We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Secure Audio Steganography for Hiding Secret information

Published on April 2012 by K. Sakthisudhan, P. Prabhu, P. Thangaraj
International Conference in Recent trends in Computational Methods, Communication and Controls
Foundation of Computer Science USA
ICON3C - Number 6
April 2012
Authors: K. Sakthisudhan, P. Prabhu, P. Thangaraj
4bc43419-6987-4bce-b9cf-1c0f1869a948

K. Sakthisudhan, P. Prabhu, P. Thangaraj . Secure Audio Steganography for Hiding Secret information. International Conference in Recent trends in Computational Methods, Communication and Controls. ICON3C, 6 (April 2012), 33-37.

@article{
author = { K. Sakthisudhan, P. Prabhu, P. Thangaraj },
title = { Secure Audio Steganography for Hiding Secret information },
journal = { International Conference in Recent trends in Computational Methods, Communication and Controls },
issue_date = { April 2012 },
volume = { ICON3C },
number = { 6 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 33-37 },
numpages = 5,
url = { /proceedings/icon3c/number6/6046-1047/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Recent trends in Computational Methods, Communication and Controls
%A K. Sakthisudhan
%A P. Prabhu
%A P. Thangaraj
%T Secure Audio Steganography for Hiding Secret information
%J International Conference in Recent trends in Computational Methods, Communication and Controls
%@ 0975-8887
%V ICON3C
%N 6
%P 33-37
%D 2012
%I International Journal of Computer Applications
Abstract

In present day to day life, effective data hiding methods are needed due to attack made on data communication. This paper presents the technique for the above requirement. In this proposed method, secret message in form of audio file is embedded within another carrier audio file (. wav) . In the transmitter end the output will be similar to the carrier with secret message embedded inside. The hacker will be blinded by the transmitted signal. At the receiver end the original message can be retrieved without any loss. The entire proposed system is simulated and their corresponding waveforms prove the effectiveness of this method.

References
  1. Gopalan. , "Audio steganography using bit modification", 2003 IEEE International conference on Acoustic, Speech and Signal Processing page(s): II – 421 -4 vol. 2. [2 ] Muhammad Asad, Junaid Gilani, Adnan Khalid "An Enhanced Least Significant Bit Modification Technique for Audio Steganography", 2011 international conference on Computer Networks and Information Technology (ICCNIT), pages 143-147
  2. Zamani, M. , Manaf, A, Ahmad, R. B. , Jaryani, F. , Taherdoost H. , Zeki, AM. ,"A secure audio steganography approach", International Conference for Internet Technology and Secured Transactions 2009, Page(s):1 - 6.
  3. Kaliappan Gopalan, "A Unified Audio and Image Steganography by Spectrum Modification", International Conference on Industrial Technology, 2009, Page(s):1 – 5
  4. Raja K B, Chowdary C R, Venugopal K R, Patnaik L M "A Secure Image Steganography using LSB DCT and Compression Techniques on Raw Images" 2005 IEEE International conference on session B-image signal processing.
  5. Hossein Malekmohamadi and Shahrokh Ghaemmaghami Reduced Complexity Enhancement Of Steganalysis Of LSB-matching Image Steganography" 2009 IEEE/ACS International conference on computer system and applications.
  6. Balagi R, Naveen G"Secure Data Transmission Using Video Steganography", 2011 IEEE International conference on electro/information technology (EIT).
  7. Andrew D. Ker, "Steganalysis of Embedding in Two Least-Significant Bits" 2007 IEEE transactions on information forensics and security, vol. 2, no. 1, march 2007.
  8. W. Mazurczyk and Jozef Lubacz, "LACK– a VoIP Steganographic Method", Journal of Telecommunication System, Springer Netherlands, Dec. , 2009.
  9. D. LIamas, C Allison and A Miller, "Covert Channels in Internet Protocols: A Survey", 2005 at http://grayworld. net/papers/0506-PGNET-Paper. pdf.
  10. D. V. Forte et al. "SecSyslog: An Approach to Secure Logging Based on Covert Channels," Proc. First Int'l Wksp. Systematic Approaches to Digital Forensic Engineering, Nov. 2005, pp. 248-263.
  11. Wilfrid J. Dixon, Frank J. Massey: Introduction to Statistical Analysis. McGrawHill Book Company, Inc. , New York 1957.
  12. Neil F. Johnson, Sushil Jajodia: Steganalysis of Images Created Using Current Steganography Software, in David Aucsmith (Ed. ): Information Hiding, LNCS 1525, Springer-Verlag Berlin Heidelberg 1998. pp. 32–47
  13. M. R. Nelson: LZW Data Compression. Dr. Dobb's Journal, October 1989.
  14. Birgit P?tzmann, Information Hiding Terminology, in Ross Anderson (Ed. ): Information Hiding. First International Workshop, LNCS 1174, Springer-Verlag Berlin Heidelberg 1996. pp. 347–350
  15. Robert Tinsley, Steganography and JPEG Compression, Final Year Project Report, University of Warwick, 1996
  16. Terry Welch: A Technique for High-Performance Data Compression. IEEE Computer, June 1984.
  17. http://lifehacker. com/5807289/how-to-hide-secret- messages-and-codes-in-audio-files
  18. Hide and Seek, http://www. rugeley. demon. co. uk/ security/hdsk50. zip
  19. S-Tools,ftp://idea. sec. dsi. unimi. it/pub/security/crypt/ code/s-tools4. zip
Index Terms

Computer Science
Information Sciences

Keywords

Dual Audio Steganography Lsb Embedding Low Complexity.