorithm based optimal block mapping method for LSB substitution. In International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 215–218).
Wang, R., Lin, C., & Lin, J. (2001). Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3), 671–683.
Liu, S., Chen, T., Yao, H., & Gao, W. (2004). A variable depth LSB data hiding technique in images. International Conference on Machine Learning and Cybernetics, 7, 3990–3994.
Kalker, T., & Haitsma, J. (2000). Efficient detection of a spatial spread-spectrum watermark in mpeg video streams. In Proceedings of IEEE International Conference on Image Processing Vancouver, BC (pp. 407–410).
Pickholtz, R. L., Schilling, D. L., & Milstein, L. B. (1982). Theory of spread-spectrum communications: A tutorial. IEEE Transactions on Communications, 30(5), 855–884.
Zamani, M., Manaf, A.A., & Ahmad, R. (2009). Knots of substitution techniques of audio steganography. In The 2009 International Conference on Telecom Technology and Applications (pp. 415-419), June 6–8, Manila, Philippines.
Zamani, M., Manaf, A. A., Zeidanloo, H. R., & Chaeikar, S. S. (2011). Genetic subtitution-based audio steganography for high-capacity applications. International Journal for Internet Technology and Secured Transactions (IJITST), 3(1), 97–110. doi:10.1504/IJITST.2011.039681.
Zamani, M., Manaf, A.A., Ahmad, R., Zeki, A., & Abdullah, S. (2009) Genetic algorithm as an approach to resolve the problems of substitution techniques of audio steganography. In The 2009 International Conference on Genetic and Evolutionary Methods (pp. 170-175), 13–16 Las Vegas, Nevada, USA.
Zamani, M., Manaf, A.A., Ahmad, R., Zeki, A., & Abdullah, S. (2009) A genetic-algorithm-based approach for audio steganography. In International Conference on Communities and Communications. World Academy of Science, Engineering and Technology 54 (pp. 359–363), 24–26 June 2009, Paris, France.
Zamani, M., Manaf, A.A., Ahmad, R., Zeki, A., & Magalingam, P. (2009). A novel approach for audio watermarking. In: 5th International Conference on Information Assurance and Security (pp. 83-86), 18–20 Xi’an, China.
Zeki, A.M., Manaf, A.A., & Zamani, M. (2010). Bit-plane model: Theory and implementation. In Engineering Conference 2010 (EnCon2010), April 14–16. Kuching, Sarawak, Malaysia.
Zamani, M., & Manaf, A.A. (2010). Azizah’s formula to measure the efficiency of steganography techniques. In 2nd International Conference on Information and Multimedia Technology (ICIMT 2010). 28–30 December, Hong Kong, China.
Zamani, M., & Manaf, A.A. (2010). Mazdak’s method to estimate the PSNR of audio steganography techniques. In International Conference on Computer and Computational Intelligence (ICCCI 2010). 25–26 December, Nanning, China.
Darsana, R., & Vijayan, A. (2011). Audio steganography using modified LSB and PVD. Trends in network and communications. Communications in Computer and Information Science, 197(1), 11–20.
Wang, S., Song, X., & Niu, X. (2012). An affine transformation based image steganography approach. International Journal of Digital Content Technology and its Applications, 6(1), 14–85.
Qin, J. (2011). An improved method to secret message length estimation in \(\pm \)k embedding steganography. Journal of Convergence Information Technology, 6(5), 339–346.
Xiang, L., Sun, X., Luo, G., & Xia, B. (2011). Steganalysis of syntactic transformation based steganography. International Journal of Digital Content Technology and its Applications, 5(5), 320–330.
Verma, H., Kaur, R., & Kumar, R. (2009) Random sample audio watermarking algorithm for compressed wave files. IJCSNS International Journal of Computer Science and Network Security, 9(11).
Agaian, S.S., Akopia, D., & D’Souza, S.A. (2005) Two Algorithms in digital audio steganography using quantized frequency domain embedding and reversible integer transforms. Non-linear Signal Processing Lab, University of Texas at San Antonio, 6900 North Loop 1604 West, San Antonio, Texas 78249, USA.
Foo, S.W., & Dong, Q. (2009). Robustness of one bit per sample audio watermarking. In: Source: Proceedings of IEEE International Symposium on Circuits and Systems ISCAS (pp. 932–935) 2009.
Liu, S., Yao, H., Gao, W., & Yang, D. (2007). Minimizing the distortion spatial data hiding based on equivalence class. Source: Lecture Notes in Computer Science, v 4681 LNCS, pp. 667–678, 2007. In Advanced Intelligent Computing Theories and Applications: With Aspects of Theoretical and Methodological Issues Proceedings of 3rd International Conference on Intelligent Computing, ICIC.
Cvejic, N., & Seppanen, T. (2002). Increasing the capacity of LSB-based audio steganography. In IEEE Workshop on Multimedia Signal Processing (pp. 336–338).
Cvejic, N., & Seppäne., T. (2005). Increasing robustness of LSB audio steganography by reduced distortion LSB coding. Journal of Universal Computer Science, 11(1), 56–65.
Delforouzi, A., & Pooyan, M. (2008). Adaptive digital audio steganography based on integer wavelet transform. Circuits, Systems, and Signal Processing, 27(2), 247–259.
Zhang, X., & Wang, S. (2012). Efficient data hiding with histogram-preserving property. Telecommunication Systems, 49(2), 179–185. doi:10.1007/s11235-010-9364-5.
Mazurczyk, W., & Szczypiorski, K. (2012). Evaluation of steganographic methods for oversized IP packets. Telecommunication Systems, 49(2), 207–217. doi:10.1007/s11235-010-9362-7.
Szczypiorski, K. (2012). A performance analysis of HICCUPS-a steganographic system for WLAN. Telecommunication Systems, 49(2), 255–259. doi:10.1007/s11235-010-9363-6.
Mazurczyk, W., & Lubacz, J. (2010). LACK-a VoIP steganographic method. Telecommunication Systems, 45(2–3), 153–163. doi:10.1007/s11235-009-9245-y. Special Issue: SI.
Huang, H.-C., & Fang, W.-C. (2010). Techniques and applications of intelligent multimedia data hiding. Telecommunication Systems, 44(3–4), 241–251. doi:10.1007/s11235-009-9262-x. Special Issue: SI.
Maity, S. P., Maity, S., & Sil, J. (2012). Multicarrier spread spectrum watermarking for secure error concealment in fading channel. Telecommunication Systems, 49(2), 219–229. doi:10.1007/s11235-010-9369-0.
He, H., & Zhang, J. (2012). Cryptanalysis on majority-voting based self-recovery watermarking scheme. Telecommunication Systems, 49(2), 231–238. doi:10.1007/s11235-010-9380-5.
Zhang, L., & Zhou, P.-P. (2010). Localized affine transform resistant watermarking in region-of-interest. Telecommunication Systems, 44(3–4), 205–220. doi:10.1007/s11235-009-9260-z. Special Issue: SI.
Singh, R., Vatsa, M., Singh, S. K., & Upadhyay, S. (2009). Integrating SVM classification with SVD watermarking for intelligent video authentication. Telecommunication Systems, 40(1–2), 5–15. doi:10.1007/s11235-008-9141-x.
Jabbar, Alaa A., Sahib, Shahrin Bin., & Zamani, Mazdak. (2013). Multimedia Data Hiding Evaluation Metrics. In 7th WSEAS International Conference on Computer Engineering and Applications (CEA ’13). 9–11 January, Milan, Italy.
Jabbar, A.A., Sahib, S.B., & Zamani, M. (2013) An introduction to watermarking techniques. In 12th WSEAS International Conference on Applications of Computer Engineering (ACE ’13). January 30 to February 1, Cambridge, MA, USA.
Zamani, M., Manaf, A.Bt.A., Abdullah, S.M., & Chaeikar, S.S. (2012). Correlation between PSNR and bit per sample rate in audio steganography. In 11th International Conference on Signal Processing (SIP ’12) (pp. 163–168). April 2–4, Saint Malo & Mont Saint-Michel, France.
Zamani, M., Manaf, A.Bt.A., & Abdullah, S.M. (2012) Correlation between PSNR and size ratio in audio steganography. In 11th International Conference on Telecommunications and Informatics (TELE-INFO ’12) (pp. 82–87). April 2–4, Saint Malo & Mont Saint-Michel. France.
Zamani, M., Manaf, A.Bt.A., & Abdullah, S.M. (2012) Efficient embedding for audio steganography. In 2nd International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics (EDSCM ’13) (pp. 195–199). April 2–4, Saint Malo & Mont Saint-Michel, France.
Acknowledgments
This work is a part of a research that has been done and supported by Universiti Teknologi Malaysia, Malaysia.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zamani, M., Manaf, A.B.A. Genetic algorithm for fragile audio watermarking. Telecommun Syst 59, 291–304 (2015). https://doi.org/10.1007/s11235-014-9936-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-014-9936-x