DOI QR코드

DOI QR Code

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique

  • Alarood, Alaa Abdulsalm (College of Computer Science and Engineering, University of Jeddah) ;
  • Alghamdi, Ahmed Mohammed (Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah) ;
  • Alzahrani, Ahmed Omar (College of Computer Science and Engineering, University of Jeddah) ;
  • Alzahrani, Abdulrahman (College of Computer Science and Engineering, University of Jeddah) ;
  • Alsolami, Eesa (Department of Cyber Security, College of Computer Science and Engineering, University of Jeddah)
  • Received : 2022.07.05
  • Published : 2022.07.30

Abstract

MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.

Keywords

Acknowledgement

This work was funded by the University of Jeddah, Jeddah, Saudi Arabia, under grant No. (UJ-22-DR-63). The authors, therefore, acknowledge with thanks the University of Jeddah technical and financial support.

References

  1. Fridrich, J. & Goljan, M.(2002). Practical steganalysis of digital images: State of the art. Electronic Imaging 2002, International Society for Optics and Photonics, 1-13.
  2. Kim, D.-S., Lee, G.-J. & Yoo, K.-Y.(2014). A reversible data hiding scheme based on histogram shifting using edge direction predictor. Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, ACM, 126-131.
  3. Atoum, M. S.(2015) New MP3 Steganography Data Set. IT Convergence and Security (ICITCS), 2015 5th International Conference on, 2015b. IEEE, 1-7.
  4. Quackenbush, S. (2012). MPEG Audio Compression Advances. The MPEG Representation of Digital Media. Springer.
  5. Sterne, J. (2012). Mp3: The meaning of a format, Duke University Press.
  6. Sayood, K. (2012). Introduction to data compression, Newnes.
  7. Brandenburg, K.(1999). MP3 and AAC explained. Audio Engineering Society Conference: 17th International Conference: High-Quality Audio Coding, Audio Engineering Society.
  8. Sinder, D. J., Varga, I., Krishnan, V., Rajendran, V. & Villette, S. (2015). Recent speech coding technologies and standards. Speech and Audio Processing for Coding, Enhancement and Recognition. Springer.
  9. Supurovic, P. (1998). MPEG audio frame header. Available In Internet.
  10. Nilsson, M. (2000). ID3 tag version 2.4. 0-Main Structure. http//www. id3. org/id3v2.
  11. Salih, M. M. (2015). A New Audio Steganography Method Using Bi-LSB Embedding and Secret Message Integrity Validation. Middle East University.
  12. Jhaveri, N. V., Vaughan, G. B., Anderson, I. W., Gardner, J. J., & Tao, P. T. (2019). U.S. Patent Application No. 16/357,128.
  13. Di Angelo, M., & Salzer, G. (2019, July). Mayflies, breeders, and busy bees in Ethereum: smart contracts over time. In Proceedings of the Third ACM Workshop on Blockchains, Cryptocurrencies and Contracts (pp. 1-10).
  14. Castelan, Y. & Khodja, B. (2015) MP3 Steganography Techniques. Proceedings of the 4th Annual ACM Conference on Research in Information Technology, ACM, 51-54.
  15. Zebari, D. A., Zeebaree, D. Q., Saeed, J. N., Zebari, N. A., & Adel, A. Z. (2020). Image Steganography Based on Swarm Intelligence Algorithms: A Survey. people, 7(8), 9.
  16. Fridrich, J. (2009). Steganography in digital media: principles, algorithms, and applications. Cambridge University Press.
  17. Chhikara, S. & Singh, P. (2013b.) SBHCS: Spike based Histogram Comparison Steganalysis Technique. International Journal of Computer Applications, 75.
  18. Kekre, H. B., Athawale, A., Rao, B. S. & Athawale, U. (2010). Increasing the capacity of the cover audio signal by using multiple LSBs for information hiding. Emerging Trends in Engineering and Technology (ICETET), 2010 3rd International Conference on, 2010. IEEE, 196-201.
  19. Ozighor, E. R., & Izegbu, I. (2020). INFORMATION PROTECTION AGAINST SECURITY THREATS IN AN INSECURE ENVIRONMENT USING CRYPTOGRAPHY AND STEGANOGRAPHY. GSJ, 8(5).
  20. Devaraj, S., Singh, U. & Jialal, I. (2009). The evolving role of C-reactive protein in atherothrombosis. Clinical Chemistry, 55, 229-238. https://doi.org/10.1373/clinchem.2008.108886
  21. Shirali-Shahreza, S., Manzuri-Shalmani, M. & Shirali-Shahreza, M. H. (2007). A Skew resistant method for persian text segmentation. Computational Intelligence in Image and Signal Processing, 2007. CIISP 2007. IEEE Symposium on, 2007. IEEE, 115-120.
  22. Gopalan, K. & Shi, Q. (2010). Audio Steganography Using Bit Modification-A Tradeoff on Perceptibility and Data Robustness for Large Payload Audio Embedding. ICCCN, 2010.
  23. Fan, X., Cao, J.: A Survey of Mobile Cloud Computing. ZTE Communications 9(1), 4-8 (2011)
  24. Huerta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proc. of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond (2010)
  25. Giurgiu, I., Riva, O., Juric, D., Krivulev, I., Alonso, G.: Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications. In: Bacon, J.M., Cooper, B.F. (eds.) Middleware 2009. LNCS, vol. 5896, pp. 83-102. Springer, Heidelberg (2009)