Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.7.53

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique  

Alarood, Alaa Abdulsalm (College of Computer Science and Engineering, University of Jeddah)
Alghamdi, Ahmed Mohammed (Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah)
Alzahrani, Ahmed Omar (College of Computer Science and Engineering, University of Jeddah)
Alzahrani, Abdulrahman (College of Computer Science and Engineering, University of Jeddah)
Alsolami, Eesa (Department of Cyber Security, College of Computer Science and Engineering, University of Jeddah)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.7, 2022 , pp. 427-442 More about this Journal
Abstract
MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.
Keywords
Steganography; Least Significant Bit (LSB); MP3;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Kekre, H. B., Athawale, A., Rao, B. S. & Athawale, U. (2010). Increasing the capacity of the cover audio signal by using multiple LSBs for information hiding. Emerging Trends in Engineering and Technology (ICETET), 2010 3rd International Conference on, 2010. IEEE, 196-201.
2 Salih, M. M. (2015). A New Audio Steganography Method Using Bi-LSB Embedding and Secret Message Integrity Validation. Middle East University.
3 Devaraj, S., Singh, U. & Jialal, I. (2009). The evolving role of C-reactive protein in atherothrombosis. Clinical Chemistry, 55, 229-238.   DOI
4 Sinder, D. J., Varga, I., Krishnan, V., Rajendran, V. & Villette, S. (2015). Recent speech coding technologies and standards. Speech and Audio Processing for Coding, Enhancement and Recognition. Springer.
5 Fan, X., Cao, J.: A Survey of Mobile Cloud Computing. ZTE Communications 9(1), 4-8 (2011)
6 Huerta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proc. of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond (2010)
7 Shirali-Shahreza, S., Manzuri-Shalmani, M. & Shirali-Shahreza, M. H. (2007). A Skew resistant method for persian text segmentation. Computational Intelligence in Image and Signal Processing, 2007. CIISP 2007. IEEE Symposium on, 2007. IEEE, 115-120.
8 Atoum, M. S.(2015) New MP3 Steganography Data Set. IT Convergence and Security (ICITCS), 2015 5th International Conference on, 2015b. IEEE, 1-7.
9 Sterne, J. (2012). Mp3: The meaning of a format, Duke University Press.
10 Sayood, K. (2012). Introduction to data compression, Newnes.
11 Supurovic, P. (1998). MPEG audio frame header. Available In Internet.
12 Jhaveri, N. V., Vaughan, G. B., Anderson, I. W., Gardner, J. J., & Tao, P. T. (2019). U.S. Patent Application No. 16/357,128.
13 Castelan, Y. & Khodja, B. (2015) MP3 Steganography Techniques. Proceedings of the 4th Annual ACM Conference on Research in Information Technology, ACM, 51-54.
14 Zebari, D. A., Zeebaree, D. Q., Saeed, J. N., Zebari, N. A., & Adel, A. Z. (2020). Image Steganography Based on Swarm Intelligence Algorithms: A Survey. people, 7(8), 9.
15 Chhikara, S. & Singh, P. (2013b.) SBHCS: Spike based Histogram Comparison Steganalysis Technique. International Journal of Computer Applications, 75.
16 Kim, D.-S., Lee, G.-J. & Yoo, K.-Y.(2014). A reversible data hiding scheme based on histogram shifting using edge direction predictor. Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, ACM, 126-131.
17 Nilsson, M. (2000). ID3 tag version 2.4. 0-Main Structure. http//www. id3. org/id3v2.
18 Fridrich, J. & Goljan, M.(2002). Practical steganalysis of digital images: State of the art. Electronic Imaging 2002, International Society for Optics and Photonics, 1-13.
19 Quackenbush, S. (2012). MPEG Audio Compression Advances. The MPEG Representation of Digital Media. Springer.
20 Brandenburg, K.(1999). MP3 and AAC explained. Audio Engineering Society Conference: 17th International Conference: High-Quality Audio Coding, Audio Engineering Society.
21 Di Angelo, M., & Salzer, G. (2019, July). Mayflies, breeders, and busy bees in Ethereum: smart contracts over time. In Proceedings of the Third ACM Workshop on Blockchains, Cryptocurrencies and Contracts (pp. 1-10).
22 Fridrich, J. (2009). Steganography in digital media: principles, algorithms, and applications. Cambridge University Press.
23 Ozighor, E. R., & Izegbu, I. (2020). INFORMATION PROTECTION AGAINST SECURITY THREATS IN AN INSECURE ENVIRONMENT USING CRYPTOGRAPHY AND STEGANOGRAPHY. GSJ, 8(5).
24 Giurgiu, I., Riva, O., Juric, D., Krivulev, I., Alonso, G.: Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications. In: Bacon, J.M., Cooper, B.F. (eds.) Middleware 2009. LNCS, vol. 5896, pp. 83-102. Springer, Heidelberg (2009)
25 Gopalan, K. & Shi, Q. (2010). Audio Steganography Using Bit Modification-A Tradeoff on Perceptibility and Data Robustness for Large Payload Audio Embedding. ICCCN, 2010.