e-ISSN 2231-8526
ISSN 0128-7680
Muhammad Harith Noor Azam, Farida Ridzuan and M Norazizi Sham Mohd Sayuti
Pertanika Journal of Science & Technology, Volume 30, Issue 1, January 2022
DOI: https://doi.org/10.47836/pjst.30.1.27
Keywords: Audio steganography, Least Significant Bit, peak-signal-to-noise-ratio estimator, trade-off
Published on: 10 January 2022
Audio steganography is implemented based on three main features: capacity, robustness, and imperceptibility, but simultaneously implementing them is still a challenge. Embedding data at the Least Significant Bit (LSB) of the audio sample is one of the most implemented audio steganography methods because the method will give high capacity and imperceptibility. However, LSB has the lowest robustness among all common methods in audio steganography. To cater to this problem, researchers increased the depth of the embedding level from fourth to sixth and eighth LSB level to improve its robustness feature. However, consequently, the imperceptibility feature, which is commonly measured by Peak Signal to Noise Ratio (PSNR), is reduced due to the trade-off between imperceptibility and robustness. Currently, the lack of study on the estimation of the PSNR for audio steganography has caused the early assessment of the imperceptibility-robustness trade-off difficult. Therefore, a method to estimate PSNR, known as PSNR Estimator (PE), is introduced to enable early evaluation of imperceptibility feature for each stego-file produced by the audio steganography, which is important for the utilisation of embedding. The proposed PE estimates the PSNR based on the pattern collected from the embedment at different levels. From the evaluation, the proposed method has 99.9% of accuracy in estimating PSNR values at different levels. In comparison with the Mazdak Method, the proposed method performs better in all situations. In conclusion, the proposed PE can be used as a reference for embedding and further reducing the calculation complexity in finding the feasible value to minimise the trade-off between robustness and imperceptibility.
Ahmed, M. A., Kiah, L. M., Zaidan, B. B., & Zaidan, A. A. (2010). A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. Journal of Applied Sciences, 10(1), 59-64. https://doi.org/10.3923/jas.2010.59.64
Ali, A. H., Mokhtar, M. R., & George, L. E. (2017). Enhancing the hiding capacity of audio steganography based on block mapping. Journal of Theoretical and Applied Information Technology, 95(7), 1441-1448.
Alsabhany, A. A., Ridzuan, F., & Azni, A. H. (2019). The adaptive multi-level phase coding method in audio steganography for confidential communication. IEEE Access, 7, 129291-129306. https://doi.org/10.1109/ACCESS.2019.2940640
Alsabhany, A. A., Ridzuan, F., & Azni, A. H. (2018). An adaptive multi amplitude thresholds embedding algorithm for audio steganography. Malaysian Journal of Science Health & Technology, 2 (Special Issue), 7-10. https://doi.org/10.33102/mjosht.v2i.43
Alsabhany, A. A., Ridzuan, F., Ridzuan, F., Azni, A. H., & Azni, A. H. (2020). The progressive multilevel embedding method for audio steganography. In Journal of Physics: Conference Series (Vol. 1551, No. 1, p. 012011). IOP Publishing. https://doi.org/10.1088/1742-6596/1551/1/012011
Amirtharajan, R., & Rayappan, J. B. B. (2013). Steganography - Time to time: A review. Research Journal of Information Technology, 5(2), 53-66. https://doi.org/10.3923/rjit.2013.53.66
Asad, M., Gilani, J., & Khalid, A. (2011). An enhanced least significant bit modification technique for audio steganography. In International Conference on Computer Networks and Information Technology (pp. 143-147). IEEE Publishing. https://doi.org/10.1109/ICCNIT.2011.6020921
Bhowal, K., Sarkar, D., Biswas, S., & Sarkar, P. P. (2017). A steganographic approach to hide secret data in digital audio based on XOR operands triplet property with high embedding rate and good quality audio. Turkish Journal of Electrical Engineering & Computer Sciences, 25(3), 2136-2148. https://doi.org/10.3906/elk-162-267
Chadha, A., Satam, N., & Sood, R. (2013). An efficient method for image and audio steganography using least significant bit (LSB) substitution. International Journal of Computer Applications, 77(13), 37-45. https://doi.org/10.1109/NSSMIC.2009.5401638
Cvejic, N., & Seppänen, T. (2005). Increasing robustness of LSB audio steganography by reduced distortion LSB coding. Journal of Universal Computer Science, 11(1), 56-65.
Cvejic, N., & Seppanen, T. (2004). Increasing robustness of LSB audio steganography using a novel embedding method. In 2004 Proceedings of International Conference on Information Technology: Coding and Computing, ITCC 2004 (Vol. 2, pp. 533-537). IEEE Publishing. https://doi.org/10.1109/ITCC.2004.1286709
Djebbar, F., Ayad, B., Hamam, H., & Abed-Meraim, K. (2011). A view on latest audio steganography techniques. In 2011 International Conference on Innovations in Information Technology (pp. 409-414). IEEE Publishing. https://doi.org/10.1109/INNOVATIONS.2011.5893859
Gopalan, K. (2018). Audio steganography for information hiding and covert communication - A tutorial. In 2018 IEEE International Conference on Electro/Information Technology (EIT) (pp. 0242-0243). IEEE Publishing. https://doi.org/10.1109/EIT.2018.8500167
Gopalan, K., & Fu, J. (2015). An imperceptible and robust audio steganography employing bit modification. In 2015 IEEE International Conference on Industrial Technology (ICIT) (pp. 1635-1638). IEEE Publishing. https://doi.org/10.1109/ICIT.2015.7125331
Hameed, A. S. (2018). High capacity audio steganography based on contourlet transform. Tikrit Journal of Engineering Sciences, 25(1), 1-7. https://doi.org/10.25130/tjes.25.01
Hameed, M. A., Hassaballah, M., Aly, S., & Awad, A. I. (2019). An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access, 7, 185189-185204. https://doi.org/10.1109/ACCESS.2019.2960254
Jayapandiyan, J. R., Kavitha, C., & Sakthivel, K. (2020). Enhanced least significant bit replacement algorithm in spatial domain of steganography using character sequence optimization. IEEE Access, 8, 136537-136545. https://doi.org/10.1109/ACCESS.2020.3009234
Kanhe, A., Aghila, G., Kiran, C. Y. S., Ramesh, C. H., Jadav, G., & Raj, M. G. (2015). Robust audio steganography based on advanced encryption standards in temporal domain. In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1449-1453). IEEE Publishing. https://doi.org/10.1109/ICACCI.2015.7275816
Kumar, R. (2016). Audio steganography using QR decomposition and fast Fourier transform. Indian Journal of Science and Technology, 6(34), 1-8. https://doi.org/10.17485/ijst/2015/v8i1/69604
Li, P., Kong, Q., & Ma, Y. (2014). Image secret sharing and hiding with authentication based on PSNR estimation. Journal of Information Hiding and Multimedia Signal Processing, 5(3), 353-366.
Mazdak, Z., Azizah, B. A. M., Shahidan, M. A., & Saman, S. C. (2012). Mazdak technique for PSNR estimation in audio steganography. In Applied Mechanics and Materials (Vol. 229, pp. 2798-2803). Trans Tech Publications Ltd. https://doi.org/10.4028/www.scientific.net/AMM.229-231.2798
Meligy, A. M., Nasef, M. M., & Eid, F. T. (2016). A hybrid technique for enhancing the efficiency of audio steganography. International Journal of Image, Graphics and Signal Processing, 8(1), 36-42. https://doi.org/10.5815/ijigsp.2016.01.04
Priyanka, B. R., Vrushabh, K. R., Komal, P. K., Pingle, S. M., & Mahesh, S. R. (2012). Audio steganography using LSB. International Journal of Electronics, Communication and Soft Computing Science & Engineering (IJECSCSE), 2, 90-93.
Sapra, P. S. (2016). Secured LSB modification using dual randomness. In 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) (pp. 1-4). IEEE Publishing. https://doi.org/10.1109/ICRAIE.2016.7939592
Somani, H., & Madhu, K. M. (2015). A survey on digital audio steganography techniques used for secure transmission of data. International Journal of Engineering Development and Research, 3(4), 236-239.
Srivastava, M., & Rafiq, M. Q. (2012). A novel approach to secure communication using audio steganography. Advanced Materials Research, 408, 963-969. https://doi.org/10.4028/www.scientific.net/AMR.403-408.963
Sun, W., Shen, R., Yu, F., & Lu, Z. (2012). Data hiding in audio based on audio-to-image wavelet transform and vector quantization. In 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 313-316). IEEE Publishing. https://doi.org/10.1109/IIH-MSP.2012.82
Tayel, M., Gamal, A., & Shawky, H. (2016). A proposed implementation method of an audio steganography technique. In 2016 18th international conference on advanced communication technology (ICACT) (pp. 180-184). IEEE Publishing. https://doi.org/10.1109/ICACT.2016.7423320
Wakiyama, M., Hidaka, Y., & Nozaki, K. (2010). An audio steganography by a low-bit coding method with wave files. In 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 530-533). IEEE Publishing. https://doi.org/10.1109/IIHMSP.2010.135
Xue, P., Liu, H., Hu, J., & Hu, R. (2018). A multi-layer steganographic method based on audio time domain segmented and network steganography. In AIP Conference Proceedings (Vol. 1967, No. 1, p. 020046). AIP Publishing LLC. https://doi.org/10.1063/1.5039018
Yu, H., Wang, R., Dong, L., Yan, D., Gong, Y., & Lin, Y. (2020). A high-capacity reversible data hiding scheme using dual-channel audio. IEEE Access, 8, 162271-162278. https://doi.org/10.1109/access.2020.3015851
Zumchak, S. M. (2016). Audio steganography: A comparative study of techniques and tools (Doctoral dissertation). Utica College, USA.
ISSN 0128-7680
e-ISSN 2231-8526