Research Article | OPEN ACCESS
A Review on Audio Steganography Techniques
1Ahmed Hussain Ali, 1Mohd Rosmadi Mokhtar and 2Loay Edwar George
1Research Center for Software Technologi and Management, Faculty of Information Science and Technologi, Universiti Kebangsaan Malaysia, 43600 Bandar BaruBangi, Malaysia
2Department of Computer Science, College of Science, University of Baghdad, Baghdad, Iraq
Research Journal of Applied Sciences, Engineering and Technology 2016 2:154-162
Received: May 5, 2015 | Accepted: July 14, 2015 | Published: January 20, 2016
Abstract
The aim of this study is to present different types of steganography in brief and to give a special attention to audio steganography technique because a huge number of audio files are exchanged through the networks. Nowadays the widening of attacker's abilities to access the private and public information transmitted over public communication system makes way for highlighting a tool that guarantees the secure transmission of hidden information. Information hiding was a common security term that mainly includes three techniques: cryptography, steganography and watermark. Cryptography was an ancient form that is used for confidential data. Steganography is a popular tool that uses digital medium to hide confidential data in innocent carrier such as image, audio, text and video. Steganography is in fact a complement for the earlier data hiding technique cryptography. However watermark is used for copyright protection. Audio steganography is technique that hides any type of secret data in cover audio file. This study also discusses the main requirements of steganography methods and how those methods achieve them. Furthermore it shows steganography domain and, carriers and information hiding techniques used in audio.
Keywords:
Carrier, cryptography, fractal coding, LSB, steganography requirements, vector quantization, wavelet transform,
References
-
Al-Othmani, A.Z., A.A. Manaf and A.M. Zeki, 2012. A survey on steganography techniques in real time audio signals and evaluation. Int. J. Comput. Sci., 9(1).
-
Ali, S., L.E. George and H.Baker, 2013. Speeding up audio fractal compression. Int. J. Adv. Res. Comput. Sci. Softw. Eng., 3(6): 86-92.
-
Antony, J., C. Sobin and A. Sherly, 2012. Audio steganography in wavelet domain-a survey. Int. J. Comput. Appl., 52: 33-37.
CrossRef -
Asad, M., J. Gilani and A. Khalid, 2011. An enhanced least significant bit modification technique for audio steganography. Proceeding of the 2011 International Conference on Computer Networks and Information Technology (ICCNIT, 2011), pp: 143-147.
CrossRef -
Ballesteros, L.D.M. and A.J.M. Moreno, 2012. Highly transparent steganography model of speech signals using efficient wavelet masking. Expert Syst. Appl., 39(10): 9141-9149.
CrossRef -
Bandyopadhyay, S.K. and B.G. Banik, 2012. Multi-level steganographic algorithm for audio steganography using LSB modification and parity encoding technique. Int. J.Emerg. Trends Technol. Comput. Sci. (IJETTCS), 1(2).
-
Bandyopadhyay, S.K., D. Bhattacharyya, D. Ganguly, S. Mukherjee and P. Das, 2008. A tutorial review on steganography. Proceeding of the International Conference on Contemporary Computing.
PMCid:PMC3451761 -
Bedan, A.K. and L.E. George, 2013. Speeding-up fractal audio compression using moment descriptors. Int. J. Sci. Eng. Res., 4(7).
-
Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35(3.4): 313-336.
CrossRef
-
Bhattacharyya, S. and G. Sanyal, 2012. A novel approach of video steganography using PMM. In: Venugopal, K.R. and L.M. Patnaik (Eds.), ICIP, 2012. CCIS 292, Springer-Verlag, Berlin, Heidelberg, pp: 644-653.
CrossRef
-
Bhowal, K., D. Bhattacharyya, A.J. Pal and T.H. Kim, 2013. A GA based audio steganography with enhanced security. Telecommun. Syst., 52(4): 2197-2204.
CrossRef
-
Chang, C.C. and T.S. Nguyen, 2014. A reversible data hiding scheme for smvq indices. Informatica, 25(4): 523-540.
CrossRef
-
Cvejic, N., 2004. Algorithms for audio watermarking and steganography. Unpublished Ph.D. Thesis, University of Oulun, Finland.
-
Delforouzi, A. and M. Pooyan, 2008. Adaptive digital audio steganography based on integer wavelet transform. Circ. Syst. Signal Pr., 27(2): 247-259.
CrossRef
-
Delforouzi, A. and M. Pooyan, 2009. Adaptive and efficient audio datahiding method in temporal domain. Proceeding of the 7th International Conference on Information, Communications and Signal Processing (ICICS, 2009).
CrossRef
-
Dieu, H.B. and N.X. Huy, 2014. An improved technique for hiding data in audio. Proceeding of the 4th International Conference on Digital Information and Communication Technology and it's Applications (DICTAP, 2014).
CrossRef
-
Divya, S. and M.R.M. Reddy, 2012. Hiding text in audio using multiple LSB steganography and provide security using cryptography. Int. J. Sci. Technol. Res., 1(6).
-
George, L.E. and G.A. Mahmood, 2010. Audio steganography based on signal modulation in wavelet domain. Iraqi J. Sci., 9: 10.
-
George, L.E. and S.K. Ahmad, 2010. Hiding image in image using Iterated Function System (IFS). Proceeding of the European Conference of Systems, and European Conference of Circuits Technology and Devices, and European Conference of Communications, and European Conference on Computer Science.
-
George, L.E. and A.H. Ali, 2011. Fast Image Steganography Using Affine Mapping.
-
Gomez-Coronel, S.L., B. Escalante-Ramirez, M.A. Acevedo-Mosqueda and M.E. Acevedo, 2014. Steganography in audio files by hermite transform. Appl. Math, 8(3): 959-966.
CrossRef
-
Hemalatha, S., U.D. Acharya, A. Renuka and P.R. Kamath, 2013. A secure and high capacity image steganography technique. Signal Image Process. Int. J. (SIPIJ), 4: 83-89.
CrossRef
-
Kaur, K. and D. Verma, 2014. Multi-level steganographic algorithm for audio steganography using LSB, parity coding and phase coding technique. Int. J. Adv. Res. Comput. Sci. Software Eng., 4(1).
-
Kekre, H., A. Athawale, S. Rao and U. Athawale, 2010. Information hiding in audio signals. Int. J. Comput. Appl., 7(9): 14-19.
CrossRef
-
Khan, M.S., M.V. Bhaskar and M.S. Nagaraju, 2011. An optimized method for concealing data using audio steganography. Int. J. Comput. Appl., 33(4): 25-30, (0975-8887).
-
Lee, J.D., Y.H. Chiou and J.M. Guo, 2013. Lossless data hiding for VQ indices based on neighboring correlation. Inform. Sciences, 221: 419-438.
CrossRef
-
Linde, Y., A. Buzo and R.M. Gray, 1980. An algorithm for vector quantizer design. IEEE T. Commun., 28(1): 84-95.
CrossRef
-
Mehraj, M.M.B., 2011. Watermarking Using DCT & Fractal Compression. Int. J. Comput. Trend. Technol., 1(2).
-
Nosrati, M., R. Karimi and M. Hariri, 2012. Audio steganography: A survey on recent approaches. World Appl. Programm., 2(3): 202-205.
-
Pan, Z., S. Hu, X. Ma and L. Wang, 2015. A new lossless data hiding method based on joint neighboring coding. J. Vis. Commun. Image R., 26: 14-23.
CrossRef
-
Pathak, P., A.K. Chattopadhyay and A. Nag, 2014. A new audio steganography scheme based on location selection with enhanced security. Proceeding of the 1st International Conference on Automation, Control, Energy and Systems (ACES, 2014).
CrossRef
-
Pooyan, M. and A. Delforouzi, 2007. LSB-based audio steganography method based on lifting wavelet transform. Proceeding of the IEEE International Symposium on Signal Processing and Information Technology.
CrossRef
-
Rababah, A. and U. Abdulgader, 2011. New technique for hiding data in audio file. Int. J. Comput. Sci. Network Secur., 11(4).
-
Rahim, L.B.A., S. Bhattacharjee and I.B. Aziz, 2014. An audio steganography technique to maximize data hiding capacity along with least modification of host. Proceeding of the 1st International Conference on Advanced Data and Information Engineering (DaEng-2013).
CrossRef
-
Roy, S. and P. Venkateswaran, 2013. A text based steganography technique with Indian root. Proc. Technol., 10: 167-171.
CrossRef
-
Santhi, V. and L. Govindaraju, 2014. Stego-audio Using Genetic Algorithm Approach. Res. J. Appl. Sci. Eng. Technol., 7(22): 4806-4812.
-
Satpute, S., S. Shahane, S. Singh and M. Sharma, 2015. An Approach towards Video Steganography Using FZDH (Forbidden Zone Data Hiding).
-
Shah, P., P. Choudhari and S.Sivaraman, 2008. Adaptive wavelet packet based audio steganography using data history. Proceeding of the IEEE Region 10 and the 3rd International Conference on Industrial and Information Systems (ICIIS, 2008), pp: 1-5.
CrossRef
-
Shahadi, H.I. and R. Jidin, 2011. High capacity and inaudibility audio steganography scheme. Proceeding of the 7th International Conference on Information Assurance and Security (IAS, 2011).
CrossRef
-
Shie, S.C. and J.H. Jiang, 2012. Reversible and high-payload image steganographic scheme based on side-match vector quantization. Signal Process., 92(9): 2332-2338.
CrossRef
-
Shirali-Shahreza, S. and M. Manzuri-Shalmani, 2008. High capacity error free wavelet domain speech steganography. Proceeding of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, 2008).
CrossRef
-
Shiu, H., S. Tang, C.H. Huang, R.C. Lee and C. Lei, 2014. A reversible acoustic data hiding method based on analog modulation. Inform. Sciences, 273: 233-246.
CrossRef
-
Shu, Y., L. Liu, W. Tian and X. Miao, 2011. Algorithm for information hiding in optional multi-text. Proc. Eng., 15: 3936-3941.
CrossRef
-
Sidhik, S., S. Sudheer and V. Mahadhevan Pillsai, 2013. Modified high capacity steganography for color images using wavelet fusion. Proceeding of the 4th International Workshop on Fiber Optics in Access Network (FOAN, 2013).
CrossRef
-
Singh, K.U., 2014. A survey on audio steganography approaches. Int. J. Comput. Appl., 95(14): 7-14.
-
Song, S., J. Zhang, X. Liao, J. Du and Q. Wen, 2011. A novel secure communication protocol combining steganography and cryptography. Proc. Eng., 15: 2767-2772.
CrossRef
-
Tanwar, R., B. Sharma and S. Malhotra, 2014. A robust substitution technique to implement audio steganography. Proceeding of the International Conference on Optimization, Reliabilty, and Information Technology (ICROIT, 2014), pp: 290-293.
CrossRef
-
Thenmozhi, S. and M. Chandrasekaran, 2012. Novel approach for image stenography based on integer wavelet transform. Proceeding of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC, 2012), pp: 1-5.
CrossRef
-
Verma, S.S., R. Gupta and G. Shrivastava, 2014. A novel technique for data hiding in audio carrier by using sample comparison in DWT domain. Proceeding of the 4th International Conference on Communication Systems and Network Technologies (CSNT, 2014), pp: 639-643.
CrossRef
-
Xiao, H., 2005. Fractal audio coding. M.A. Thesis, Queen's University, Canada,7: 20-25.
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|