A Multi-Threshold Based Scheme for Audio Steganography

نویسندگان

  • Dulal C. Kar
  • Ahmed Mahdy
چکیده

Audio steganography deals with a method to hide a secret message in an audio file. Also, Audio steganography can be used for secret watermarking or concealing ownership or copyright information in the audio that can be verified later to justify ownership right. A direct Least Significant Bit (LSB) substitution method is one of the most simple and popular techniques used for audio steganography; however, the drawback of this technique is that it can cause hissing sound when the stego audio is played. On the other hand, Human Audio System (HAS) is highly sensitive that can detect or discriminate subtle changes in an audio. In order to improve robustness against hissing noise as well as to avoid detection by a human being, we present a threshold-based scheme for an audio steganography that can selectively embed bits in audio samples based on their magnitudes. Specifically, the scheme can be used to embed zero or many secret bits in an audio sample depending on the relative strength of the audio sample as the sample is measured against a scale of multi-level threshold value. The scheme selects threshold values by analyzing the audio file for a given secret message so that the overall error can be as small as possible while fully utilizing the capacity of the audio file.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A High Capacity Email Steganography Scheme using Dictionary

The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...

متن کامل

Performance Improvement of Threshold based Audio Steganography using Parallel Computation

Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security level. The existing techniques either focus on the payload or security, but none of them has ensured both security and payload at same time. Data Dependency in existing solu...

متن کامل

Secret sharing in audio steganography

This paper demonstrates the feasibility of combining the use of secret sharing in conjunction with audio steganography to provide a robust way to store and transmit secret data. Storage of secret information is a constant security concern in the corporate and military environment. Cryptography and steganography are two known techniques that deal with this concern. Recently, the combination of t...

متن کامل

A New Hybrid Method for Colored Image Steganography Based On DWT

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

متن کامل

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013