We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Optimally Locating for Hiding Information in Audio Signal

by Premalatha P, Amritha P P
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 14
Year of Publication: 2013
Authors: Premalatha P, Amritha P P
10.5120/10995-6164

Premalatha P, Amritha P P . Optimally Locating for Hiding Information in Audio Signal. International Journal of Computer Applications. 65, 14 ( March 2013), 37-42. DOI=10.5120/10995-6164

@article{ 10.5120/10995-6164,
author = { Premalatha P, Amritha P P },
title = { Optimally Locating for Hiding Information in Audio Signal },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 14 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number14/10995-6164/ },
doi = { 10.5120/10995-6164 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:18:51.175943+05:30
%A Premalatha P
%A Amritha P P
%T Optimally Locating for Hiding Information in Audio Signal
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 14
%P 37-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography provides security and privacy of information on open environment systems. Audio steganography plays a vital role in hiding information by exploiting the human ear perceptibility. In this paper, the harmonic component that are imperceptible to the human auditory system are manipulated using Fast Fourier Transform to hide data within the samples. The decoder samples the modified song and extracts the hidden message with the key, using an error correcting code to fix any bits altered by the channel.

References
  1. Anderson R. J. (ed. ), Information Hiding: First International Workshop Proceedings, Lecture Notes in Computer Science, Vol. 1174, Springer-Verlag, 1996.
  2. Cox, et al, "Digital watermarking and Steganography", USA: Massachusetts, 2008.
  3. Bret Dunbar, "A detailed look at Steganographic Techniques and their use in an Open-Systems Environment", Information Security Reading Room, SANS Institute 2002.
  4. Walter Bender, Daniel Gruhl, Norishige Morimoto, Anthony Lu, "Techniques for Data Hiding", IBM Systems Journal, vol. 35, no. 3 and 4, pp. 313-336, 1996.
  5. F. Djebbar, B. Ayad, K. Abed-Meraim and H. Hamam, 2012. Comparative study on digital audio steganographic techniques.
  6. F. Djebbar, B. Ayad , K. Abed-Meraim and H. Hamam , "A view on latest audio steganography", 7th IEEE International Conference on Innovations in Information Technology, Abu Dhabi, UAE, 2011.
  7. N. Cvejic, T. Seppanen, "A wavelet domain LSB insertion algorithm for high capacity audio steganography", Proc. 10th IEEE Digital Signal Processing Workshop and 2nd Signal Processing Education Workshop, pp. 5355, 1316 October 2002.
  8. K. Gopalan, et al, "Covert Speech Communication Via Cover Speech By Tone Insertion", Proceeding of IEEE Aerospace Conference, Big sky, MT, March 2003.
  9. F. Djebbar, B. Ayad, K. Abed-Meraim and H. Habib, "Unified phase and magnitude speech spectra data hidingalgorithm", Journal of Security and Communication Networks, John Wiley and Sons, Ltd, April, 2012.
  10. D. Guerchi, H. Harmain, T. Rabie, and E. Mohamed, "Speech secrecy: An FFT-based approach", International Journal of Mathematics and Computer Science, vol. 3, no. 2, pp. 1-19, 2008.
  11. Steven W. Smith ,"Digital Signal Processing: A Practical Guide for Engineers and Scientist", USA: Massachusetts, 2003.
  12. Mondal, Uttam Kr. , Mandal, J. K. , "Audio signal authentication through secret embedded self-harmonic component", International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 1, No 3/4, August 2012.
  13. Pal S. K. , Saxena P. K. and Muttoo S. K. , Smart Steganographic Applications, Proceedings of the Pacific Rim Workshop on Digital Steganography, STEG'02, Japan, July 2002, pp. 11-19.
Index Terms

Computer Science
Information Sciences

Keywords

Human Auditory System Audio Steganography Fast Fourier Transform Harmonics