Open Access Open Access  Restricted Access Subscription or Fee Access

Steganography on Audio File: A Review

Rahul R, R Apoorva, Rajath Rajath, Sakshith Varambally, K. S. Shivaprakasha

Abstract


Security of the message is more crucial and significant since the majority of real-time applications employ digital communication. One such method that can be used to conceal the information is steganography. Steganography is the method of hiding secret information such as image, text, audio in a carrier file such as Audio File, Video file or Image. Audio Steganography is preferred over other cover files due to its large redundancy. In this paper, we have made an attempt in studying research based on audio steganographic techniques. Different types of audio steganography have been compared and analysed.


Full Text:

PDF

References


S. E. El-Khamy, N. O. Korany and M. H. El-Sherif, "Chaos-based image hiding scheme between silent intervals of high quality audio signals using feature extraction and image bits spreading," 2018 35th National Radio Science Conference (NRSC), 2018, pp. 266-273, doi: 10.1109/NRSC.2018.8354372.

M. M. Mahmoud and H. T. Elshoush, "Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography–An Innovative Approach," in IEEE Access, vol. 10, pp. 29954-29971, 2022, doi: 10.1109/ACCESS.2022.3155146.

Gisny Augustinea, Elsa Georgea, Neenu Rosia Michaela ‘‘A Novel DWT based Image Securing Method using Steganography” 2014 International Conference on Information and Communication Technologies (ICICT 2014)

‘‘A Comparative Study of Audio Steganography Techniques” Palwinder Singh1, Assistant Professor, Guru Nanak Dev University, Amritsar- 143001, India E-mail: [email protected]

M. Nursalman, J. R. Rachman and F. Sidik, "Implementation of Low Bit Coding Algorithm and Cipher Block with Electronic Code Book Mode for Data Legality in Audio Steganographic Streaming," 2018 International Conference on Information Technology Systems and Innovation (ICITSI), 2018, pp. 330-335, doi: 10.1109/ICITSI.2018.8695921.

S. E. El-Khamy, N. O. Korany and M. H. El-Sherif, "Chaos-based image hiding scheme between silent intervals of high quality audio signals using feature extraction and image bits spreading," 2018 35th National Radio Science Conference (NRSC), 2018, pp. 266-273, doi: 10.1109/NRSC.2018.8354372.

M. M. Mahmoud and H. T. Elshoush, "Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography–An Innovative Approach," in IEEE Access, vol. 10, pp. 29954-29971, 2022, doi: 10.1109/ACCESS.2022.3155146.

N. Ms Rashmi, "Analysis of Audio Steganography combined with Cryptography for RC4 and 3DES Encryption," 2020 Fourth International Conference on Inventive Systems and Control (ICISC), 2020, pp. 96-100, doi: 10.1109/ICISC47916.2020.9171215.

A. Binny and M. Koilakuntla, "Hiding Secret Information Using LSB Based Audio Steganography," 2014 International Conference on Soft Computing and Machine Intelligence, 2014, pp. 56-59, doi: 10.1109/ISCMI.2014.24.

S. P. Rajput, K. P. Adhiya and G. K. Patnaik, "An Efficient Audio Steganography Technique to Hide Text in Audio," 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), 2017, pp. 1-6, doi: 10.1109/ICCUBEA.2017.8463948

J. S. Lamba, K. Sachdeva, V. Sinha and N. Singh, "Differential pulse code modulation in audio steganography," 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT), 2016, pp. 131-135, doi: 10.1109/ICEECCOT.2016.7955201.

J. Hashim, A. Hameed, M. J. Abbas, M. Awais, H. A. Qazi and S. Abbas, "LSB Modification based Audio Steganography using Advanced Encryption Standard (AES-256) Technique," 2018 12th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2018, pp. 1-6, doi: 10.1109/MACS.2018.8628458.

S. Hemalatha and Ramathmika, "A Robust MP3 Audio Steganography with Improved Capacity," 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), 2020, pp. 640-645, doi: 10.1109/ICCCA49541.2020.9250894.


Refbacks

  • There are currently no refbacks.