The
weakness of Human Auditory System (HAS) led the audio steganography process to
be used in hiding data in the digital sound. Audio steganography is implemented
here by using Least Significant Bit (LSB) algorithm to hide message into
multiple audio files. This is achieved by 1st, 2nd, 3rd,
and 4th bits hiding ratios. In comparison to other used bits, hiding
results show that the use of 1st bit in LSB method for embedding
data is much better than those used bits as expected. In addition to that and
according to the results, file’s size affects strongly upon the effectiveness
of the embedding process while hiding starting position doesn’t affect upon the
variation of the adopted statistical estimators regardless to which bit is
used. Among the statistical estimators that have been adopted here, the Mean
Absolute Error (MAE) seems to
be the best one in testing hiding process.
References
[1]
Kumar, S., Barnali, B. and Banik, G. (2012) LSB Modification and Phase Encoding Technique of Audio Steganography Revisited. International Journal of Advanced Research in Computer and Communication Engineering, 1, 1-4.
[2]
Jayaram, P., Ranganatha, H.R. and Anupama, H.S. (2011) Information Hiding Using Audio Steganography—A Survey. The International Journal of Multimedia & Its Applications (IJMA), 3, 86-96. http://dx.doi.org/10.5121/ijma.2011.3308
[3]
Ali, A.J.M., Al-Zuky, A.A.D. and Ali, F.E.M. (2007) Text Hiding Technique in Digital Image. Al-Mustansiriya Journal of Science, 18.
[4]
Aigal, P. and Vasambekar, P. (2012) Hiding Data in Wave Files. International Conference in Recent Trends in Information Technology and Computer Science, Proceedings Published in International Journal of Computer Applications, 20-24.
[5]
Chandrakar, P., Choudhary, M. and Badgaiyan, C. (2013) Enhancement in Security of LSB Based Audio Steganography Using Multiple Files. International Journal of Computer Applications, 73, 21-24. http://dx.doi.org/10.5120/12754-9705
[6]
Burate, D.J. and Dixit, M.R. (2013) Performance Improving LSB Audio Steganography Technique. International Journal of Advance Research in Computer Science and Management Studies, 1, 67-75.
[7]
Gadicha, A.B. (2011) Audio Wave Steganography. International Journal of Soft Computing and Engineering (IJSCE), 1, 174-176.
[8]
Chadha, A., Satam, N., Sood, R. and Bade, D. (2013) An Efficient Method for Image and Audio Steganography Using Least Significant Bit (LSB) Substitution. International Journal of Computer Applications, 77, 37-45. http://dx.doi.org/10.5120/13547-1342
[9]
Al-Obaidi, F.E.M. and Ali, A.J.M. (2013) A Comparison in Colored Text Enhancement. International Journal of Scientific & Engineering Research, 4, 659-665.
[10]
Kaushik, P. and Sharma, Y. (2012) Comparison of Different Image Enhancement Techniques Based Upon Psnr & Mse. International Journal of Applied Engineering Research, 7.
[11]
Hemalatha, S., Acharya, D.U. and Renuka, A. and Kamath, P.R. (2013) A Secure and High Capacity Image Steganography Technique. Signal & Image Processing: An International Journal (SIPIJ), 4.