A New Method to Increase the Capacity of Audio Steganography Based on the LSB Algorithm

2015 ◽  
Vol 74 (6) ◽  
Author(s):  
Mohsen Bazyar ◽  
Rubita Sudirman

Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol, audio file can be uploaded, downloaded, and transmitted through the internet. This benefit of transmission makes the interest in using audio as cover object in steganography become much stronger. Capacity which is one of the most important properties of audio steganographic methods, evaluates the amount of possible embedding data within the audio file. A new embedding technique of audio steganography is proposed to increase the carrier medium capacity for substitution additional hidden message. With respect to the performed tests, the algorithm succeeds to increase the depth of embedding layer, without having effects on the signal transparency. The maximum number of bits without significant effect on host audio signal for LSB audio steganography is 4 LSBs. The secret message bits are hidden into variable and multiple LSBs layer in this method. Experimental results show that the use of this new technique which apply 7 LSBs for data embedding in comparison the LSB standard algorithm with 4 LSBs improve data hiding capacity of carrier audio by 35% to 55%. It can be observed from listening tests that there is no significant difference between the stego audio acquired from the novel technique and the main signal.  

2021 ◽  
Vol 19 (49) ◽  
pp. 53-61
Author(s):  
Ahlam Majead Kadhim ◽  
Huda Muhamed Jawad

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect presence of hidden image. Measures calculations of SNR, SNR segmental, SNR spectral, MSE and correlation show that, audio music cover file (2channales) is the safest uses as arrier with replace the 9 number of LSB without noticeable noise. Bits of secret message can be hiding capacity reach up to 28 % of the total music cover audio size and the three type's measures of SNR are 32, 28 and 31 dB. For speech cover audio the replacing LSB is safely uses at LSB bits number 6, where the hiding capacity is reach up to 37 % of size speech cover audio at 37, 36 and 39 dB for three type's measures of SNR. Correlation of cover samples was did not effected as a result of hiding secret image, where its value is up to 0.99 for all hiding operations.


2018 ◽  
Vol 17 (1) ◽  
pp. 66
Author(s):  
Ida Bagus Adisimakrisna Peling ◽  
Nyoman Putra Sastra

Ease of accessing and delivering information makes the Internet more and more needed. But the ease also provides greater opportunities for leaking of information that is confidential. To handle the security of information exchange that is confidential then developed the method of data security on audio using AES (Advanced Encryption Standard) and EAS (Enhanced Audio Steganography) algorithm. From the research results can be concluded by using AES method as cryptography and EAS as steganography, audio file quality can be said good because of the overall test scenario conducted the lowest SNR value obtained is 49.33dB while the highest SNR value is 51.10dB.


2021 ◽  
Vol 15 ◽  
Author(s):  
Anju Gera ◽  
Vaibhav Vyas

: Researchers for data hiding use various crypting techniques to improve the security of transmission of confidential information through an unsecured channel. In this paper, a new higher recognition least significant bit (LSB) audio data concealment isproposed . This technique is used to embed the hidden audio into cover audio of the same size. The altered speech file appears as the original carrier file after embedding the secret message. This model strengthens hiding capability and audio quality. The strategy outperforms similar studies by enhancing hiding capability up to 30% and preserving stego audio transparency with the SNR value at 72.2 and SDG at 4.8.


2016 ◽  
Vol 2 (1) ◽  
pp. 1-11 ◽  
Author(s):  
May Htet ◽  
Su Wai Phyo

In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its capacity depends on the similarity of characters of the words in cover text. In addition, as further improvement for security, secret message encryption is performed using Blowfish algorithm before hiding into the innocuous cover text. 


Author(s):  
Ahmed A. Alsabhany ◽  
Farida Hazwani Mohd Ridzuan ◽  
Azni Haslizan Ab Halim

Secure data transfer is an ever-growing challenge. Steganography refers to the art and science of secret communication. Audio steganography provides a smart solution for secure data transferring. The idea is based on hiding a secret message inside an audio signal. The challenge is to produce a stego file that can embed more data without decreasing the quality of the audio file, which may compromise the existence of the embedded message. As the technology advances, old methods become vulnerable and easy to compromise. Several methods include an encryption algorithm to add a second line of defense against a probable eavesdropper. This paper proposes a novel algorithm that aims to improve the perceptual transparency, robustness, and capacity of the embedded message. The main idea of the algorithm is to avoid embedding in the silent or near to silent intervals of the audio samples, and to scramble the embedded message as much as possible. The algorithm uses AES-256 to increase the level of robustness. The proposed algorithm is uniquely adapted to the message size and expected to perform better than the existing algorithms.


Metahumaniora ◽  
2018 ◽  
Vol 8 (3) ◽  
pp. 300
Author(s):  
Tania Intan ◽  
Trisna Gumilar

AbstrakPenelitian ini bertujuan untuk (1) mendekripsikan tanggapan pembaca terhadap novel Le Petit Prince (2) mendeskripsikan horizon harapan pembaca terhadap novel Le Petit Prince, dan (3) mendeskripsikan faktor-faktor penyebab perbedaan tanggapan dan horizon harapan pembaca. Penelitian ini termasuk jenis penelitian deskriptif kualitatif. Data penelitian berupa teks yang memuat tanggapan pembaca novel Le Petit Princeyang terdiri dari 20 orang, sedangkan sumber datanya berupa artikel dan makalah yang dimuat di media massa cetak dan elektronik termasuk internet. Instrumen penelitian berupa seperangkat konsep tentang pembaca, tanggapan pembaca, dan horizon harapan. Teknik pengumpulan data dengan cara observasi dan data dianalisis dengan menggunakan teknik deskriptif kualitatif. Hasil penelitian yang didapat sebagai berikut. (1) Seluruh pembaca menanggapi atau menilai positif unsur tema, alur, tokoh, latar, sudut pandang, gaya bahasa, teknik penceritaan, bahasa, dan isi novel Le Petit Prince. (2) Harapan sebagian besar pembaca sebelum membaca novel Le Petit Prince sesuai dengan kenyataan ke sembilan unsur di dalam novel Le Petit Prince, sehingga pembaca dapat dengan mudah menerima dan memberikan pujian pada novel Le Petit Prince. (3) Faktor penyebab perbedaan tanggapan dan horizon harapan pembaca selain perbedaan stressing unsur yang ditanggapi juga karena perbedaan pengetahuan tentang sastra, pengetahuan tentang kehidupan, dan pengalaman membaca karya sastra.Kata kunci: tanggapan pembaca, horizon harapan, Le Petit PrinceAbstractThis study aims to (1) describe reader’s responses to the novel Le Petit Prince (2) to describe the reader's expectations horizon of Le Petit Prince's novel, and (3) to describe the factors causing differences in responses and the horizon of readers' expectations. This research is a descriptive qualitative research type. The research data consist of a set of paragraphs that contains readers' responses to Le Petit Prince's novel, while the data sources are articles and papers published in print and electronic mass media including the internet. The research instruments are a set of reader concepts, reader responses, and expectations horizon. The technique of collecting data is observation and data are analyzed by using qualitative descriptive technique. The results obtained are as follow: (1) All readers respond and valuethe theme elements,plots, characters, background, point of view, language, titles, storytelling techniques, language, and extrinsic novel Le Petit Prince positively. (2) The expectations of most readers before reading Le Petit Prince's novels are in accordance with the nine facts in Le Petit Prince's novel, so readers can easily accept and give prise to Le Petit Prince's novel. (3) Factors causing differences in responses and horizon of readers' expectations other than the stressing differences of the elements being addressed also due to the differences in knowledge of literature, knowledge of life and literary reading experience. Keywords: readers responses, expectations horizon, Le Petit Prince


Think India ◽  
2019 ◽  
Vol 22 (2) ◽  
pp. 174-187
Author(s):  
Harmandeep Singh ◽  
Arwinder Singh

Nowadays, internet satisfying people with different services related to different fields. The profit, as well as non-profit organization, uses the internet for various business purposes. One of the major is communicated various financial as well as non-financial information on their respective websites. This study is conducted on the top 30 BSE listed public sector companies, to measure the extent of governance disclosure (non-financial information) on their web pages. The disclosure index approach to examine the extent of governance disclosure on the internet was used. The governance index was constructed and broadly categorized into three dimensions, i.e., organization and structure, strategy & Planning and accountability, compliance, philosophy & risk management. The empirical evidence of the study reveals that all the Indian public sector companies have a website, and on average, 67% of companies disclosed some kind of governance information directly on their websites. Further, we found extreme variations in the web disclosure between the three categories, i.e., The Maharatans, The Navratans, and Miniratans. However, the result of Kruskal-Wallis indicates that there is no such significant difference between the three categories. The study provides valuable insights into the Indian economy. It explored that Indian public sector companies use the internet for governance disclosure to some extent, but lacks symmetry in the disclosure. It is because there is no such regulation for web disclosure. Thus, the recommendation of the study highlighted that there must be such a regulated framework for the web disclosure so that stakeholders ensure the transparency and reliability of the information.


2021 ◽  
Vol 11 (3) ◽  
pp. 1150
Author(s):  
Stephan Werner ◽  
Florian Klein ◽  
Annika Neidhardt ◽  
Ulrike Sloma ◽  
Christian Schneiderwind ◽  
...  

For a spatial audio reproduction in the context of augmented reality, a position-dynamic binaural synthesis system can be used to synthesize the ear signals for a moving listener. The goal is the fusion of the auditory perception of the virtual audio objects with the real listening environment. Such a system has several components, each of which help to enable a plausible auditory simulation. For each possible position of the listener in the room, a set of binaural room impulse responses (BRIRs) congruent with the expected auditory environment is required to avoid room divergence effects. Adequate and efficient approaches are methods to synthesize new BRIRs using very few measurements of the listening room. The required spatial resolution of the BRIR positions can be estimated by spatial auditory perception thresholds. Retrieving and processing the tracking data of the listener’s head-pose and position as well as convolving BRIRs with an audio signal needs to be done in real-time. This contribution presents work done by the authors including several technical components of such a system in detail. It shows how the single components are affected by psychoacoustics. Furthermore, the paper also discusses the perceptive effect by means of listening tests demonstrating the appropriateness of the approaches.


Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1349
Author(s):  
Stefan Lattner ◽  
Javier Nistal

Lossy audio codecs compress (and decompress) digital audio streams by removing information that tends to be inaudible in human perception. Under high compression rates, such codecs may introduce a variety of impairments in the audio signal. Many works have tackled the problem of audio enhancement and compression artifact removal using deep-learning techniques. However, only a few works tackle the restoration of heavily compressed audio signals in the musical domain. In such a scenario, there is no unique solution for the restoration of the original signal. Therefore, in this study, we test a stochastic generator of a Generative Adversarial Network (GAN) architecture for this task. Such a stochastic generator, conditioned on highly compressed musical audio signals, could one day generate outputs indistinguishable from high-quality releases. Therefore, the present study may yield insights into more efficient musical data storage and transmission. We train stochastic and deterministic generators on MP3-compressed audio signals with 16, 32, and 64 kbit/s. We perform an extensive evaluation of the different experiments utilizing objective metrics and listening tests. We find that the models can improve the quality of the audio signals over the MP3 versions for 16 and 32 kbit/s and that the stochastic generators are capable of generating outputs that are closer to the original signals than those of the deterministic generators.


Author(s):  
Nesma M Fahmy ◽  
Adel M Michael

Abstract Background Modern built-in spectrophotometer software supporting mathematical processes provided a solution for increasing selectivity for multicomponent mixtures. Objective Simultaneous spectrophotometric determination of the three naturally occurring antioxidants—rutin(RUT), hesperidin(HES), and ascorbic acid(ASC)—in bulk forms and combined pharmaceutical formulation. Method This was achieved by factorized zero order method (FZM), factorized derivative method (FD1M), and factorized derivative ratio method (FDRM), coupled with spectrum subtraction(SS). Results Mathematical filtration techniques allowed each component to be obtained separately in either its zero, first, or derivative ratio form, allowing the resolution of spectra typical to the pure components present in Vitamin C Forte® tablets. The proposed methods were applied over a concentration range of 2–50, 2–30, and 10–100 µg/mL for RUT, HES, and ASC, respectively. Conclusions Recent methods for the analysis of binary mixtures, FZM and FD1M, were successfully applied for the analysis of ternary mixtures and compared to the novel FDRM. All were revealed to be specific and sensitive with successful application on pharmaceutical formulations. Validation parameters were evaluated in accordance with the International Conference on Harmonization guidelines. Statistical results were satisfactory, revealing no significant difference regarding accuracy and precision. Highlights Factorized methods enabled the resolution of spectra identical to those of pure drugs present in mixtures. Overlapped spectra of ternary mixtures could be resolved by spectrum subtraction coupled FDRM (SS-FDRM) or by successive application of FZM and FD1M.


Sign in / Sign up

Export Citation Format

Share Document