Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


A Review on Audio Steganography Techniques

1Ahmed Hussain Ali, 1Mohd Rosmadi Mokhtar and 2Loay Edwar George
1Research Center for Software Technologi and Management, Faculty of Information Science and Technologi, Universiti Kebangsaan Malaysia, 43600 Bandar BaruBangi, Malaysia
2Department of Computer Science, College of Science, University of Baghdad, Baghdad, Iraq
Research Journal of Applied Sciences, Engineering and Technology  2016  2:154-162
http://dx.doi.org/10.19026/rjaset.12.2316  |  © The Author(s) 2016
Received: May ‎5, ‎2015  |  Accepted: July ‎14, ‎2015  |  Published: January 20, 2016

Abstract

The aim of this study is to present different types of steganography in brief and to give a special attention to audio steganography technique because a huge number of audio files are exchanged through the networks. Nowadays the widening of attacker's abilities to access the private and public information transmitted over public communication system makes way for highlighting a tool that guarantees the secure transmission of hidden information. Information hiding was a common security term that mainly includes three techniques: cryptography, steganography and watermark. Cryptography was an ancient form that is used for confidential data. Steganography is a popular tool that uses digital medium to hide confidential data in innocent carrier such as image, audio, text and video. Steganography is in fact a complement for the earlier data hiding technique cryptography. However watermark is used for copyright protection. Audio steganography is technique that hides any type of secret data in cover audio file. This study also discusses the main requirements of steganography methods and how those methods achieve them. Furthermore it shows steganography domain and, carriers and information hiding techniques used in audio.

Keywords:

Carrier, cryptography, fractal coding, LSB, steganography requirements, vector quantization, wavelet transform,


References

  1. Al-Othmani, A.Z., A.A. Manaf and A.M. Zeki, 2012. A survey on steganography techniques in real time audio signals and evaluation. Int. J. Comput. Sci., 9(1).
  2. Ali, S., L.E. George and H.Baker, 2013. Speeding up audio fractal compression. Int. J. Adv. Res. Comput. Sci. Softw. Eng., 3(6): 86-92.
  3. Antony, J., C. Sobin and A. Sherly, 2012. Audio steganography in wavelet domain-a survey. Int. J. Comput. Appl., 52: 33-37.
    CrossRef    
  4. Asad, M., J. Gilani and A. Khalid, 2011. An enhanced least significant bit modification technique for audio steganography. Proceeding of the 2011 International Conference on Computer Networks and Information Technology (ICCNIT, 2011), pp: 143-147.
    CrossRef    
  5. Ballesteros, L.D.M. and A.J.M. Moreno, 2012. Highly transparent steganography model of speech signals using efficient wavelet masking. Expert Syst. Appl., 39(10): 9141-9149.
    CrossRef    
  6. Bandyopadhyay, S.K. and B.G. Banik, 2012. Multi-level steganographic algorithm for audio steganography using LSB modification and parity encoding technique. Int. J.Emerg. Trends Technol. Comput. Sci. (IJETTCS), 1(2).
  7. Bandyopadhyay, S.K., D. Bhattacharyya, D. Ganguly, S. Mukherjee and P. Das, 2008. A tutorial review on steganography. Proceeding of the International Conference on Contemporary Computing.
    PMCid:PMC3451761    
  8. Bedan, A.K. and L.E. George, 2013. Speeding-up fractal audio compression using moment descriptors. Int. J. Sci. Eng. Res., 4(7).
  9. Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35(3.4): 313-336.
    CrossRef    
  10. Bhattacharyya, S. and G. Sanyal, 2012. A novel approach of video steganography using PMM. In: Venugopal, K.R. and L.M. Patnaik (Eds.), ICIP, 2012. CCIS 292, Springer-Verlag, Berlin, Heidelberg, pp: 644-653.
    CrossRef    
  11. Bhowal, K., D. Bhattacharyya, A.J. Pal and T.H. Kim, 2013. A GA based audio steganography with enhanced security. Telecommun. Syst., 52(4): 2197-2204.
    CrossRef    
  12. Chang, C.C. and T.S. Nguyen, 2014. A reversible data hiding scheme for smvq indices. Informatica, 25(4): 523-540.
    CrossRef    
  13. Cvejic, N., 2004. Algorithms for audio watermarking and steganography. Unpublished Ph.D. Thesis, University of Oulun, Finland.
  14. Delforouzi, A. and M. Pooyan, 2008. Adaptive digital audio steganography based on integer wavelet transform. Circ. Syst. Signal Pr., 27(2): 247-259.
    CrossRef    
  15. Delforouzi, A. and M. Pooyan, 2009. Adaptive and efficient audio datahiding method in temporal domain. Proceeding of the 7th International Conference on Information, Communications and Signal Processing (ICICS, 2009).
    CrossRef    
  16. Dieu, H.B. and N.X. Huy, 2014. An improved technique for hiding data in audio. Proceeding of the 4th International Conference on Digital Information and Communication Technology and it's Applications (DICTAP, 2014).
    CrossRef    
  17. Divya, S. and M.R.M. Reddy, 2012. Hiding text in audio using multiple LSB steganography and provide security using cryptography. Int. J. Sci. Technol. Res., 1(6).
  18. George, L.E. and G.A. Mahmood, 2010. Audio steganography based on signal modulation in wavelet domain. Iraqi J. Sci., 9: 10.
  19. George, L.E. and S.K. Ahmad, 2010. Hiding image in image using Iterated Function System (IFS). Proceeding of the European Conference of Systems, and European Conference of Circuits Technology and Devices, and European Conference of Communications, and European Conference on Computer Science.
  20. George, L.E. and A.H. Ali, 2011. Fast Image Steganography Using Affine Mapping.
  21. Gomez-Coronel, S.L., B. Escalante-Ramirez, M.A. Acevedo-Mosqueda and M.E. Acevedo, 2014. Steganography in audio files by hermite transform. Appl. Math, 8(3): 959-966.
    CrossRef    
  22. Hemalatha, S., U.D. Acharya, A. Renuka and P.R. Kamath, 2013. A secure and high capacity image steganography technique. Signal Image Process. Int. J. (SIPIJ), 4: 83-89.
    CrossRef    
  23. Kaur, K. and D. Verma, 2014. Multi-level steganographic algorithm for audio steganography using LSB, parity coding and phase coding technique. Int. J. Adv. Res. Comput. Sci. Software Eng., 4(1).
  24. Kekre, H., A. Athawale, S. Rao and U. Athawale, 2010. Information hiding in audio signals. Int. J. Comput. Appl., 7(9): 14-19.
    CrossRef    
  25. Khan, M.S., M.V. Bhaskar and M.S. Nagaraju, 2011. An optimized method for concealing data using audio steganography. Int. J. Comput. Appl., 33(4): 25-30, (0975-8887).
  26. Lee, J.D., Y.H. Chiou and J.M. Guo, 2013. Lossless data hiding for VQ indices based on neighboring correlation. Inform. Sciences, 221: 419-438.
    CrossRef    
  27. Linde, Y., A. Buzo and R.M. Gray, 1980. An algorithm for vector quantizer design. IEEE T. Commun., 28(1): 84-95.
    CrossRef    
  28. Mehraj, M.M.B., 2011. Watermarking Using DCT & Fractal Compression. Int. J. Comput. Trend. Technol., 1(2).
  29. Nosrati, M., R. Karimi and M. Hariri, 2012. Audio steganography: A survey on recent approaches. World Appl. Programm., 2(3): 202-205.
  30. Pan, Z., S. Hu, X. Ma and L. Wang, 2015. A new lossless data hiding method based on joint neighboring coding. J. Vis. Commun. Image R., 26: 14-23.
    CrossRef    
  31. Pathak, P., A.K. Chattopadhyay and A. Nag, 2014. A new audio steganography scheme based on location selection with enhanced security. Proceeding of the 1st International Conference on Automation, Control, Energy and Systems (ACES, 2014).
    CrossRef    
  32. Pooyan, M. and A. Delforouzi, 2007. LSB-based audio steganography method based on lifting wavelet transform. Proceeding of the IEEE International Symposium on Signal Processing and Information Technology.
    CrossRef    
  33. Rababah, A. and U. Abdulgader, 2011. New technique for hiding data in audio file. Int. J. Comput. Sci. Network Secur., 11(4).
  34. Rahim, L.B.A., S. Bhattacharjee and I.B. Aziz, 2014. An audio steganography technique to maximize data hiding capacity along with least modification of host. Proceeding of the 1st International Conference on Advanced Data and Information Engineering (DaEng-2013).
    CrossRef    
  35. Roy, S. and P. Venkateswaran, 2013. A text based steganography technique with Indian root. Proc. Technol., 10: 167-171.
    CrossRef    
  36. Santhi, V. and L. Govindaraju, 2014. Stego-audio Using Genetic Algorithm Approach. Res. J. Appl. Sci. Eng. Technol., 7(22): 4806-4812.
  37. Satpute, S., S. Shahane, S. Singh and M. Sharma, 2015. An Approach towards Video Steganography Using FZDH (Forbidden Zone Data Hiding).
  38. Shah, P., P. Choudhari and S.Sivaraman, 2008. Adaptive wavelet packet based audio steganography using data history. Proceeding of the IEEE Region 10 and the 3rd International Conference on Industrial and Information Systems (ICIIS, 2008), pp: 1-5.
    CrossRef    
  39. Shahadi, H.I. and R. Jidin, 2011. High capacity and inaudibility audio steganography scheme. Proceeding of the 7th International Conference on Information Assurance and Security (IAS, 2011).
    CrossRef    
  40. Shie, S.C. and J.H. Jiang, 2012. Reversible and high-payload image steganographic scheme based on side-match vector quantization. Signal Process., 92(9): 2332-2338.
    CrossRef    
  41. Shirali-Shahreza, S. and M. Manzuri-Shalmani, 2008. High capacity error free wavelet domain speech steganography. Proceeding of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, 2008).
    CrossRef    
  42. Shiu, H., S. Tang, C.H. Huang, R.C. Lee and C. Lei, 2014. A reversible acoustic data hiding method based on analog modulation. Inform. Sciences, 273: 233-246.
    CrossRef    
  43. Shu, Y., L. Liu, W. Tian and X. Miao, 2011. Algorithm for information hiding in optional multi-text. Proc. Eng., 15: 3936-3941.
    CrossRef    
  44. Sidhik, S., S. Sudheer and V. Mahadhevan Pillsai, 2013. Modified high capacity steganography for color images using wavelet fusion. Proceeding of the 4th International Workshop on Fiber Optics in Access Network (FOAN, 2013).
    CrossRef    
  45. Singh, K.U., 2014. A survey on audio steganography approaches. Int. J. Comput. Appl., 95(14): 7-14.
  46. Song, S., J. Zhang, X. Liao, J. Du and Q. Wen, 2011. A novel secure communication protocol combining steganography and cryptography. Proc. Eng., 15: 2767-2772.
    CrossRef    
  47. Tanwar, R., B. Sharma and S. Malhotra, 2014. A robust substitution technique to implement audio steganography. Proceeding of the International Conference on Optimization, Reliabilty, and Information Technology (ICROIT, 2014), pp: 290-293.
    CrossRef    
  48. Thenmozhi, S. and M. Chandrasekaran, 2012. Novel approach for image stenography based on integer wavelet transform. Proceeding of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC, 2012), pp: 1-5.
    CrossRef    
  49. Verma, S.S., R. Gupta and G. Shrivastava, 2014. A novel technique for data hiding in audio carrier by using sample comparison in DWT domain. Proceeding of the 4th International Conference on Communication Systems and Network Technologies (CSNT, 2014), pp: 639-643.
    CrossRef    
  50. Xiao, H., 2005. Fractal audio coding. M.A. Thesis, Queen's University, Canada,7: 20-25.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved