EN
Comparative Analysis of Audio Steganography Methods
Abstract
Information security has been one of the most important issues of all time for both individuals and companies. Delivering data to the correct recipient is crucial for personal data protection, the privacy of personal life, and national security. To this end, different methods have been developed over the years to hide information from malicious individuals. Steganography is one of the most important information hiding methods that received great attention. In this study, five different audio steganography techniques (least significant bit, echo hiding, wavelet coding, spread spectrum, and cepstrum) are utilized and a comparison of these techniques is performed on Turkish audio recordings. To this end, hidden messages of various sizes were embedded into 20 audio recordings from 10 male and 10 female speakers using different embedding algorithms. Signal-to-noise ratios (SNR) computed between stego and cover audio files show that embedded message length and frame size are the main factors that determine the quality. In addition, it is observed that there is no perceptual difference between the cover and stego audio recordings. Hence, the human auditory system is unable to determine whether an audio recording is authentic or conveys a hidden message. Experimental results show that as the message length increases, the average SNR value decreases irrespective of the steganography technique, as expected. The well-known least significant bit (LSB) technique yields the highest average SNR value among the five steganography methods. The spectrographic comparison of the cover and stego audio recordings shows that hiding the secret message in an original audio signal highly affects the high-frequency region more than the low-frequency components.
Keywords
References
- [1] Warkentin M., Schmidt M., Bekkering E. (2007). Steganography and steganalysis, Intellectual Property Protection for Multimedia Information Technology, IGI Global, 374-380, 9781599047621.
- [2] Guojie, H., Zhengjin, F., & Ruiling, M. (2003). Chosen ciphertext attack on chaos communication based on chaotic synchronization. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 50(2), 275-279.
- [3] Dutta, P., Bhattacharyya, D., Kim, T. (2009). Data Hiding in Audio Signal: A Review, International Journal of Database Theory and Application, 2(2):1-8.
- [4] Cvejic, N., Seppänen, T. (2003). Increasing the capacity of LSB-based audio steganography, IEEE Workshop on Multimedia Signal Processing, 336-338. doi: 10.1109/MMSP.2002.1203314.
- [5] Misshra S., Yadav, V.K., Trivedi, M.C., Shrimali, T. (2018). Audio Steganography Techniques: A Survey, Advances in Computer and Computational Sciences, Advances in Intelligent Systems and Computing 581-589. doi: 10.1007/978-981-10-3773-3_56.
- [6] Kaur, N., Behal, S. (2014). Audio Steganography Techniques-A Survey, Int. Journal of Engineering Research and Applications 94-100. doi: 10.14445/22315381/IJETT-V11P276.
- [7] Bhavana, D., Tej, D.R., Puneeth, M., Harini, A., Shankar, Y.M., Madhuri, T.S. (2015). Steganography Using Matlab, International Journal of Advanced Engineering Research and Science (IJAERS) 19-24. doi:10.22161/ijaers.
- [8] Wakiyama, M., Hidaka, Y., Nozaki, K. (2010). 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
Details
Primary Language
English
Subjects
Engineering
Journal Section
Research Article
Publication Date
June 8, 2022
Submission Date
May 7, 2021
Acceptance Date
January 22, 2022
Published in Issue
Year 1970 Volume: 6 Number: 1
APA
Aslantaş, F., & Hanilçi, C. (2022). Comparative Analysis of Audio Steganography Methods. Journal of Innovative Science and Engineering, 6(1), 122-137. https://doi.org/10.38088/jise.932549
AMA
1.Aslantaş F, Hanilçi C. Comparative Analysis of Audio Steganography Methods. JISE. 2022;6(1):122-137. doi:10.38088/jise.932549
Chicago
Aslantaş, Funda, and Cemal Hanilçi. 2022. “Comparative Analysis of Audio Steganography Methods”. Journal of Innovative Science and Engineering 6 (1): 122-37. https://doi.org/10.38088/jise.932549.
EndNote
Aslantaş F, Hanilçi C (June 1, 2022) Comparative Analysis of Audio Steganography Methods. Journal of Innovative Science and Engineering 6 1 122–137.
IEEE
[1]F. Aslantaş and C. Hanilçi, “Comparative Analysis of Audio Steganography Methods”, JISE, vol. 6, no. 1, pp. 122–137, June 2022, doi: 10.38088/jise.932549.
ISNAD
Aslantaş, Funda - Hanilçi, Cemal. “Comparative Analysis of Audio Steganography Methods”. Journal of Innovative Science and Engineering 6/1 (June 1, 2022): 122-137. https://doi.org/10.38088/jise.932549.
JAMA
1.Aslantaş F, Hanilçi C. Comparative Analysis of Audio Steganography Methods. JISE. 2022;6:122–137.
MLA
Aslantaş, Funda, and Cemal Hanilçi. “Comparative Analysis of Audio Steganography Methods”. Journal of Innovative Science and Engineering, vol. 6, no. 1, June 2022, pp. 122-37, doi:10.38088/jise.932549.
Vancouver
1.Funda Aslantaş, Cemal Hanilçi. Comparative Analysis of Audio Steganography Methods. JISE. 2022 Jun. 1;6(1):122-37. doi:10.38088/jise.932549
