ABSTRACT
Staganography is the art and science of secret hiding. The secret message or plain text may be hidden in one various ways. The methods of cryptography render the message unintelligible to the outsider by various transformations of the text whereas the methods of steganography conceal the existence of the message. To conceal a secret message we need a wrapper or container as a host file. Different wrappers or host files or cover medium are used to hide the secret message e.g. image, audio, video, text. The work in this paper aims at enhancing the provision of audio steganography by introducing one LSB (Least Significant Bit) coding technique. We design a high bit rate LSB audio watermarking method that reduces embedding distortion of the host audio with increased capacity of secret text. By using standard and proposed algorithm, watermark bits are embedded into higher LSB layer, resulting in increased robustness against noise addition, which is limited by perceptual transparency.
- Anderson, R, Bowman, Petticolas, F. On the limits of Steganography. IEEE Journal selected areas in Communication, 16, 4, 474--481 Google ScholarDigital Library
- Bassia, P., Pitas I., Nikolaidis N. Robust audio watermarking in the time domain, IEEE Transactions on Multimedia 3, 2, 232--241. Google ScholarDigital Library
- Brian, J., Yuliya K. and Andrew, L. Fröhlich. 2006. audio Steganography Dec 13.Google Scholar
- Cedric, T., Adi, R., Mcloughlin, I.: Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency domain LSB insertion, Proc. IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, 275--278.Google ScholarCross Ref
- Cedric, T., Adi, R., Mcloughlin, I. Data concealment in audio and frequency domain LSB insertion, Proc. IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, 275--278.Google Scholar
- Fridrich, J., Goljan, M., Du, R.: 2002 Lossless Data Embedding -- New Paradigm in Digital Watermarking, Applied Signal Processing, 2002, 2, 185--196. Google ScholarDigital Library
- I. Cox, M. Miller and J. Bloom, 2003.Digital Watermarking Morgan Kaufmann Publishers, San Francisco, CA, 2003 Google ScholarDigital Library
- Krista, B., 2004. Linguistic steganography: survey, analysis and robustness concerns for hiding information in text, Center for Education and Research in Information Assurance and Security, Tech report 2004.Google Scholar
- Mobasseri, B. Direct sequence watermarking of digital video using m-frames Proc. International Conference on Image Processing, Chicago, IL, 399--403Google Scholar
- Roy, S., Manasmita M., 2011. A novel approach to format based test stegonography, International conference on communication computing and security, ICCCS 2011, Procidings by ACM with ISBN-978-1-4503-0464-rourkela, Odisha, India. Google ScholarDigital Library
- "Steganography FAQ" Aelphaeis Mangarae, march 18 2006..Google Scholar
Index Terms
- Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization
Recommendations
LSB-Based Steganography Using Reflected Gray Code
Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to ...
Anti-forensic Steganography Using Multi-bit Minimum Error Replacement with Flexible Bit Location
IS3C '12: Proceedings of the 2012 International Symposium on Computer, Consumer and ControlMulti-bit minimum error replacement (MER) is a method that can embed multi-bit logo/secret data into k least-significant bits (LSBs) of cover data only introduces minimum embedding error (MEE). However, k-LSBs MER suffers from weak anti-forensics. ...
A Novel n-Rightmost Bit Replacement Image Steganography Technique
Image steganography is a technique for hiding the secret data in a carrier image. This paper proposes a novel n-right most bit replacement image steganography technique to hide the secret data in an image, where 1?≤?n?≤?4. The major objectives of the ...
Comments