CFP last date
20 December 2024
Reseach Article

Audio Steganography to Protect the Confidential Information: A Survey

by Elham Zinaly, Avaz Naghipour
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 169 - Number 1
Year of Publication: 2017
Authors: Elham Zinaly, Avaz Naghipour
10.5120/ijca2017914561

Elham Zinaly, Avaz Naghipour . Audio Steganography to Protect the Confidential Information: A Survey. International Journal of Computer Applications. 169, 1 ( Jul 2017), 22-29. DOI=10.5120/ijca2017914561

@article{ 10.5120/ijca2017914561,
author = { Elham Zinaly, Avaz Naghipour },
title = { Audio Steganography to Protect the Confidential Information: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 169 },
number = { 1 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 22-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume169/number1/27950-2017914561/ },
doi = { 10.5120/ijca2017914561 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:16:12.017513+05:30
%A Elham Zinaly
%A Avaz Naghipour
%T Audio Steganography to Protect the Confidential Information: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 169
%N 1
%P 22-29
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is a science to hide information, it hides a message to another object, and it increases the security of data transmission and archiving it. In the process of steganography, the hidden object in which data is hidden the carrier object and the new object, is called the steganography object. The multiple carriers, such as text, audio, video, image and so can be mentioned for steganography; however, audio has been significantly considered due to the multiplicity of uses in various fields such as the internet. For steganography process, several methods have been developed; including work in the temporary and transformation, each of has its own advantages and disadvantages, and special function. In this paper we mainly review and evaluate different types of audio steganography techniques, advantages and disadvantages.

References
  1. M. S. Subhedar, V. H. Mankar, Current status and key issues in image steganography: A survey, Computer Science Review, 13-14 (2014) 95-113.
  2. B. Chandel, S. Jain, Video Steganography: A Survey, IOSR JCE. 1 (2016) 11-17.
  3. N.F. Johnson, S. Jajodia, Exploring steganography: Seeing the unseen, Computer, 31 (1998) 26-34.
  4. R.B. Wolfgang, E.J. Delp III, Fragile watermarking using the VW2D watermark, In electronic imaging, International Society for Optics and Photonics, 1999, April, pp.204-213.
  5. M.D. Swanson, M. Kobayashi, A.H. Tewfik, Multimedia data-embedding and watermarking technologies, Proc. IEEE. 86 (1998) 1064-1087.
  6. D.C. Kar, C.J. Mulkey, A multi-threshold based audio steganography scheme, JISA.23 (2015) 54-67.
  7. M.B. Begum, Y. Venkataramani, LSB based audio steganography based on text compression, Procedia Eng. 30 (2012) 703-710.
  8. S. Banerjee, S. Roy, M.S. Chakraborty, S. Das, A variable higher bit approach to audio steganography, International Conference on Recent Trends in nformation Technology (ICRTIT), 2013, July, pp. 46-49.
  9. K. Bhowal, A.J. Pal, G.S. Tomar, P.P. Sarkar, Audio steganography using GA, International Conference on Computational Intelligence and Communication Networks, 2010, November, pp. 449-453, IEEE.
  10. P. Jayaram, H.R. Ranganatha, H.S. Anupama, Information hiding using audio steganography–a survey, IJMA. 3 (2011) 86-96.
  11. M. Asad, J. Gilani, A. Khalid, An enhanced least significant bit modification technique for audio steganography, International Conference on Computer Networks and Information Technology (ICCNIT), 2011, July, pp. 143-147,IEEE.
  12. N. Cvejic, Algorithms for audio watermarking and steganography, Department of Electrical and Information Engineering, Information Processing Laboratory, University of Oulu, 2004.
  13. G. Nehru, P. Dhar, A detailed look of audio steganography techniques using LSB and genetic algorithm approach, IJCSI. 9 (2012) 402-406.
  14. N. Cvejic, T. Seppanen, Increasing robustness of LSB audio steganography using a novel embedding method, International Conference on Coding and Computing (ITCC), 2004, April, pp. 533-537, IEEE.
  15. W. Stallings, Data and computer communications, 8th Edition, Pearson Prentice Hall, 2007.
  16. G.P. TVS, S. Varadarajan, A novel hybrid audio steganography for imperceptible data hiding, International Conference on Communication and Signal Processing (ICCSP), 2015, April, pp. 0634-0638, IEEE.
  17. A. Delforouzi, M. Pooyan, Adaptive digital audio steganography based on integer wavelet transform, Circ. Syst. Signal Pr. 27 (2008) 247-259.
  18. S. Nehete, S.D. Sawarkar, M. Sohani, Digital audio steganography using DWT with with reduced embedding error and better extraction compared to DCT, Proceedings of the International Conference & Workshop on Emerging Trends in Technology, 2011, February, pp. 167-168, ACM.
  19. H.I. Shahadi, R. Jidin, High capacity and inaudibility audio steganography scheme, 7th International Conference on Information Assurance and Security (IAS), 2011, December, pp. 104-109, IEEE.
  20. Y. Kakde, P. Gonnade, P. Dahiwale, Audio-video steganography, International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015, March, pp. 1-6, IEEE.
  21. M. Tayel, A. Gamal, H. Shawky, A proposed implementation method of an audio steganography technique, 18th International Conference on Advanced Communication Technology (ICACT), 2016, January, pp. 180-184, IEEE.
  22. V. Sharma, R. Thakur, LSB modification based audio steganography using trusted third party key indexing method, Third International Conference on Image Information Processing (ICIIP), 2015, December, pp. 403-406, IEEE.
  23. M. Tayel, A. Gamal, H. Shawky, A proposed implementation method of an audio steganography technique, 18th International Conference on Advanced Communication Technology (ICACT), 2016, January, pp. 180-184, IEEE.
  24. J. Vimal, A.M. Alex, Audio steganography using dual randomness LSB method, International Conference on Control Instrumentation Communication & Computational Technologies (ICCICCT), 2014, July, pp. 941-944, IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Audio steganography Cryptography Image steganography Information steganography LSB method Security.