Research Article

Optimally Locating for Hiding Information in Audio Signal

by  Premalatha P, Amritha P P
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Issue 14
Published: March 2013
Authors: Premalatha P, Amritha P P
10.5120/10995-6164
PDF

Premalatha P, Amritha P P . Optimally Locating for Hiding Information in Audio Signal. International Journal of Computer Applications. 65, 14 (March 2013), 37-42. DOI=10.5120/10995-6164

                        @article{ 10.5120/10995-6164,
                        author  = { Premalatha P,Amritha P P },
                        title   = { Optimally Locating for Hiding Information in Audio Signal },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 65 },
                        number  = { 14 },
                        pages   = { 37-42 },
                        doi     = { 10.5120/10995-6164 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Premalatha P
                        %A Amritha P P
                        %T Optimally Locating for Hiding Information in Audio Signal%T 
                        %J International Journal of Computer Applications
                        %V 65
                        %N 14
                        %P 37-42
                        %R 10.5120/10995-6164
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography provides security and privacy of information on open environment systems. Audio steganography plays a vital role in hiding information by exploiting the human ear perceptibility. In this paper, the harmonic component that are imperceptible to the human auditory system are manipulated using Fast Fourier Transform to hide data within the samples. The decoder samples the modified song and extracts the hidden message with the key, using an error correcting code to fix any bits altered by the channel.

References
  • Anderson R. J. (ed. ), Information Hiding: First International Workshop Proceedings, Lecture Notes in Computer Science, Vol. 1174, Springer-Verlag, 1996.
  • Cox, et al, "Digital watermarking and Steganography", USA: Massachusetts, 2008.
  • Bret Dunbar, "A detailed look at Steganographic Techniques and their use in an Open-Systems Environment", Information Security Reading Room, SANS Institute 2002.
  • Walter Bender, Daniel Gruhl, Norishige Morimoto, Anthony Lu, "Techniques for Data Hiding", IBM Systems Journal, vol. 35, no. 3 and 4, pp. 313-336, 1996.
  • F. Djebbar, B. Ayad, K. Abed-Meraim and H. Hamam, 2012. Comparative study on digital audio steganographic techniques.
  • F. Djebbar, B. Ayad , K. Abed-Meraim and H. Hamam , "A view on latest audio steganography", 7th IEEE International Conference on Innovations in Information Technology, Abu Dhabi, UAE, 2011.
  • N. Cvejic, T. Seppanen, "A wavelet domain LSB insertion algorithm for high capacity audio steganography", Proc. 10th IEEE Digital Signal Processing Workshop and 2nd Signal Processing Education Workshop, pp. 5355, 1316 October 2002.
  • K. Gopalan, et al, "Covert Speech Communication Via Cover Speech By Tone Insertion", Proceeding of IEEE Aerospace Conference, Big sky, MT, March 2003.
  • F. Djebbar, B. Ayad, K. Abed-Meraim and H. Habib, "Unified phase and magnitude speech spectra data hidingalgorithm", Journal of Security and Communication Networks, John Wiley and Sons, Ltd, April, 2012.
  • D. Guerchi, H. Harmain, T. Rabie, and E. Mohamed, "Speech secrecy: An FFT-based approach", International Journal of Mathematics and Computer Science, vol. 3, no. 2, pp. 1-19, 2008.
  • Steven W. Smith ,"Digital Signal Processing: A Practical Guide for Engineers and Scientist", USA: Massachusetts, 2003.
  • Mondal, Uttam Kr. , Mandal, J. K. , "Audio signal authentication through secret embedded self-harmonic component", International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 1, No 3/4, August 2012.
  • Pal S. K. , Saxena P. K. and Muttoo S. K. , Smart Steganographic Applications, Proceedings of the Pacific Rim Workshop on Digital Steganography, STEG'02, Japan, July 2002, pp. 11-19.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Human Auditory System Audio Steganography Fast Fourier Transform Harmonics

Powered by PhDFocusTM