Skip to main content

A Novel Position Concealment Audio Steganography in Insensible Frequency

  • Conference paper
  • First Online:
Computational Intelligence in Data Mining

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 990))

  • 682 Accesses

Abstract

For years, people have devised different techniques for encrypting data while others have attempted to break these encrypted codes. Steganography is a technique that allows one to hide data within an image, audio, or video. Imperceptibility of noise is an important issue for any steganographic technique. For this reason, we have proposed a new audio steganographic approach without considering the sample value less than 50 Hz and above 5000 Hz, because this range is highly sensible by ear as per biological phenomenon. The novelty of our work is that we have embedded the matching position value (determined from audio sample value itself) in 4 least significant bits rather than direct message bits flipping. Rather than performing sequential embedding, samples are selected nonsequentially based on audio feature itself that helps to withstand statistical attacks. Blind audio steganalysis techniques are hardly found—most of them are either algorithm specific or useful for bit-flipping data hiding scheme. In this context, unlike most common message bit flipping techniques, a novel bit matching and position concealment procedure has been proposed. Satisfactory theoretical and experimental outcomes have been achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sun, W., Shen, R., Yu, F., Lu, Z.: Data hiding in audio based on audio-to-image wavelet transform and vector quantization. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), , pp. 313-316. IEEE Xplore, Piraeus, China, 18–20th July 2002

    Google Scholar 

  2. Huang, X., Kawashima, R., Segawa, N., Abe, Y.: Design and implementation of synchronized audio to audio steganography scheme. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp. 331-334. IEEE Xplore. 15th–17th Aug 2008

    Google Scholar 

  3. Cvejic, N., Seppnen, T.: Increasing robustness of LSB audio steganography using a novel embedding method. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 04), vol. 2, p. 533 (2004)

    Google Scholar 

  4. Cox, I.J., Miller, M.L., Linnartz, J.M.G., Kalker, T.: A review of watermarking principles and practices. In: Digital Signal Processing for Multimedia Systems, pp 461–482 (1999)

    Google Scholar 

  5. Bloom, J.A., Cox, I.J., Kalker, T., Linnartz, J.M.G., Miller, M.L., Traw, C.B.S.: Copy protection for DVD video. In: Proceedings of the IEEE, vol. 87, pp 1267, 1272–1275 (1999)

    Google Scholar 

  6. Hernandez, J.R., Amado, M., Perez-Gonzalez, F.: DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. Image Process. 9, 55–68 (2000). Jan.

    Article  Google Scholar 

  7. Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless steganography in spatial domain using energetic pixels. In: Proceedings of the 8th International Conference on Information Systems Security (ICISS), IIT-Guwahati, India, vol. 7671, pp. 134-148. LNCS, Springer, Berlin, 15–19th Dec 2012

    Chapter  Google Scholar 

  8. Hemlatha, S., Dinesh, A., Renuka, A., : Wavelet transform based steganography technique to hide audio signals in image. In: Elsevier B.V. Graph Algorithms, High Performance Implementations and Its Applications, vol: 47, pp. 272–281 (2015)

    Google Scholar 

  9. Gambhir, A., Khara, S.: Integrating RSA cryptography and audio steganography. In: International Conference on Computing, Communication and Automation, IEEE (2016)

    Google Scholar 

  10. Mukherjee, N., Bhattacharya, A., Bose, S.S.: Evolutionary multibit grouping steganographic algorithm. In: International Conference on Information Systems Security (ICISS), pp. 285–296. Springer, Berlin (2013)

    Chapter  Google Scholar 

  11. Bandyopadhyay, S., Datta, B.: Higher LSB layer based audio steganography technique. Int. J. Electron. E-commun. Technol. 2(4) (2011)

    Google Scholar 

  12. Binny, A., Koilkuntla, M.: Hiding secret information using LSB based audio steganography. In: International Conference on Soft computing and Machine Intelligence, IEEE (2015)

    Google Scholar 

  13. Divya, S., Reddy, M.: Hiding text in audio using multiple LSB steganography and provide security using cryptography. Int. J. Sci. Technol. Res. 1(6) (2012)

    Google Scholar 

  14. Singh, S., Siddiqui, T.J.: A security enhanced robust steganography algorithm for data hiding. Int. J. Comput. Sci. Issues 9(3),1694–0814 (2012). ISSN (Online)

    Google Scholar 

  15. Jayaram, P., Ranganatha, H., Anupama, H.: Information hiding using audio steganography “A Survey". Int. J. Multimed. Appl. (IJMA) 3(3) (2011)

    Article  Google Scholar 

  16. Asad, M., Gilani, J., Khalid, A.: An enhanced least significant bit modification technique for audio steganography. In: International Conference on Computer Networks and Information Technology (ICCNIT), pp. 143–147. 11–13th July 2011

    Google Scholar 

  17. Nugraha, R.M.: Implementation of direct sequence spread spectrum steganography on audio data. In: 2011 International Conference on Electrical Engineering and Informatics, Bandung, Indonesia. 17–19th July 2011

    Google Scholar 

  18. Zhu, J., Wang, R., Yan, D.: The sign bits of huffman codeword-based steganography for AAC audio. In: International Conference on Multimedia Technology (ICMT), pp. 1–4. IEEE Xplore, Ningbo, China, 29–31st Oct, 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nabanita Mukherjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mukherjee, N., Paul, G., Saha, S.K. (2020). A Novel Position Concealment Audio Steganography in Insensible Frequency. In: Behera, H., Nayak, J., Naik, B., Pelusi, D. (eds) Computational Intelligence in Data Mining. Advances in Intelligent Systems and Computing, vol 990. Springer, Singapore. https://doi.org/10.1007/978-981-13-8676-3_33

Download citation

Publish with us

Policies and ethics