Secured Data Transmission Through Audio Signal (SDTAS)

被引:0
作者
Pal, Dipankar [1 ]
Ghoshal, Nabin [2 ]
机构
[1] Techno India, Dept Comp Sci & Engn, Kolkata, India
[2] Univ Kalyani, Dept Engn & Technol Studies, Kalyani, W Bengal, India
来源
2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS) | 2014年
关键词
Data security; Audio Steganography; DFT; HAS; MSE; SNR; PSNR; MOS; SHA-1;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
transmission of sensitive data by hiding any type of message in a carrier audio signal. The proposed algorithm uses Discrete Fourier Transform (DFT) to convert the carrier audio samples into frequency domain after they are decomposed into small non-overlapping frames. Message bits are fabricated in transformed frequency coefficients at pseudo-random bit positions to defeat any unauthorized extraction attempt as the bits can only be retrieved accurately by reproducing the exact sequence of bit positions at receiving end with the help of the same pseudo-random number generator. This technique hugely enhances data security. Also to guarantee the integrity and authenticity of the hidden data a message digest of the hidden message is inserted into the carrier. At receiving end both the message and message digest are extracted. The extraction algorithm regenerates a new message digest of the extracted message and compares it with the one received. Experimentation has been done using various types of carrier audio signal and message data where test results show impressive performance of the proposed algorithm in terms of both subjective and objective metrics.
引用
收藏
页码:979 / 983
页数:5
相关论文
共 20 条
  • [1] Acevedo A, 2003, DIGITAL WATERMARKING
  • [2] Al-Haj A, 2011, INT ARAB J INF TECHN, V8, P326
  • [3] Arnold M, 2000, 2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, P1013, DOI 10.1109/ICME.2000.871531
  • [4] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [5] Audio quality assessment techniques-A review, and recent developments
    Campbell, Dermot
    Jones, Edward
    Glavin, Martin
    [J]. SIGNAL PROCESSING, 2009, 89 (08) : 1489 - 1500
  • [6] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [7] Cvejic N., 2004, Algorithms for Audio Watermarking and Steganography
  • [8] Dhar Pranab Kumar, 2010, International Journal of Computer Science & Information Technology, V2, P91, DOI 10.5121/ijcsit.2010.2507
  • [9] Comparative study of digital audio steganography techniques
    Djebbar, Fatiha
    Ayad, Beghdad
    Meraim, Karim Abed
    Hamam, Habib
    [J]. EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING, 2012,
  • [10] Ghoshal N., 2011, Proceedings of the Second International Conference on Emerging Applications of Information Technology (EAIT 2011), P284, DOI 10.1109/EAIT.2011.23