Audio Steganography for Information Hiding and Covert Communication - A Tutorial

被引:0
|
作者
Gopalan, K. [1 ]
机构
[1] Purdue Univ Northwest, Dept Elect & Comp Engn, Hammond, IN 46323 USA
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Steganography is concerned with hiding information in a medium such as text, image, audio or video. From Egyptian hieroglyphs, Greek tattooed writing, and Chinese papyrus to text display or printout from a word processor, this data hiding technique has a long and varied history. Human auditory and visual imperfections, which lead to psychoacoustic masking effects in hearing and vision, respectively, are exploited in modern multimedia hiding methods for modifying a host, or cover, signal in accordance with a given piece of covert information. Since the modification is carried out in the masked regions of perceptibility, the information-embedded medium, or the stego' signal, appears to be the same as the original host signal in human perception. While encryption of a media signal (an audio, image or video) alters the signal to conceal its contents so that it becomes unintelligible, embedding uses the media signal as a carrier for hiding covert information without altering the perceptual quality of the carrier. Hence, the success of embedding information in a media signal depends, among others, on the detectability of any difference between the original host signal and the embedded, stego signal. Watermarking is a subset of steganography for unobtrusively concealing a small amount of information such as the authenticity of the cover media signal. Recovery of the hidden information without requiring the original host media signal oblivious recovery and robustness of the hidden information under adverse conditions during transmission are also essential in many applications of steganography. Additionally, the hidden information must withstand intentional or unintentional attacks in attempts to illegally access the information from the stego. Applications of general steganographic techniques abound in modern Internet based communication and file sharing. Watermarking of an audio signal, for instance, is used to determine the legal use of a music file that carries a hidden copyright logo or other information. Embedding biometric data such as a person's fingerprint features in his/her picture identification card for use in access-controlled areas can thwart illegal entry. By concealing the existence of hidden information, the technique can be applied for covert communication using unclassified channels without undue demand for bandwidth.
引用
收藏
页码:242 / 243
页数:2
相关论文
共 50 条
  • [31] Enhanced Audio LSB Steganography for Secure Communication
    Hussain, Muhammad Junaid
    Rafat, Khan Farhan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 340 - 347
  • [32] Hiding Capacity and Audio Steganography Model Based on LSB in Temporal Domain
    Gera A.
    Vyas V.
    Recent Patents on Engineering, 2022, 16 (02)
  • [33] Image Steganography : Hiding Short Audio Messages within Digital Images
    Khalil, M. I.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 68 - 73
  • [34] MULTI-STAGE RESIDUAL HIDING FOR IMAGE-INTO-AUDIO STEGANOGRAPHY
    Cui, Wenxue
    Liu, Shaohui
    Jiang, Feng
    Liu, Yongliang
    Zhao, Debin
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 2832 - 2836
  • [35] Hardware Implementation of Audio Watermarking - Covert Communication
    Karthigaikumar, P.
    Baskaran, K.
    Kirubavathy, K. Jaraline
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 5, 2010, : 588 - 592
  • [36] An Efficient Steganography Method for Hiding Patient Confidential Information
    Al-Dmour, Hayat
    Al-Ani, Ahmed
    Hung Nguyen
    2014 36TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2014, : 222 - 225
  • [37] Steganography in IoT: Information Hiding with Joystick and Touch Sensors
    Koptyra, Katarzyna
    Ogiela, Marek R. R.
    SENSORS, 2023, 23 (06)
  • [38] A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things
    Meng, Ruohan
    Cui, Qi
    Zhou, Zhili
    Fu, Zhangjie
    Sun, Xingming
    IEEE ACCESS, 2019, 7 : 90574 - 90584
  • [39] Steganography using stochastic diffusion for the covert communication of digital images
    Blackledge, Jonathan M.
    Al-Rawi, AbdulRahman I.
    IAENG International Journal of Applied Mathematics, 2011, 41 (04) : 270 - 298
  • [40] A Multimode Network Steganography for Covert Wireless Communication Based on BitTorrent
    Wang, Mingqian
    Gu, Weijie
    Ma, Changshen
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020