Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0054

Audio Data Hiding Based on Sample Value Modification Using Modulus Function  

Al-Hooti, Mohammed Hatem Ali (Dept. of Computer Science, Sana'a University)
Djanali, Supeno (Dept. of Informatics, Institut Teknologi Sepuluh Nopember)
Ahmad, Tohari (Dept. of Informatics, Institut Teknologi Sepuluh Nopember)
Publication Information
Journal of Information Processing Systems / v.12, no.3, 2016 , pp. 525-537 More about this Journal
Abstract
Data hiding is a wide field that is helpful to secure network communications. It is common that many data hiding researchers consider improving and increasing many aspects such as capacity, stego file quality, or robustness. In this paper, we use an audio file as a cover and propose a reversible steganographic method that is modifying the sample values using modulus function in order to make the reminder of that particular value to be same as the secret bit that is needed to be embedded. In addition, we use a location map that locates these modified sample values. This is because in reversible data hiding it needs to exactly recover both the secret message and the original audio file from that stego file. The experimental results show that, this method (measured by correlation algorithm) is able to retrieve exactly the same secret message and audio file. Moreover, it has made a significant improvement in terms of the following: the capacity since each sample value is carrying a secret bit. The quality measured by peak signal-to-noise ratio (PSNR), signal-to-noise ratio (SNR), Pearson correlation coefficient (PCC), and Similarity Index Modulation (SIM). All of them have proven that the quality of the stego audio is relatively high.
Keywords
Audio; Data Hiding; Modulus Function; Information Security; Network Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 B. Saha and S. Sharma, "Steganographic techniques of data hiding using digital images," Defence Science Journal, vol. 62, no. 1, pp. 11-18, 2012.   DOI
2 F. Djebbar, B. Ayad, K. A. Meraim, and H. Hamam, "Comparative study of digital audio steganography techniques," EURASIP Journal on Audio, Speech, and Music Processing, vol. 2012, pp. 1-16, 2012.   DOI
3 V. Nagaraj, V. Vijayalakshmi, and G. Zayaraz, "Color image steganography based on pixel value modification method using modulus Function," IERI Procedia, vol. 4, pp. 17-24, 2013.   DOI
4 C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, "A high quality steganographic method with pixel-value differencing and modulus function," Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, 2008.   DOI
5 N. Maleki, M. Jalali, and M. V. Jahan, "Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function," Egyptian Informatics Journal, vol. 15, no. 2, pp. 115-127, 2014.   DOI
6 K. H. Jung and K. Y. Yoo, "Improved exploiting modification direction method by modulus operation," International Journal of Signal Processing, Image Processing and Pattern, vol. 2, no. 1, pp. 79-87, 2009.
7 S. Y. Shen and L. H. Huang, "A data hiding scheme using pixel value differencing and improving exploiting modification directions," Computers & Security, vol. 48, pp. 131-141, 2015.   DOI
8 W. Zhao, Z. Jie, L. Xin, and W. Qiaoyan, "Data embedding based on pixel value differencing and modulus function using indeterminate equation," Journal of China Universities of Posts and Telecommunications, vol. 22, no. 1, pp. 95-100, 2015.   DOI
9 K. C. Choi, C. M. Pun, and C. P. Chen, "Application of a generalized difference expansion based reversible audio data hiding algorithm," Multimedia Tools and Applications, vol. 74, no. 6, pp. 1961-1982, 2015.   DOI
10 Animal.wav files [Online]. Available: http://www.externalharddrive.com/waves/animal/index.html.
11 G. Kasana, K. Singh, and S. S. Bhatia, "Data hiding algorithm for images using discrete wavelet transform and Arnold transform," Journal of Information Processing Systems, 2015. http://dx.doi.org/10.3745/JIPS.03.0042.
12 L. Sheugh and S. H. Alizadeh, "A note on pearson correlation coefficient as a metric of similarity in recommender system," in Proceedings of 5th Conference on Artificial Intelligence and Robotics (AI & Robotics), Qazvin, Iran, 2015, pp. 1-6.
13 T. S. Nguyen and C. C. Chang, "A reversible data hiding scheme based on the Sudoku technique," Displays, vol. 39, pp. 109-116, 2015.   DOI
14 M. Holil and T. Ahmad, "Secret data hiding by optimizing general smoothness difference expansion-based method," Journal of Theoretical and Applied Information Technology, vol. 72, no. 2, pp. 155-163, 2015.
15 Y. Feng, J. Li, F. Han, and T. Ahmad, "A novel image encryption method based on invertible 3D maps and its security analysis," in Proceedings of 37th Annual Conference on IEEE Industrial Electronics Society (IECON), Melbourne, Australia, 2011, pp. 2186-2191.
16 T. Ahmad, J. Hu, and S. Han, "An efficient mobile voting system security scheme based on elliptic curve cryptography," in Proceedings of 3rd International Conference on Network and System Security (NSS), Gold Coast, Australia, 2009, pp. 474-479.
17 W. C. Kuo, C. C. Wang, and Y. C. Huang, "Binary power data hiding scheme," AEU-International Journal of Electronics and Communications, vol. 69, no. 11, pp. 1574-1581, 2015.   DOI
18 M. H. A. Al-Huti, T. Ahmad, and S. Djanali, "Increasing the capacity of the secret data using DE pixels blocks and adjusted RDE-based on grayscale images," in Proceedings of 2015 International Conference on Information & Communication Technology and System (ICTS), Surabaya, Indonesia, 2015, pp. 225-230.
19 A. M. Bagade and S. N. Talbar, "A high quality steganographic method using morphing," Journal of Information Processing Systems, vol. 10, no. 2, pp. 256-270, 2014.   DOI
20 R. M. Rad, K. Wong, and J. M. Guo, "A unified data embedding and scrambling method," IEEE Transactions on Image Processing, vol. 23, no. 4, pp. 1463-1475, 2014.   DOI
21 V. K. Yadav and S. Batham, "A novel approach of bulk data hiding using text steganography," Procedia Computer Science, vol. 57, pp. 1401-1410, 2015.   DOI
22 D. Yan, R. Wang, X. Yu, and J. Zhu, "Steganography for MP3 audio by exploiting the rule of window switching," Computers & Security, vol. 31, no. 5, pp. 704-716, 2012.   DOI
23 S. Hemalatha, U. D. Acharya, and A. Renuka, "Wavelet transform based steganography technique to hide audio signals in image," Procedia Computer Science, vol. 47, pp. 272-281, 2015.   DOI