Audio Steganography by Direct Sequence Spread Spectrum

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-13 Number-2
Year of Publication : 2014
Authors : Rupanshi , Preeti , Vandana
DOI :  10.14445/22312803/IJCTT-V13P118

MLA

Rupanshi , Preeti , Vandana. "Audio Steganography by Direct Sequence Spread Spectrum". International Journal of Computer Trends and Technology (IJCTT) V13(2):83-86, July 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Image steganography has widely developed. There are also many algorithm developed for it. Meanwhile, the interest in using audio data as cover object in steganography can be spelled out late emergence than image data. This paper discusses the implementation of steganography in audio data using Direct Sequence Spread Spectrum method. Spread Spectrum method is often used to send hidden message through radio waves. This message is transmitted through noise-like wave. Spread spectrum (SS) technique has developed rapidly in this area due to the advantages of good robustness and immunity to noise attack. Accordingly steganalysis of the SS hiding effectively verify the presence of the secrete message in an important issue. It embeds the secret file (text, audio or image) in other carrier file. Text in image steganography is considered in this work. The proposed stegosystem uses Spread Spectrum technique which is applied in spatial domain together with error correction coding. These are used to increase the security and robustness of the system. Random location selection within the cover image pixels is also proposed in the work. Improvement has been achieved in robustness on the expense of reducing the capacity of hiding. The imperceptibility of the stego image is assessed by using peak signal-to-noise ratio (PSNR) measure. Attacks in the form of lossy compression and additive noise are considered. The performance of the proposed system has shown good immunity to moderate levels of channel noise and lossy compression ratios.

References
[1] H. Farid (2002) Detecting hidden messages using higher-order statistical models. In Proceedings of IEEE International Conference on Image Processing, pp. 905-908
[2] Harmsen J J, Pearlman W A (2003) Steganalysis of additive noise modelable information hiding. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents. vol.5022, 21-24
[3] Seshadrinathan K, Sheikh H R, Bovik A C (2005) Detecting spread spectrum watermarks using natural scene statistics. In Proceedings of IEEE International Conference on Image Processing, vol. 2, 1106- 1109
[4] Gupta, A., Barr, D.K. and Sharma, D. (2009), “Mitigating the Degenerations in Microsoft Word Documents: An Improved Steganographic Method”, 2nd International Conference on Computer, Control and Communication (IC4-2009), IEEE, pp.1-6.
[5] Nutzinger, M., Fabian, C. and Marschalek, M. (2010), “Secure Hybrid Spread Spectrum System for Steganography in Auditive Media”, Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2010), IEEE, pp. 78-81.
[6] Gao, S.; Hu, R.M.; Zeng, W.; Ai, H.J. and Li, C.R. (2008), “A Detection Algorithm of Audio Spread Spectrum Data Hiding”, International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM-2008), IEEE, pp. 1-4.
[7] Garay,S.H.; Medina, R.V.; Rivera, L. N. and Ponomaryov, V. (2008),“steganographic communication channel using audio signals”, International Conference on Mathematical Methods in Electromagnetic Theory (2008), IEEE, Odesa, Ukraine,
[8] Shah, P.; Choudhari, P. and Sivaraman, S. (2008), “Adaptive Wavelet Packet Based Audio Steganography using Data History”, Region 10 Colloquium and the Third ICIIS, Kharagpur, (2008), IEEE.
[9] Li, M., Kulhandjian, M., Pados, D.A., Batalama, S.N., Medley, M.J. and Matyjas, J.D. (2012), “On the Extraction of Spread-Spectrum Hidden Data in Digital Media”, Communication and Information Systems Security Symposium, IEEE (ICC- 2012), pp. 1031-1035.
[10] Ghosh, S., De, D. and Kandar, D. (2012), “A Double Layered Additive Space Sequenced Audio Steganography Technique for Mobile Network”, International Conference on Radar, Communication and Computing (ICRCC-2012), IEEE, SKP Engineering College, Tiruvannamalai, pp. 29-33.
[11] Skopin, D.E. ; El-Emary, I.M.M. ; Rasras R.J. and Diab R.S.(2010),“Advanced Algorithms in Audio Steganography for Hiding Human Speech Signal”, International Conference on Advanced Computer Control (ICACC- 2010) , IEEE, vol. 5, pp. 29-32.
[12] Kumar, H. and Anuradha (2012), “Enhanced LSB technique for Audio Steganography”, International Conference on Computing, Communication & Networking Technology (ICCCNT-2012), IEEE-20180, Coimbatore.
[13] Liu, B., Xu, E., Wang, J., Wei, Z., Xu, L., Zhao, B. and Su, J (2011), “Thwarting Audio Steganography Attacks in Cloud Storage Systems”, International Conference on Cloud and Service Computing (2011), IEEE, pp. 279-284.

Keywords
Audio steganography, Direct sequence spread spectrum, Security key, DCT(direct cosine transfor)