Hiding Capacity and Audio Steganography Model Based on LSB in Temporal Domain

被引:1
作者
Gera A. [1 ,2 ]
Vyas V. [2 ]
机构
[1] Computer Science and Engineering, G.L Bajaj Institute of Technology & Management, Greater Noida
[2] Computer Science and Engineering, Banasthali University, Jaipur
关键词
coding and decoding; Human Auditory System (HAS); interent; Least Significant Bit (LSB); SNR; Steganography;
D O I
10.2174/1872212115666210709170455
中图分类号
学科分类号
摘要
Background: Researchers for data hiding using the various encrypting techniques to improve the security of transmission of confidential information through an unsecured channel have been carried out. Methods: In this paper, a new higher recognition Least Significant Bit (LSB) audio data concealment is suggested in this framework. This technique is used to embed the hidden audio into cover audio of the same size. Results: The altered speech file appears as the original carrier file after embedding the secret mes-sage. This model strengthens hiding capability and audio quality. Conclusion: The strategy outperforms similar studies by enhancing hiding capability up to 30% and preserving stego audio transparency with the SNR value at 72.2 and SDG at 4.8. © 2022 Bentham Science Publishers.
引用
收藏
相关论文
共 26 条
  • [1] Balgurgi P.P., Jagtap S.K., Audio Steganography used for secure data transmission, Proceedings of International Conference on Advances in Computing, pp. 699-706, (2013)
  • [2] Djebbar F., Ayad B., Hamam H., Abed-Meraim K., A view on the latest audio steganography techniques, 2011 International Conference on Innovations in Information Technology, pp. 409-414, (2011)
  • [3] Djebbar F., Ayad B., Meraim K.A., Hamam H., Comparative study of digital audio steganography techniques, EURASIP J. Audio Speech Music Process, 2012, 1, pp. 1-16, (2012)
  • [4] Jayaram Ranganatha, Information hiding using audio steganogra-phy-a survey, Int. J. Multimed. Appl, 3, 3, pp. 86-96, (2011)
  • [5] Su Z., Zhang G., Yue F., Chang L., Jiang J., Yao X., SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking, IEEE Trans. Multimed, 20, 10, pp. 2631-2644, (2018)
  • [6] Tanwar R., Singh K., Zamani M., Verma A., Kumar P., An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer, J. Comput. Netw. Commun, 2019, (2019)
  • [7] Olawale A., Adebayo A., Arome G., Embedding text in audio steganography system using advanced encryption standard, text compression and spread spectrum techniques in mp3 and mp4 file formats, Int. J. Comput. Appl, 177, 41, pp. 46-51, (2020)
  • [8] Thakur A., Enhanced steganographic method using lsb, parity and spread spectrum technique for audio signals, Thapar Institute of Engineering and Technology, (2014)
  • [9] William S., Cryptography and network security: For VTU, (2011)
  • [10] Abdullah H.A., Abdulameer A.A., Hussein I.F., Audio ste-ganography and security by using cryptography,” i-manager’s, J. Inf. Technol, 4, 4, pp. 17-24, (2015)