skip to main content
10.1145/2393216.2393279acmotherconferencesArticle/Chapter ViewAbstractPublication PagesccseitConference Proceedingsconference-collections
research-article

Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization

Published:26 October 2012Publication History

ABSTRACT

Staganography is the art and science of secret hiding. The secret message or plain text may be hidden in one various ways. The methods of cryptography render the message unintelligible to the outsider by various transformations of the text whereas the methods of steganography conceal the existence of the message. To conceal a secret message we need a wrapper or container as a host file. Different wrappers or host files or cover medium are used to hide the secret message e.g. image, audio, video, text. The work in this paper aims at enhancing the provision of audio steganography by introducing one LSB (Least Significant Bit) coding technique. We design a high bit rate LSB audio watermarking method that reduces embedding distortion of the host audio with increased capacity of secret text. By using standard and proposed algorithm, watermark bits are embedded into higher LSB layer, resulting in increased robustness against noise addition, which is limited by perceptual transparency.

References

  1. Anderson, R, Bowman, Petticolas, F. On the limits of Steganography. IEEE Journal selected areas in Communication, 16, 4, 474--481 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bassia, P., Pitas I., Nikolaidis N. Robust audio watermarking in the time domain, IEEE Transactions on Multimedia 3, 2, 232--241. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Brian, J., Yuliya K. and Andrew, L. Fröhlich. 2006. audio Steganography Dec 13.Google ScholarGoogle Scholar
  4. Cedric, T., Adi, R., Mcloughlin, I.: Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency domain LSB insertion, Proc. IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, 275--278.Google ScholarGoogle ScholarCross RefCross Ref
  5. Cedric, T., Adi, R., Mcloughlin, I. Data concealment in audio and frequency domain LSB insertion, Proc. IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, 275--278.Google ScholarGoogle Scholar
  6. Fridrich, J., Goljan, M., Du, R.: 2002 Lossless Data Embedding -- New Paradigm in Digital Watermarking, Applied Signal Processing, 2002, 2, 185--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. I. Cox, M. Miller and J. Bloom, 2003.Digital Watermarking Morgan Kaufmann Publishers, San Francisco, CA, 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Krista, B., 2004. Linguistic steganography: survey, analysis and robustness concerns for hiding information in text, Center for Education and Research in Information Assurance and Security, Tech report 2004.Google ScholarGoogle Scholar
  9. Mobasseri, B. Direct sequence watermarking of digital video using m-frames Proc. International Conference on Image Processing, Chicago, IL, 399--403Google ScholarGoogle Scholar
  10. Roy, S., Manasmita M., 2011. A novel approach to format based test stegonography, International conference on communication computing and security, ICCCS 2011, Procidings by ACM with ISBN-978-1-4503-0464-rourkela, Odisha, India. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. "Steganography FAQ" Aelphaeis Mangarae, march 18 2006..Google ScholarGoogle Scholar

Index Terms

  1. Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
        October 2012
        800 pages
        ISBN:9781450313100
        DOI:10.1145/2393216

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 October 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader