CFP last date
20 January 2025
Reseach Article

A Robust Audio Steganographic Scheme in Time Domain (RASSTD)

by Dipankar Pal, Nabin Ghoshal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 15
Year of Publication: 2013
Authors: Dipankar Pal, Nabin Ghoshal
10.5120/13934-1803

Dipankar Pal, Nabin Ghoshal . A Robust Audio Steganographic Scheme in Time Domain (RASSTD). International Journal of Computer Applications. 80, 15 ( October 2013), 1-8. DOI=10.5120/13934-1803

@article{ 10.5120/13934-1803,
author = { Dipankar Pal, Nabin Ghoshal },
title = { A Robust Audio Steganographic Scheme in Time Domain (RASSTD) },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 15 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number15/13934-1803/ },
doi = { 10.5120/13934-1803 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:54.195739+05:30
%A Dipankar Pal
%A Nabin Ghoshal
%T A Robust Audio Steganographic Scheme in Time Domain (RASSTD)
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 15
%P 1-8
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital Steganograpic techniques hide secret messages in a cover media (mostly image, audio or video) in an imperceptible manner which cannot be detected by unintended recipient. In addition to imperceptibility, security, capacity and robustness are the other major challenges for an effective steganographic technique. This article proposes a novel steganographic method, considering maximum secrecy, high capacity and robustness against certain attacks. The method utilizes uncompressed digital audio signals as the carrier and hides different types of digital payloads (image/text/audio) in the time domain. In the process of embedding multiple payload bits (either 2 bits or 3 bits) are embedded in each of the sample values at pseudo-random positions. The pseudo-random positions are generated using a logical expression which is devised as a function of both the cover and the payload involved to make the algorithm inherently robust against potential collusion attacks. Various objective and subjective metrics have been used to measure the performance of the proposed technique. Also test results have been presented to analyse its robustness against white noise and collusion attack.

References
  1. Bret Dunbar, SANS Institute, Info. Sec. Reading Room, "A Detailed look at Steganographic Techniques and their use in an Open-Systems Environment".
  2. Cvejic, Nedeljko, "Algorithms for audio watermarking and Steganography", Information Processing Laboratory, University of Oulu, Finland, (2004).
  3. Kekre, H. B. , Archana, A. A. , "Information hiding using LSB technique with increased capacity", International Journal of Cryptography and Security 1(2), October 2008.
  4. Nedeljko Cvejic, Tapio Seppben, "Increasing the capacity of LSB-based audio steganography", FIN-90014, University of Oulu, Finland ,(2002).
  5. M. Pooyan, A. Delforouzi, "LSB-based Audio Steganography Method Based on Lifting Wavelet Trans-form", 7th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT'07), Egypt, December 2007.
  6. Yiqing Lin, Waleed H. Abdulla, "A Secure and Robust Audio Watermarking Scheme using Multiple Scrambling and Adaptive Synchronization", International Conference on Information, Communications & Signal Processing, DOI: 10. 1109/ICICS. 2007. 4449673, (2007).
  7. Foo S. W. , Ho S. M. , Ng L. M. , "Audio watermarking using timefrequency compression expansion", IEEE Inter-national Symposium on Circuits and Systems, 201-204, (2004).
  8. Dipankar Pal, Anirban Goswami, Nabin Ghoshal, "Lossless Audio Steganography in Spatial Domain", Int. Conf. on Frontiers of Intelligent Computing:Theory and Applications, AISC 199, pp. 575-582. DOI: 10. 1007/978-3-642-35314-7 65, Springer, (2012).
  9. Sunita V. Dhavale, R. S. Deodhar, L. M. Patnaik, "High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain", Advances in Computer Science, Engineering & Applications, Volume 167, 2012, pp 843-852 , ICCSEA - 2012 (Springer).
  10. F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, "Information hiding - A Survey", Proceedings of the IEEE 87, 1062-1078, (1999).
  11. Xuping Huang, Ryota Kawashima,Norihisa Segawa, Yoshihiko Abe, "The Real-Time Steganography Based on Audioto- Audio Data Bit Stream",Technical Report of IEICE, ISEC, vol. 106 pp. 15-22, September 2006.
  12. Samir Kumar Bandyopadhyay, Barnali Gupta Banik, "LSB Modification and Phase Encoding Technique of Audio Steganography Revisited", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 4, ISSN : 2278 - 1021, June 2012.
  13. B. Santhi, G. Radhika, S. Ruthra Reka, "Information Security using Audio Steganography - A Survey", Research Journal of Applied Sciences, Engineering and Technology 4(14): 2255- 2258, 2012, ISSN: 2040-7467, Maxwell Scientific Organization, (2012).
  14. Samir Kumar Bandyopadhyay, Biswajita Datta, "Higher LSB Layer Based Audio Steganography Technique", International Journal of Electronics & Communication Technology, Vol. 2, Issue 4, ISSN: 2230-7109 (Online)—ISSN: 2230-9543 (Print), Oct. - Dec. 2011.
  15. Dr. H. B. Kekre, A. Archana, Swarnalata Rao,Uttara Athawale, "Information Hiding in Audio Signals", International Journal of Computer Applications (0975 8887), Volume 7 - No. 9, October 2010.
  16. Masahiro Wakiyama, Yasunobu Hidaka, Koichi Nozaki, "An audio steganography by a low-bit coding method with wave files", Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 978-0-7695-4222- 5/10, DOI 10. 1109 = IIHMSP. 2010. 135, IEEE, (2010).
  17. Nedeljko Cvejic, Tapio Seppnen, "Reduced distortion bitmodification for LSB audio steganography", ICSP proceedings, IEEE, (2004).
  18. S. S. Divya, M. Ram Mohan Reddy, "Hiding Text in audio using Multiple LSB Steganography and provide security using Cryptography", International Journal of Scientific & Technology Research, Volume 1, ISSUE 6, ISSN 2277-8616, JULY 2012.
  19. Dermot Campbell, Edward Jones, Martin Glavin, "Audio quality assessment techniques - A review and recent developments", Journal of Signal Processing, Elsevier, 0165-1684 = - 2009 Elsevier B. V. doi:10. 1016 =j. sigpro. 2009. 02. 015.
  20. Nedeljko Cvejic, Tapio Seppnen, "Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks", InformatIon Science Reference, Hershey, New York, ISBN 978-1-59904-515-3 (ebook), 2008, pages - 79, 239.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography HAS MSE SNR PSNR MOS SHA-1 White Noise Attack Collusion Attack