PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY

 

e-ISSN 2231-8526
ISSN 0128-7680

Home / Regular Issue / JST Vol. 30 (1) Jan. 2022 / JST-2839-2021

 

A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography

Muhammad Harith Noor Azam, Farida Ridzuan and M Norazizi Sham Mohd Sayuti

Pertanika Journal of Science & Technology, Volume 30, Issue 1, January 2022

DOI: https://doi.org/10.47836/pjst.30.1.27

Keywords: Audio steganography, Least Significant Bit, peak-signal-to-noise-ratio estimator, trade-off

Published on: 10 January 2022

Audio steganography is implemented based on three main features: capacity, robustness, and imperceptibility, but simultaneously implementing them is still a challenge. Embedding data at the Least Significant Bit (LSB) of the audio sample is one of the most implemented audio steganography methods because the method will give high capacity and imperceptibility. However, LSB has the lowest robustness among all common methods in audio steganography. To cater to this problem, researchers increased the depth of the embedding level from fourth to sixth and eighth LSB level to improve its robustness feature. However, consequently, the imperceptibility feature, which is commonly measured by Peak Signal to Noise Ratio (PSNR), is reduced due to the trade-off between imperceptibility and robustness. Currently, the lack of study on the estimation of the PSNR for audio steganography has caused the early assessment of the imperceptibility-robustness trade-off difficult. Therefore, a method to estimate PSNR, known as PSNR Estimator (PE), is introduced to enable early evaluation of imperceptibility feature for each stego-file produced by the audio steganography, which is important for the utilisation of embedding. The proposed PE estimates the PSNR based on the pattern collected from the embedment at different levels. From the evaluation, the proposed method has 99.9% of accuracy in estimating PSNR values at different levels. In comparison with the Mazdak Method, the proposed method performs better in all situations. In conclusion, the proposed PE can be used as a reference for embedding and further reducing the calculation complexity in finding the feasible value to minimise the trade-off between robustness and imperceptibility.

  • Ahmed, M. A., Kiah, L. M., Zaidan, B. B., & Zaidan, A. A. (2010). A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. Journal of Applied Sciences, 10(1), 59-64. https://doi.org/10.3923/jas.2010.59.64

  • Ali, A. H., Mokhtar, M. R., & George, L. E. (2017). Enhancing the hiding capacity of audio steganography based on block mapping. Journal of Theoretical and Applied Information Technology, 95(7), 1441-1448.

  • Alsabhany, A. A., Ridzuan, F., & Azni, A. H. (2019). The adaptive multi-level phase coding method in audio steganography for confidential communication. IEEE Access, 7, 129291-129306. https://doi.org/10.1109/ACCESS.2019.2940640

  • Alsabhany, A. A., Ridzuan, F., & Azni, A. H. (2018). An adaptive multi amplitude thresholds embedding algorithm for audio steganography. Malaysian Journal of Science Health & Technology, 2 (Special Issue), 7-10. https://doi.org/10.33102/mjosht.v2i.43

  • Alsabhany, A. A., Ridzuan, F., Ridzuan, F., Azni, A. H., & Azni, A. H. (2020). The progressive multilevel embedding method for audio steganography. In Journal of Physics: Conference Series (Vol. 1551, No. 1, p. 012011). IOP Publishing. https://doi.org/10.1088/1742-6596/1551/1/012011

  • Amirtharajan, R., & Rayappan, J. B. B. (2013). Steganography - Time to time: A review. Research Journal of Information Technology, 5(2), 53-66. https://doi.org/10.3923/rjit.2013.53.66

  • Asad, M., Gilani, J., & Khalid, A. (2011). An enhanced least significant bit modification technique for audio steganography. In International Conference on Computer Networks and Information Technology (pp. 143-147). IEEE Publishing. https://doi.org/10.1109/ICCNIT.2011.6020921

  • Bhowal, K., Sarkar, D., Biswas, S., & Sarkar, P. P. (2017). A steganographic approach to hide secret data in digital audio based on XOR operands triplet property with high embedding rate and good quality audio. Turkish Journal of Electrical Engineering & Computer Sciences, 25(3), 2136-2148. https://doi.org/10.3906/elk-162-267

  • Chadha, A., Satam, N., & Sood, R. (2013). An efficient method for image and audio steganography using least significant bit (LSB) substitution. International Journal of Computer Applications, 77(13), 37-45. https://doi.org/10.1109/NSSMIC.2009.5401638

  • Cvejic, N., & Seppänen, T. (2005). Increasing robustness of LSB audio steganography by reduced distortion LSB coding. Journal of Universal Computer Science, 11(1), 56-65.

  • Cvejic, N., & Seppanen, T. (2004). Increasing robustness of LSB audio steganography using a novel embedding method. In 2004 Proceedings of International Conference on Information Technology: Coding and Computing, ITCC 2004 (Vol. 2, pp. 533-537). IEEE Publishing. https://doi.org/10.1109/ITCC.2004.1286709

  • Djebbar, F., Ayad, B., Hamam, H., & Abed-Meraim, K. (2011). A view on latest audio steganography techniques. In 2011 International Conference on Innovations in Information Technology (pp. 409-414). IEEE Publishing. https://doi.org/10.1109/INNOVATIONS.2011.5893859

  • Gopalan, K. (2018). Audio steganography for information hiding and covert communication - A tutorial. In 2018 IEEE International Conference on Electro/Information Technology (EIT) (pp. 0242-0243). IEEE Publishing. https://doi.org/10.1109/EIT.2018.8500167

  • Gopalan, K., & Fu, J. (2015). An imperceptible and robust audio steganography employing bit modification. In 2015 IEEE International Conference on Industrial Technology (ICIT) (pp. 1635-1638). IEEE Publishing. https://doi.org/10.1109/ICIT.2015.7125331

  • Hameed, A. S. (2018). High capacity audio steganography based on contourlet transform. Tikrit Journal of Engineering Sciences, 25(1), 1-7. https://doi.org/10.25130/tjes.25.01

  • Hameed, M. A., Hassaballah, M., Aly, S., & Awad, A. I. (2019). An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access, 7, 185189-185204. https://doi.org/10.1109/ACCESS.2019.2960254

  • Jayapandiyan, J. R., Kavitha, C., & Sakthivel, K. (2020). Enhanced least significant bit replacement algorithm in spatial domain of steganography using character sequence optimization. IEEE Access, 8, 136537-136545. https://doi.org/10.1109/ACCESS.2020.3009234

  • Kanhe, A., Aghila, G., Kiran, C. Y. S., Ramesh, C. H., Jadav, G., & Raj, M. G. (2015). Robust audio steganography based on advanced encryption standards in temporal domain. In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1449-1453). IEEE Publishing. https://doi.org/10.1109/ICACCI.2015.7275816

  • Kumar, R. (2016). Audio steganography using QR decomposition and fast Fourier transform. Indian Journal of Science and Technology, 6(34), 1-8. https://doi.org/10.17485/ijst/2015/v8i1/69604

  • Li, P., Kong, Q., & Ma, Y. (2014). Image secret sharing and hiding with authentication based on PSNR estimation. Journal of Information Hiding and Multimedia Signal Processing, 5(3), 353-366.

  • Mazdak, Z., Azizah, B. A. M., Shahidan, M. A., & Saman, S. C. (2012). Mazdak technique for PSNR estimation in audio steganography. In Applied Mechanics and Materials (Vol. 229, pp. 2798-2803). Trans Tech Publications Ltd. https://doi.org/10.4028/www.scientific.net/AMM.229-231.2798

  • Meligy, A. M., Nasef, M. M., & Eid, F. T. (2016). A hybrid technique for enhancing the efficiency of audio steganography. International Journal of Image, Graphics and Signal Processing, 8(1), 36-42. https://doi.org/10.5815/ijigsp.2016.01.04

  • Priyanka, B. R., Vrushabh, K. R., Komal, P. K., Pingle, S. M., & Mahesh, S. R. (2012). Audio steganography using LSB. International Journal of Electronics, Communication and Soft Computing Science & Engineering (IJECSCSE), 2, 90-93.

  • Sapra, P. S. (2016). Secured LSB modification using dual randomness. In 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) (pp. 1-4). IEEE Publishing. https://doi.org/10.1109/ICRAIE.2016.7939592

  • Somani, H., & Madhu, K. M. (2015). A survey on digital audio steganography techniques used for secure transmission of data. International Journal of Engineering Development and Research, 3(4), 236-239.

  • Srivastava, M., & Rafiq, M. Q. (2012). A novel approach to secure communication using audio steganography. Advanced Materials Research, 408, 963-969. https://doi.org/10.4028/www.scientific.net/AMR.403-408.963

  • Sun, W., Shen, R., Yu, F., & Lu, Z. (2012). Data hiding in audio based on audio-to-image wavelet transform and vector quantization. In 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 313-316). IEEE Publishing. https://doi.org/10.1109/IIH-MSP.2012.82

  • Tayel, M., Gamal, A., & Shawky, H. (2016). A proposed implementation method of an audio steganography technique. In 2016 18th international conference on advanced communication technology (ICACT) (pp. 180-184). IEEE Publishing. https://doi.org/10.1109/ICACT.2016.7423320

  • Wakiyama, M., Hidaka, Y., & Nozaki, K. (2010). An audio steganography by a low-bit coding method with wave files. In 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 530-533). IEEE Publishing. https://doi.org/10.1109/IIHMSP.2010.135

  • Xue, P., Liu, H., Hu, J., & Hu, R. (2018). A multi-layer steganographic method based on audio time domain segmented and network steganography. In AIP Conference Proceedings (Vol. 1967, No. 1, p. 020046). AIP Publishing LLC. https://doi.org/10.1063/1.5039018

  • Yu, H., Wang, R., Dong, L., Yan, D., Gong, Y., & Lin, Y. (2020). A high-capacity reversible data hiding scheme using dual-channel audio. IEEE Access, 8, 162271-162278. https://doi.org/10.1109/access.2020.3015851

  • Zumchak, S. M. (2016). Audio steganography: A comparative study of techniques and tools (Doctoral dissertation). Utica College, USA.

ISSN 0128-7680

e-ISSN 2231-8526

Article ID

JST-2839-2021

Download Full Article PDF

Share this article

Recent Articles