Research Article

Comparative Analysis of Audio Steganography Methods

Volume: 6 Number: 1 June 8, 2022
EN

Comparative Analysis of Audio Steganography Methods

Abstract

Information security has been one of the most important issues of all time for both individuals and companies. Delivering data to the correct recipient is crucial for personal data protection, the privacy of personal life, and national security. To this end, different methods have been developed over the years to hide information from malicious individuals. Steganography is one of the most important information hiding methods that received great attention. In this study, five different audio steganography techniques (least significant bit, echo hiding, wavelet coding, spread spectrum, and cepstrum) are utilized and a comparison of these techniques is performed on Turkish audio recordings. To this end, hidden messages of various sizes were embedded into 20 audio recordings from 10 male and 10 female speakers using different embedding algorithms. Signal-to-noise ratios (SNR) computed between stego and cover audio files show that embedded message length and frame size are the main factors that determine the quality. In addition, it is observed that there is no perceptual difference between the cover and stego audio recordings. Hence, the human auditory system is unable to determine whether an audio recording is authentic or conveys a hidden message. Experimental results show that as the message length increases, the average SNR value decreases irrespective of the steganography technique, as expected. The well-known least significant bit (LSB) technique yields the highest average SNR value among the five steganography methods. The spectrographic comparison of the cover and stego audio recordings shows that hiding the secret message in an original audio signal highly affects the high-frequency region more than the low-frequency components.

Keywords

References

  1. [1] Warkentin M., Schmidt M., Bekkering E. (2007). Steganography and steganalysis, Intellectual Property Protection for Multimedia Information Technology, IGI Global, 374-380, 9781599047621.
  2. [2] Guojie, H., Zhengjin, F., & Ruiling, M. (2003). Chosen ciphertext attack on chaos communication based on chaotic synchronization. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 50(2), 275-279.
  3. [3] Dutta, P., Bhattacharyya, D., Kim, T. (2009). Data Hiding in Audio Signal: A Review, International Journal of Database Theory and Application, 2(2):1-8.
  4. [4] Cvejic, N., Seppänen, T. (2003). Increasing the capacity of LSB-based audio steganography, IEEE Workshop on Multimedia Signal Processing, 336-338. doi: 10.1109/MMSP.2002.1203314.
  5. [5] Misshra S., Yadav, V.K., Trivedi, M.C., Shrimali, T. (2018). Audio Steganography Techniques: A Survey, Advances in Computer and Computational Sciences, Advances in Intelligent Systems and Computing 581-589. doi: 10.1007/978-981-10-3773-3_56.
  6. [6] Kaur, N., Behal, S. (2014). Audio Steganography Techniques-A Survey, Int. Journal of Engineering Research and Applications 94-100. doi: 10.14445/22315381/IJETT-V11P276.
  7. [7] Bhavana, D., Tej, D.R., Puneeth, M., Harini, A., Shankar, Y.M., Madhuri, T.S. (2015). Steganography Using Matlab, International Journal of Advanced Engineering Research and Science (IJAERS) 19-24. doi:10.22161/ijaers.
  8. [8] Wakiyama, M., Hidaka, Y., Nozaki, K. (2010). 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Publication Date

June 8, 2022

Submission Date

May 7, 2021

Acceptance Date

January 22, 2022

Published in Issue

Year 1970 Volume: 6 Number: 1

APA
Aslantaş, F., & Hanilçi, C. (2022). Comparative Analysis of Audio Steganography Methods. Journal of Innovative Science and Engineering, 6(1), 122-137. https://doi.org/10.38088/jise.932549
AMA
1.Aslantaş F, Hanilçi C. Comparative Analysis of Audio Steganography Methods. JISE. 2022;6(1):122-137. doi:10.38088/jise.932549
Chicago
Aslantaş, Funda, and Cemal Hanilçi. 2022. “Comparative Analysis of Audio Steganography Methods”. Journal of Innovative Science and Engineering 6 (1): 122-37. https://doi.org/10.38088/jise.932549.
EndNote
Aslantaş F, Hanilçi C (June 1, 2022) Comparative Analysis of Audio Steganography Methods. Journal of Innovative Science and Engineering 6 1 122–137.
IEEE
[1]F. Aslantaş and C. Hanilçi, “Comparative Analysis of Audio Steganography Methods”, JISE, vol. 6, no. 1, pp. 122–137, June 2022, doi: 10.38088/jise.932549.
ISNAD
Aslantaş, Funda - Hanilçi, Cemal. “Comparative Analysis of Audio Steganography Methods”. Journal of Innovative Science and Engineering 6/1 (June 1, 2022): 122-137. https://doi.org/10.38088/jise.932549.
JAMA
1.Aslantaş F, Hanilçi C. Comparative Analysis of Audio Steganography Methods. JISE. 2022;6:122–137.
MLA
Aslantaş, Funda, and Cemal Hanilçi. “Comparative Analysis of Audio Steganography Methods”. Journal of Innovative Science and Engineering, vol. 6, no. 1, June 2022, pp. 122-37, doi:10.38088/jise.932549.
Vancouver
1.Funda Aslantaş, Cemal Hanilçi. Comparative Analysis of Audio Steganography Methods. JISE. 2022 Jun. 1;6(1):122-37. doi:10.38088/jise.932549

Cited By


Creative Commons License

The works published in Journal of Innovative Science and Engineering (JISE) are licensed under a  Creative Commons Attribution-NonCommercial 4.0 International License.