Browse > Article
http://dx.doi.org/10.5762/KAIS.2011.12.12.5878

Secure Steganographic Model for Audio e-Book Streaming Service  

Lee, Yun-Jung (Dept. of Computer Science and Statistics, Jeju National University)
Lee, Bong-Kyu (Dept. of Computer Science and Statistics, Jeju National University)
Kim, Chul-Soo (Dept. of Computer Science and Statistics, Jeju National University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.12, no.12, 2011 , pp. 5878-5884 More about this Journal
Abstract
We present steganographic service model and algorism that fit feature of streaming audio book service in order to hide information of copyright and certificate of it. Secret information is encrypted with random numger by secret key that client and server share, so that increase confidentiality. We made secret data distributed randomly and evenly, and improved throughput by simplifying additional computations considering streaming environment.
Keywords
Audio-book; Steganography; Data hiding;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Provos, Probabilistic method for Improving Information Hiding. CITI Technical Report01-1, 2001.
2 P. Bao and X. Ma, "MP3-Resistant Music Steganography based on Dynamic Range Transform,'' IEEE Int. Sym. Intelligent Signal Processing and Communication Systems, pp. 266-271, Nov. 18-19, 2004, Seoul, Korea.
3 R. A. Santosa, P. Bao, "Audio-to-image wavelet transform based audio steganography," IEEE Int. Symp. , pp. 209-212, June 2005, Zadar, Croatia.
4 H. Matsuka, "Spread Spectrum Audio Steganography using Sub-band Phase Shifting," IEEE Int. conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP' 06), pp. 3-6, Dec. 2006, Pasadena, CA, USA.
5 K. Gopalan, "Audio steganography by cepstrum modification," In Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Vol. 5, pp. 481-484, March 2005.
6 F.A.P. Peticolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding-A Survey," IEEE Trans.Proc. Thy, Vol. 87, No.7, pp. 1062-1078, July 1999.
7 N. Cvejic, T. Seppanen, "Increasing robustness of LSB audio steganography using a novel embedding method," In Proc. IEEE Int. Conf. Info. Tech:Coding and Computing, Vol.2, pp.533-537, April 2004.
8 N. Cvejic, T. Seppanen, "Increasing the capacity of LSBbased audio steganography.'' IEEE Workshop on Multimedia Signal Processing, pp. 336-338, 2002.
9 S.S. Agaian, D. Akopian, O. Caglayan, S. A. D'Souza, "Lossless Adaptive Digital Audio Steganography," In Proc. IEEE Int. Conf. Signals, Systems and Computers, pp. 903-906, November 2005.
10 A. Delforouzi, M. Pooyan, "Adaptive Digital Audio Steganography Based on Integer Wavelet Transform", Special Issue on Digital Watermarking and Multimedia Security of "Circuits, Systems and Signal Processing (CSSP).", Feb. 2008.   DOI
11 M. Pooyan, A. Delforouzi, "LSB-based Audio Steganography Method Based on Lifting Wavelet Transform", in Proc. 7th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT'07), December 2007, Egypt.
12 N. Cvejic, T. Seppanen, "A wavelet domain LSB insertion algorithm for high capacity audio steganography," In Proc. IEEE Digital Signal Processing Workshop, Callaway Gardens, GA, p. 53-55, October 2002.
13 K. Gopalan, "Audio steganography using bit modification," Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Vol. 2, pp. 421-424, April 2003.
14 C. Kratzer, J. Dittmann, T. Vogel, and R. Hillert, "Design and evaluation of steganography for voice-over-ip," in Proc. IEEE Int. Symp. Circuits Syst., May 2006, pp. 2397--3234.