..............................
            ..............................
            ..............................
            
An Efficient Steganographic Approach to HideInformation in Digital Audio using Modulus
        
        This  paper  presents  an  efficient  data  hiding  technique  where  the  encrypted  secret  message  has  been  hidden  into 
digital  audio  based  on  modified  Exploiting  Modification  Direction  (mEMD)  technique.  We  put  an  effort  to  minimize  the  bit 
alterations  introduced in  the  host  audio  signal  during  data  hiding  process. The  proposed scheme  confirms that  the  maximum 
change  is  less  than  6.25%  of  the  related  audio  sample  and  the  average  sample  level  error  is less  than  3%. The  experimental 
results  ensure  that  the  method  has a  higher  embedding  capacity  (88.2  kbps),  maintaining  imperceptibility  (Object  Difference 
Grades are between-0.10 and-0.31) and offer robustness against detection of intentional or unintentional audio signal attack 
detection. Based on imperceptibility, security, robustness, and embedding capacity- performance has been evaluated.    
            [1] Avcibas I., “Audio Steganalysis with Content- independent Distortion Measures,” IEEE Signal Processing Letters, vol. 13, no. 2, pp. 92-95, 2006.
[2] Bender W., Gruhl D., Morimoto N., and Lu A., “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996.
[3] Bhowal K., Bhattacharyya D., Jyoti Pal A., and Kim T., “A GA based Audio Steganography With Enhanced Security,” Telecommunication Systems, vol. 52, no. 4, pp. 2197-2204, 2013.
[4] Bo Y., “Extensive Bark Spectral Distortion Measurement for Objective Speech Quality Assessment,” Journal of University of Electronic Science and Technology of China, vol. 35, no. 3, pp. 343-345, 2006.
[5] Bohme R., Advanced Statistical Steganalysis, Principles of Modern Steganography and Steganalysis, Springer, 2010.
[6] Chang C., Tai W., and Chen K., “Improvements of EMD Embedding for Large Payloads,” in Proceedings of 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, pp. 473-476, 2007.
[7] Cox I., Miller M., and Kalker T., Digital Watermarking and Steganography, Morgan Kaufmann Publishers, 2008.
[8] Fallahpour M. and Megías D., “Audio Watermarking Based on Fibonacci Numbers,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 8, pp. 1273- 1282, 2015.
[9] Garcia-HernandezaMichelb J., RamonParra-M., Feregrino-Uribec R., and Cumplidoc R., “High Payload Data-Hiding in Audio Signals Based on A Modified OFDM Approach,” Expert Systems with Applications, vol. 40, no. 8, pp. 3055-3064, 2013.
[10] Harmsen J. and Pearlman W., “Steganalysis of Additive-Noise Modelable Information Hiding,” in Proceedings of Security and Watermarking of Multimedia Contents, Santa Clara, pp. 131-142, 2003.
[11] Ker A., “Steganalysis of LSB Matching in Greyscale Images,” IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441-444, 2005.
[12] Khaldi K. and Boudraa A., “Audio Watermarking Via EMD,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 21, no. 3, pp. 675-680, 2013.
[13] Khan M., Bhasker V., and ShivaNagaraju V., “An Optimized Method for Concealing Data using Audio Steganography,” International Journal of Computer Applications, vol. 33, no. 4, pp. 25-30, 2011.
[14] Khan Z., Shah M., Naeem M., Mahmood T., Amin N., and Shehzad D., “Threshold-based Steganography: A Novel Technique for Improved Payload and SNR,” The International Arab Journal of Information Technology, vol. 13, no. 4, pp. 381-386, 2016.
[15] Lee C., Chang C., and Wang K., “An Improvement of EMD Embedding Method for Large Payloads By Pixel Segmentation Strategy,” Image and Vision Computing, vol. 26, no. 12, pp. 1670-1676, 2008.
[16] Lee C., Wang Y., and Chang C., “A Steganographic Method With High Embedding Capacity By Improving Exploiting Modification Direction,” in Proceedings of 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, pp. 497-500, 2007.
[17] Lerch A., Zplane Development, EAQUAL- Evaluate Audio QUALity, version:0.1.3 alpha, 2002.
[18] Liu Q., Sung A., and Qiao M., “Novel Stream 0 L Q L Q J I R U $ X G L R 6 W H J D Q D O \ V L V ´ in Proceedings of 17th ACM International Conference on Multimedia, Beijing, pp. 95-104, 2009.
[19] Liu Y., Chiang K., Corbett C., Archibald R., Mukherjee B., and Ghosal D., “A Novel Audio Steganalysis based on Higher-Order Statistics of a Distortion Measure with Hausdorff Distance,” in Proceedings of International Conference on Information Security, Berlin, pp. 487-501, 2008.
[20] Mansour M. and Tewfik A., “Data Embedding in Audio Using Time-Scale Modification,” IEEE Transactions on Speech and Audio Processing, vol. 13, no. 3, pp. 432-440, 2005.
[21] Mielikainen J., “LSB Matching Revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285- 287, 2006.
[22] Ozer H., Avcibas I., Sankur B., and Memon N., “Steganalysis of Audio Based on Audio Quality Metrics,” in Proceedings of Security and Watermarking of Multimedia Contents V, Santa Clara, pp. 55-66, 2003.
[23] Quackenbush S., Barnwell T., and Clements M., Objective Measures of Speech Quality, Prentice Hall,1988.
[24] Shuzheng X., Peng Z., Pengjun W., and Huazhong Y., “Performance Analysis of Data Hiding in MPEG-4 AAC Audio,” Tsinghua Science and Technology, vol. 14, no. 1, pp. 55- 61, 2009.
[25] Swanson M., Zhu B., and Tewfik A., “Current State of the Art, Challenges and Future An Efficient Steganographic Approach to HideInformation in Digital Audio ... 711 Directions for Audio Watermarking,” in Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, pp. 19-24, 1999.
[26] Thiede T., Treurniet W., Bitto R., Schmidmer C., Sporer T., Beerends J., Colomes C., Keyhl M., Stoll G., Brandenburg K., and Feiten B., “PEAQ- The ITU Standard for Objective Measurement of Perceived Audio Quality,” Journal of the Audio Engineering Society, vol. 48, no. 1-2, pp. 3-29, 2000.
[27] Unoki M., Imabeppu K., Hamada D., Haniu A., and Miyauchi R., “Embedding Limitations With Digital-Audio Watermarking Method Based on Cochlear Delay Characteristics,” Journal of Information Hiding Multimedia Signal Processing, vol. 2, no. 1, pp. 1-23, 2011.
[28] Wang S. and Unoki M., “Speech Watermarking Method Based on Formant Tuning,” IEICE Transactions on Information and Systems, vol. E98-D, pp. 29-37, 2015.
[29] Westfeld A. and Pfitzmann A., “Attacks on Steganographic Systems, in Information Hiding,” in Proceedings of International Workshop on Information Hiding, Berlin, pp. 61-66, 1999.
[30] Westfeld A., “A Steganographic Algorithm,” in Proceedings of 4th International Workshop Information Hiding, Lecture Notes in Computer Science, Berlin, pp. 289-302, 2001.
[31] Xiang S., Kim H., and Huang J., “Audio Watermarking Robust Against Time-Scale Modification and MP3 Compression,” Signal Processing, vol. 88, no. 10, pp. 2372-2387, 2008.
[32] Zhang X. and Wang S., “Dynamically Running Coding in Digital Steganography,” IEEE Signal Processing Letters, vol. 13, no. 3, pp. 165-168, 2006.
[33] Zhang X. and Wang S., “Efficient Steganographic Embedding By Exploiting Modification Direction,” IEEE Communications Letters, vol. 10, no. 10, pp. 781-783, 2006. Krishna Bhowal is a research scholar in University of Kalyani, India. He is presently working as an Assistant Professor at Academy of Technology, Kolkata, India. His area of interest includes Audio Steganography, Watermarking, and Cryptography. He has published 9 research articles in various journals and conferences. Debasree Chanda obtained her Ph.D in Engineering from Jadavpur University in the year 2005. She is presently working as Associate Professor Rank at the Dept. of Engineering and Technological Studies, University of Kalyani. Her area of research includes Microstrip Antenna, microstrip Filter, Frequency Selective Surfaces. Susanta Biswas obtained his Ph.D in engineering from Jadavpur University in the year 2004. He is presently working as Associate Professor Rank at the Dept. of Engineering & Technological Studies, University of Kalyani. His area of interest includes, Artificial Neural Network, Image Processing, Frequency Selective Surfaces, Microstrip Antennas. Partha Sarkar obtained his Ph.D in Engineering from Jadavpur University in the year 2002. He is presently working in the rank Professor at the Dept. of Engineering and Technological Studies, University of Kalyani. His area of research includes Microstrip Antenna, microstrip Filter, Frequency Selective Surfaces and Artificial Neural Network. He has contributed to numerous (more than 270 publications) research articles in various journals and conferences of repute.
