The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


An Efficient Steganographic Approach to HideInformation in Digital Audio using Modulus

Operation,
This paper presents an efficient data hiding technique where the encrypted secret message has been hidden into digital audio based on modified Exploiting Modification Direction (mEMD) technique. We put an effort to minimize the bit alterations introduced in the host audio signal during data hiding process. The proposed scheme confirms that the maximum change is less than 6.25% of the related audio sample and the average sample level error is less than 3%. The experimental results ensure that the method has a higher embedding capacity (88.2 kbps), maintaining imperceptibility (Object Difference Grades are between-0.10 and-0.31) and offer robustness against detection of intentional or unintentional audio signal attack detection. Based on imperceptibility, security, robustness, and embedding capacity- performance has been evaluated.


[1] Avcibas I., “Audio Steganalysis with Content- independent Distortion Measures,” IEEE Signal Processing Letters, vol. 13, no. 2, pp. 92-95, 2006.

[2] Bender W., Gruhl D., Morimoto N., and Lu A., “Techniques for Data Hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996.

[3] Bhowal K., Bhattacharyya D., Jyoti Pal A., and Kim T., “A GA based Audio Steganography With Enhanced Security,” Telecommunication Systems, vol. 52, no. 4, pp. 2197-2204, 2013.

[4] Bo Y., “Extensive Bark Spectral Distortion Measurement for Objective Speech Quality Assessment,” Journal of University of Electronic Science and Technology of China, vol. 35, no. 3, pp. 343-345, 2006.

[5] Bohme R., Advanced Statistical Steganalysis, Principles of Modern Steganography and Steganalysis, Springer, 2010.

[6] Chang C., Tai W., and Chen K., “Improvements of EMD Embedding for Large Payloads,” in Proceedings of 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, pp. 473-476, 2007.

[7] Cox I., Miller M., and Kalker T., Digital Watermarking and Steganography, Morgan Kaufmann Publishers, 2008.

[8] Fallahpour M. and Megías D., “Audio Watermarking Based on Fibonacci Numbers,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 8, pp. 1273- 1282, 2015.

[9] Garcia-HernandezaMichelb J., RamonParra-M., Feregrino-Uribec R., and Cumplidoc R., “High Payload Data-Hiding in Audio Signals Based on A Modified OFDM Approach,” Expert Systems with Applications, vol. 40, no. 8, pp. 3055-3064, 2013.

[10] Harmsen J. and Pearlman W., “Steganalysis of Additive-Noise Modelable Information Hiding,” in Proceedings of Security and Watermarking of Multimedia Contents, Santa Clara, pp. 131-142, 2003.

[11] Ker A., “Steganalysis of LSB Matching in Greyscale Images,” IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441-444, 2005.

[12] Khaldi K. and Boudraa A., “Audio Watermarking Via EMD,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 21, no. 3, pp. 675-680, 2013.

[13] Khan M., Bhasker V., and ShivaNagaraju V., “An Optimized Method for Concealing Data using Audio Steganography,” International Journal of Computer Applications, vol. 33, no. 4, pp. 25-30, 2011.

[14] Khan Z., Shah M., Naeem M., Mahmood T., Amin N., and Shehzad D., “Threshold-based Steganography: A Novel Technique for Improved Payload and SNR,” The International Arab Journal of Information Technology, vol. 13, no. 4, pp. 381-386, 2016.

[15] Lee C., Chang C., and Wang K., “An Improvement of EMD Embedding Method for Large Payloads By Pixel Segmentation Strategy,” Image and Vision Computing, vol. 26, no. 12, pp. 1670-1676, 2008.

[16] Lee C., Wang Y., and Chang C., “A Steganographic Method With High Embedding Capacity By Improving Exploiting Modification Direction,” in Proceedings of 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, pp. 497-500, 2007.

[17] Lerch A., Zplane Development, EAQUAL- Evaluate Audio QUALity, version:0.1.3 alpha, 2002.

[18] Liu Q., Sung A., and Qiao M., “Novel Stream 0LQLQJ IRU $XGLR 6WHJDQDO\VLV´in Proceedings of 17th ACM International Conference on Multimedia, Beijing, pp. 95-104, 2009.

[19] Liu Y., Chiang K., Corbett C., Archibald R., Mukherjee B., and Ghosal D., “A Novel Audio Steganalysis based on Higher-Order Statistics of a Distortion Measure with Hausdorff Distance,” in Proceedings of International Conference on Information Security, Berlin, pp. 487-501, 2008.

[20] Mansour M. and Tewfik A., “Data Embedding in Audio Using Time-Scale Modification,” IEEE Transactions on Speech and Audio Processing, vol. 13, no. 3, pp. 432-440, 2005.

[21] Mielikainen J., “LSB Matching Revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285- 287, 2006.

[22] Ozer H., Avcibas I., Sankur B., and Memon N., “Steganalysis of Audio Based on Audio Quality Metrics,” in Proceedings of Security and Watermarking of Multimedia Contents V, Santa Clara, pp. 55-66, 2003.

[23] Quackenbush S., Barnwell T., and Clements M., Objective Measures of Speech Quality, Prentice Hall,1988.

[24] Shuzheng X., Peng Z., Pengjun W., and Huazhong Y., “Performance Analysis of Data Hiding in MPEG-4 AAC Audio,” Tsinghua Science and Technology, vol. 14, no. 1, pp. 55- 61, 2009.

[25] Swanson M., Zhu B., and Tewfik A., “Current State of the Art, Challenges and Future An Efficient Steganographic Approach to HideInformation in Digital Audio ... 711 Directions for Audio Watermarking,” in Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, pp. 19-24, 1999.

[26] Thiede T., Treurniet W., Bitto R., Schmidmer C., Sporer T., Beerends J., Colomes C., Keyhl M., Stoll G., Brandenburg K., and Feiten B., “PEAQ- The ITU Standard for Objective Measurement of Perceived Audio Quality,” Journal of the Audio Engineering Society, vol. 48, no. 1-2, pp. 3-29, 2000.

[27] Unoki M., Imabeppu K., Hamada D., Haniu A., and Miyauchi R., “Embedding Limitations With Digital-Audio Watermarking Method Based on Cochlear Delay Characteristics,” Journal of Information Hiding Multimedia Signal Processing, vol. 2, no. 1, pp. 1-23, 2011.

[28] Wang S. and Unoki M., “Speech Watermarking Method Based on Formant Tuning,” IEICE Transactions on Information and Systems, vol. E98-D, pp. 29-37, 2015.

[29] Westfeld A. and Pfitzmann A., “Attacks on Steganographic Systems, in Information Hiding,” in Proceedings of International Workshop on Information Hiding, Berlin, pp. 61-66, 1999.

[30] Westfeld A., “A Steganographic Algorithm,” in Proceedings of 4th International Workshop Information Hiding, Lecture Notes in Computer Science, Berlin, pp. 289-302, 2001.

[31] Xiang S., Kim H., and Huang J., “Audio Watermarking Robust Against Time-Scale Modification and MP3 Compression,” Signal Processing, vol. 88, no. 10, pp. 2372-2387, 2008.

[32] Zhang X. and Wang S., “Dynamically Running Coding in Digital Steganography,” IEEE Signal Processing Letters, vol. 13, no. 3, pp. 165-168, 2006.

[33] Zhang X. and Wang S., “Efficient Steganographic Embedding By Exploiting Modification Direction,” IEEE Communications Letters, vol. 10, no. 10, pp. 781-783, 2006. Krishna Bhowal is a research scholar in University of Kalyani, India. He is presently working as an Assistant Professor at Academy of Technology, Kolkata, India. His area of interest includes Audio Steganography, Watermarking, and Cryptography. He has published 9 research articles in various journals and conferences. Debasree Chanda obtained her Ph.D in Engineering from Jadavpur University in the year 2005. She is presently working as Associate Professor Rank at the Dept. of Engineering and Technological Studies, University of Kalyani. Her area of research includes Microstrip Antenna, microstrip Filter, Frequency Selective Surfaces. Susanta Biswas obtained his Ph.D in engineering from Jadavpur University in the year 2004. He is presently working as Associate Professor Rank at the Dept. of Engineering & Technological Studies, University of Kalyani. His area of interest includes, Artificial Neural Network, Image Processing, Frequency Selective Surfaces, Microstrip Antennas. Partha Sarkar obtained his Ph.D in Engineering from Jadavpur University in the year 2002. He is presently working in the rank Professor at the Dept. of Engineering and Technological Studies, University of Kalyani. His area of research includes Microstrip Antenna, microstrip Filter, Frequency Selective Surfaces and Artificial Neural Network. He has contributed to numerous (more than 270 publications) research articles in various journals and conferences of repute.