A steganographic approach to hide secret data in digital audio based on XOR operands triplet property with high embedding rate and good quality audio

被引:0
作者
Bhowal, Krishna [1 ]
Sarkar, Debasree [1 ]
Biswas, Sushanta [1 ]
Sarkar, Partha Pratim [1 ]
机构
[1] Univ Kalyani, Dept Engn & Technol Studies, Kolkata, India
关键词
Embedding capacity; imperceptibility; steganography; watermarking; computational complexity; XOR operands triplet; WATERMARKING; ROBUST;
D O I
10.3906/elk-1602-267
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a unique and transparent data hiding algorithm based on XOR operands triplet (XOT) is proposed. In XOT, an XOR operation applied on any two members of a triplet provides the third member of the same triplet. Taking advantage of the low computational complexity and fascinating properties of the XOR operator, it is possible to embed 4-ary secret digits with negligible changes in the host digital audio. The proposed scheme has been designed to ensure that a minimum number of bit alterations happen in the host digital audio during the data hiding process, which also increases the security of the scheme and provides high quality embedded audio without compromising the statistical property of host audio signals. The scheme confirms that the maximum change is less than 12.5% of the digital audio samples and the average error for the individual digital audio sample is less than 6.25%. The experimental results show that the scheme has a high capacity (88 kbps) without perceptual distortion (objective difference grades are 0.1 to 0.31) and provides robustness against intentional or unintentional attack detection. Comparative analysis shows that our method has better performance than data hiding techniques reported recently in terms of imperceptibility, capacity, and security.
引用
收藏
页码:2136 / 2148
页数:13
相关论文
共 22 条
  • [1] [Anonymous], 1988, Objective measures of speech quality
  • [2] Audio steganalysis with content-independent distortion measures
    Avcibas, I
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (02) : 92 - 95
  • [3] Controlling the inaudibility and maximizing the robustness in an audio annotation watermarking system
    Baras, Cleo
    Moreau, Nicolas
    Dymarski, Przemyslaw
    [J]. IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2006, 14 (05): : 1772 - 1782
  • [4] Robust audio watermarking in the time domain
    Bassia, P
    Pitas, I
    Nikolaidis, N
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2001, 3 (02) : 232 - 241
  • [5] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [6] A GA based audio steganography with enhanced security
    Bhowal, Krishna
    Bhattacharyya, Debnath
    Pal, Anindya Jyoti
    Kim, Tai-Hoon
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (04) : 2197 - 2204
  • [7] Cox IJ, 2008, MKS MULTIMED INFORM, P425, DOI 10.1016/B978-012372585-1.50015-2
  • [8] Audio Watermarking Based on Fibonacci Numbers
    Fallahpour, Mehdi
    Megias, David
    [J]. IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2015, 23 (08) : 1273 - 1282
  • [9] Kekre HB., 2010, INT J COMPUTER APPL, V7, P14
  • [10] Audio Watermarking Via EMD
    Khaldi, Kais
    Boudraa, Abdel-Ouahab
    [J]. IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2013, 21 (03): : 675 - 680