Professional Documents
Culture Documents
M.Tech, MBA., Assistant Professor, Dept. of ECE, Sree Vidyanikethan Engineering College, A. Rangampet, Tirupati
#2
PG Scholar, Dept. of ECE, Sree Vidyanikethan Engineering College, A. Rangampet, Tirupathi
#3
M. Tech, (Ph.D.), Assistant Professor, Dept. of ECE, Sree Vidyanikethan Engineering College, A. Rangampet, Tirupati
Abstract
Due to the rapid growth of cyber revolution, developing a
secret communication is a major task of security that has
gained increasing importance. Steganography is an important
technique used for secure communication. Steganography is
an art of hiding secret message in another host message
without letting anyone know about presence of secret message
except the intended receiver. If an audio file is used as a cover
file to hide secret data, then it is called audio steganography.
Audio steganography requires a secret message which
embedded within a cover audio message. Audio
steganography is a challenging subject because human
auditory system (HAS) is more sensitive than human visual
system (HVS). This paper explains about different audio
steganographic techniques and their strengths and weaknesses.
KeywordsSteganography, Audio steganography, hiding in
time domain, hiding in frquency domain, hiding in coded
domain.
I. INTRODUCTION
The rapid spread in digital data usage in many real
life applications have urged new and effective ways to ensure
their security. Efficient secrecy can be achieved, at least in
part, by implementing steganograhy techniques. Novel and
versatile audio steganographic methods have been proposed.
The goal of steganographic systems is to obtain secure and
robust way to conceal high rate of secret data. We focus in this
paper on digital audio steganography, which has emerged as a
prominent source of data hiding across novel
telecommunication technologies.
The three important
methods for data secure are cryptography, watermarking, and
steganography.
Cryptography, is a technique which converts plaintext
(normal or clear text) to cipher text (encrypted text) so that
only for whom it is intended can read and process it. Similarly,
Steganography is an art of hiding secret message in another
host message without letting anyone know about presence of
secret message except the intended receiver. In watermarking
data is hidden to convey some information about the cover
medium such as ownership and copyright.Even though
cryptography and watermarking techniques are salient for
reinforcing data security, an interest in exploring better or
complementary new techniques has been the focus of much
ongoing research leads to the development of new
steganographic techniques. The workflow diagram of
steganography is explained in fig.1
In audio-steganography an audio file is used as a
carrier or host file to carry secret information or message. We
can embed this secret message in host file using a key. The
audio file after embedding secret message termed as stego file.
This can be transmitted through a network and at the receiver
the intended receiver who knows key, they only extract secret
message from stego file as shown in fig.1.
www.ijete.org
www.ijete.org
frequencies f0 and f1.If the ratio > , then the hidden bit
is 0, otherwise it is 1.
Tone insertion method can resist to attacks such as lowpass filtering and bit truncation. In addition to low embedding
capacity, embedded data could be maliciously extracted since
inserted tones are easy to detect. The authors suggest to
overcome these drawbacks by varying four or more pairs of
frequencies in a keyed order.
C. Phase Coding:
Phase coding exploits HAS insensitivity to relative phase
of different spectral components. It is based on replacing
elected phase components from the original audio signal
spectrum with hidden data. However, to ensure inaudibility,
phase components modification should be kept small. It is
worth mentioning that among data hiding techniques, phase
coding tolerates better signal distortion. Some have inserted
data in phase components using an independent multi-band
phase modulation. In this approach, imperceptible phase
modifications are achieved using controlled phase alteration of
the host audio. Quantization index modulation (QIM) method
is applied on phase components, where phasevalue of a
frequency bin is replaced by the nearest o point to hide 0 or x
point to hide 1 as shown in fig.3.
www.ijete.org
www.ijete.org
= |
= |
VI. CONCLUSION
Through this paper we have presented an extremely effective
methods of audio steganography and their evaluation. In order
to provide better protection to digital data content, new
steganography techniques have beeninvestigated in recent
researcher works. The availability and popularity of digital
audio signals have madethem an appealing choice to convey
secret information. Audio steganography techniques address
issuesrelated to the need to secure and preserve the integrity of
data hidden in voice communications inparticular. In this
work, a comparative studyof different audio steganography
techniques is explained briefly.In an attempt to reveal their
capabilities inensuring secure communications, we discussed
their strengths and weaknesses.
This study showed that the frequency domain is
preferred over the temporal domain and music signals are
better covers for data hiding in terms of capacity,
imperceptibility and undetectability. Fromour point of view,
the diversity and large number of existing audio
steganography techniques expandapplication possibilities. The
advantage on using one technique over another one depends
on theapplication constraints in use and its requirement for
hiding capacity, embedded data security level andencountered
attacks resistance.
REFERENCES
[1]. Ross J. Anderson, editor. Information hiding: 1st
international workshop, volume 1174 of Lecture Notes in
Computer Science, Isaac Newton Institute, SpringerVerlag, Berlin, Germany, May 1996.
66
www.ijete.org