DOI QR코드

DOI QR Code

Audio Data Hiding Based on Sample Value Modification Using Modulus Function

  • Received : 2016.02.15
  • Accepted : 2016.06.17
  • Published : 2016.09.30

Abstract

Data hiding is a wide field that is helpful to secure network communications. It is common that many data hiding researchers consider improving and increasing many aspects such as capacity, stego file quality, or robustness. In this paper, we use an audio file as a cover and propose a reversible steganographic method that is modifying the sample values using modulus function in order to make the reminder of that particular value to be same as the secret bit that is needed to be embedded. In addition, we use a location map that locates these modified sample values. This is because in reversible data hiding it needs to exactly recover both the secret message and the original audio file from that stego file. The experimental results show that, this method (measured by correlation algorithm) is able to retrieve exactly the same secret message and audio file. Moreover, it has made a significant improvement in terms of the following: the capacity since each sample value is carrying a secret bit. The quality measured by peak signal-to-noise ratio (PSNR), signal-to-noise ratio (SNR), Pearson correlation coefficient (PCC), and Similarity Index Modulation (SIM). All of them have proven that the quality of the stego audio is relatively high.

Keywords

References

  1. Y. Feng, J. Li, F. Han, and T. Ahmad, "A novel image encryption method based on invertible 3D maps and its security analysis," in Proceedings of 37th Annual Conference on IEEE Industrial Electronics Society (IECON), Melbourne, Australia, 2011, pp. 2186-2191.
  2. T. Ahmad, J. Hu, and S. Han, "An efficient mobile voting system security scheme based on elliptic curve cryptography," in Proceedings of 3rd International Conference on Network and System Security (NSS), Gold Coast, Australia, 2009, pp. 474-479.
  3. M. Holil and T. Ahmad, "Secret data hiding by optimizing general smoothness difference expansion-based method," Journal of Theoretical and Applied Information Technology, vol. 72, no. 2, pp. 155-163, 2015.
  4. W. C. Kuo, C. C. Wang, and Y. C. Huang, "Binary power data hiding scheme," AEU-International Journal of Electronics and Communications, vol. 69, no. 11, pp. 1574-1581, 2015. https://doi.org/10.1016/j.aeue.2015.07.007
  5. M. H. A. Al-Huti, T. Ahmad, and S. Djanali, "Increasing the capacity of the secret data using DE pixels blocks and adjusted RDE-based on grayscale images," in Proceedings of 2015 International Conference on Information & Communication Technology and System (ICTS), Surabaya, Indonesia, 2015, pp. 225-230.
  6. T. S. Nguyen and C. C. Chang, "A reversible data hiding scheme based on the Sudoku technique," Displays, vol. 39, pp. 109-116, 2015. https://doi.org/10.1016/j.displa.2015.10.003
  7. A. M. Bagade and S. N. Talbar, "A high quality steganographic method using morphing," Journal of Information Processing Systems, vol. 10, no. 2, pp. 256-270, 2014. https://doi.org/10.3745/JIPS.03.0005
  8. R. M. Rad, K. Wong, and J. M. Guo, "A unified data embedding and scrambling method," IEEE Transactions on Image Processing, vol. 23, no. 4, pp. 1463-1475, 2014. https://doi.org/10.1109/TIP.2014.2302681
  9. V. K. Yadav and S. Batham, "A novel approach of bulk data hiding using text steganography," Procedia Computer Science, vol. 57, pp. 1401-1410, 2015. https://doi.org/10.1016/j.procs.2015.07.457
  10. D. Yan, R. Wang, X. Yu, and J. Zhu, "Steganography for MP3 audio by exploiting the rule of window switching," Computers & Security, vol. 31, no. 5, pp. 704-716, 2012. https://doi.org/10.1016/j.cose.2012.04.006
  11. S. Hemalatha, U. D. Acharya, and A. Renuka, "Wavelet transform based steganography technique to hide audio signals in image," Procedia Computer Science, vol. 47, pp. 272-281, 2015. https://doi.org/10.1016/j.procs.2015.03.207
  12. B. Saha and S. Sharma, "Steganographic techniques of data hiding using digital images," Defence Science Journal, vol. 62, no. 1, pp. 11-18, 2012. https://doi.org/10.14429/dsj.62.1436
  13. F. Djebbar, B. Ayad, K. A. Meraim, and H. Hamam, "Comparative study of digital audio steganography techniques," EURASIP Journal on Audio, Speech, and Music Processing, vol. 2012, pp. 1-16, 2012. https://doi.org/10.1186/1687-4722-2012-1
  14. V. Nagaraj, V. Vijayalakshmi, and G. Zayaraz, "Color image steganography based on pixel value modification method using modulus Function," IERI Procedia, vol. 4, pp. 17-24, 2013. https://doi.org/10.1016/j.ieri.2013.11.004
  15. C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, "A high quality steganographic method with pixel-value differencing and modulus function," Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, 2008. https://doi.org/10.1016/j.jss.2007.01.049
  16. N. Maleki, M. Jalali, and M. V. Jahan, "Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function," Egyptian Informatics Journal, vol. 15, no. 2, pp. 115-127, 2014. https://doi.org/10.1016/j.eij.2014.06.001
  17. K. H. Jung and K. Y. Yoo, "Improved exploiting modification direction method by modulus operation," International Journal of Signal Processing, Image Processing and Pattern, vol. 2, no. 1, pp. 79-87, 2009.
  18. S. Y. Shen and L. H. Huang, "A data hiding scheme using pixel value differencing and improving exploiting modification directions," Computers & Security, vol. 48, pp. 131-141, 2015. https://doi.org/10.1016/j.cose.2014.07.008
  19. W. Zhao, Z. Jie, L. Xin, and W. Qiaoyan, "Data embedding based on pixel value differencing and modulus function using indeterminate equation," Journal of China Universities of Posts and Telecommunications, vol. 22, no. 1, pp. 95-100, 2015. https://doi.org/10.1016/S1005-8885(15)60631-8
  20. K. C. Choi, C. M. Pun, and C. P. Chen, "Application of a generalized difference expansion based reversible audio data hiding algorithm," Multimedia Tools and Applications, vol. 74, no. 6, pp. 1961-1982, 2015. https://doi.org/10.1007/s11042-013-1732-1
  21. Animal.wav files [Online]. Available: http://www.externalharddrive.com/waves/animal/index.html.
  22. G. Kasana, K. Singh, and S. S. Bhatia, "Data hiding algorithm for images using discrete wavelet transform and Arnold transform," Journal of Information Processing Systems, 2015. http://dx.doi.org/10.3745/JIPS.03.0042.
  23. L. Sheugh and S. H. Alizadeh, "A note on pearson correlation coefficient as a metric of similarity in recommender system," in Proceedings of 5th Conference on Artificial Intelligence and Robotics (AI & Robotics), Qazvin, Iran, 2015, pp. 1-6.