scholarly journals Studying Audio Capacity as Carrier of Secret Images in Steganographic System

2021 ◽  
Vol 19 (49) ◽  
pp. 53-61
Author(s):  
Ahlam Majead Kadhim ◽  
Huda Muhamed Jawad

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect presence of hidden image. Measures calculations of SNR, SNR segmental, SNR spectral, MSE and correlation show that, audio music cover file (2channales) is the safest uses as arrier with replace the 9 number of LSB without noticeable noise. Bits of secret message can be hiding capacity reach up to 28 % of the total music cover audio size and the three type's measures of SNR are 32, 28 and 31 dB. For speech cover audio the replacing LSB is safely uses at LSB bits number 6, where the hiding capacity is reach up to 37 % of size speech cover audio at 37, 36 and 39 dB for three type's measures of SNR. Correlation of cover samples was did not effected as a result of hiding secret image, where its value is up to 0.99 for all hiding operations.

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


2015 ◽  
Vol 74 (6) ◽  
Author(s):  
Mohsen Bazyar ◽  
Rubita Sudirman

Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol, audio file can be uploaded, downloaded, and transmitted through the internet. This benefit of transmission makes the interest in using audio as cover object in steganography become much stronger. Capacity which is one of the most important properties of audio steganographic methods, evaluates the amount of possible embedding data within the audio file. A new embedding technique of audio steganography is proposed to increase the carrier medium capacity for substitution additional hidden message. With respect to the performed tests, the algorithm succeeds to increase the depth of embedding layer, without having effects on the signal transparency. The maximum number of bits without significant effect on host audio signal for LSB audio steganography is 4 LSBs. The secret message bits are hidden into variable and multiple LSBs layer in this method. Experimental results show that the use of this new technique which apply 7 LSBs for data embedding in comparison the LSB standard algorithm with 4 LSBs improve data hiding capacity of carrier audio by 35% to 55%. It can be observed from listening tests that there is no significant difference between the stego audio acquired from the novel technique and the main signal.  


2021 ◽  
Vol 13 (2) ◽  
pp. 16-34
Author(s):  
Hanlin Liu ◽  
Jingju Liu ◽  
Xuehu Yan ◽  
Pengfei Xue ◽  
Dingwei Tan

This paper proposes an audio steganography method based on run length encoding and integer wavelet transform which can be used to hide secret message in digital audio. The major contribution of the proposed scheme is to propose an audio steganography with high capacity, where the secret information is compressed by run length encoding. In the applicable scenario, the main purpose is to hide as more information as possible in the cover audio files. First, the secret information is chaotic scrambling, then the result of scrambling is run length encoded, and finally, the secret information is embedded into integer wavelet coefficients. The experimental results and comparison with existing technique show that by utilizing the lossless compression of run length encoding and anti-attack of wavelet domain, the proposed method has improved the capacity, good audio quality, and can achieve blind extraction while maintaining imperceptibility and strong robustness.


2012 ◽  
Vol 433-440 ◽  
pp. 5378-5383 ◽  
Author(s):  
Li Xian Wei ◽  
Peng Yang ◽  
Xiao Yuan Yang

Video steganographic algorithm has the advantage of large hiding capacity, but we neglect the security when seek the capacity. In order to balance the two aspects, both to meet the high capacity of improving the load of video carrier and can safely protect the secret information. This paper presents the error-correcting code which can effectively correct burst errors and use it in video steganography. The secret information is hidden in error-correcting code first and then integrated the code with secret information with the video carrier’s DCT coefficients to insert the secret information in video carrier. The experiment results show that: this algorithm not only has great visual and statistical invisibility, also the safety of secret information is more significant. And achieve the objective of effective protect the secret information.


2021 ◽  
Author(s):  
Ratan Kumar Basak ◽  
Ritam Chatterjee ◽  
Paramartha Dutta ◽  
Kousik Dasgupta

Abstract This paper presents a high capacity steganographic approach with secret message validation scheme at the receiver end. The proposed idea develops specifically for animated GIF, the cover media, to conceal secret text messages where Least Significant Digit (LSD) method is employed to embed secret information in the form of ASCII value. To validate the secret information at the receiver end, the secret text is encoded with Secure Hash Algorithm-1(SHA1) which is subsequently embedded in certain pre-defined portion of the cover media. The proposed algorithm is experimented on a large set of colored animated image sequences by varying text messages which produces satisfactory results. The proposed method also maintains good visual perceptibility while securing high embedding capacity


2021 ◽  
Vol 15 ◽  
Author(s):  
Anju Gera ◽  
Vaibhav Vyas

: Researchers for data hiding use various crypting techniques to improve the security of transmission of confidential information through an unsecured channel. In this paper, a new higher recognition least significant bit (LSB) audio data concealment isproposed . This technique is used to embed the hidden audio into cover audio of the same size. The altered speech file appears as the original carrier file after embedding the secret message. This model strengthens hiding capability and audio quality. The strategy outperforms similar studies by enhancing hiding capability up to 30% and preserving stego audio transparency with the SNR value at 72.2 and SDG at 4.8.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Xi-Yan Li ◽  
Xia-Bing Zhou ◽  
Qing-Lei Zhou ◽  
Shi-Jing Han ◽  
Zheng Liu

With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret information in the encrypted image. With the information hiding key, a receiver can extract the embedded data from the hidden image; with the encryption key, the receiver reconstructs the original image. In this paper, we can embed data in the form of random bits or scanned documents. The proposed method takes full advantage of the spatial correlation in the original images to vacate the room for embedding information before image encryption. By jointly using Sudoku and Arnold chaos encryption, the encrypted images retain the vacated room. Before the data hiding phase, the secret information is preprocessed by a halftone, quadtree, and S-BOX transformation. The experimental results prove that the proposed method not only realizes high-capacity reversible data hiding in encrypted images but also reconstructs the original image completely.


2021 ◽  
Vol 48 (4) ◽  
Author(s):  
Zainab N. Sultani ◽  
◽  
Ban N. Dhannoon ◽  

Hiding the presence of data during communication has become a pressing concern in this overly digitalized world as a consequence of illegitimate access. These concerns have led to cryptography and steganography techniques as methods for securing data. This paper presents a modified information hiding technique based on an indirect least significant bit. Instead of saving each bit of the secret message in the least significant bit (LSB) of the cover media, each bit of the secret message is compared to a mask bit in the cover media. The result is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance


Author(s):  
ASHWATHIMESANGLA AO

Visual cryptography is a secret sharing scheme for encrypting a secret image, it is a perfectly secure way that allows secret sharing without any cryptographic computation, which is termed as Visual Cryptography Scheme (VCS). In this paper secret image is divided into shares (printed on transparencies), and each share holds some information. At the receiver this shares are merged to obtain the secret information which is revealed without any complex computation. The proposed algorithm is for color host image, divided into three color planes Red, Green, Blue and merged with secret image which is binarized and divided into shares. The decoding requires aligning the result obtained by merging color host image and shares, so as to obtain the secret image.


Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 133-148
Author(s):  
D. Shahi ◽  
R.S. Vinod Kumar ◽  
V.K. Reshma

Steganography using image interpolation has created a new research area in multimedia communication. A reversible data concealing in HSI and CMY color models using image interpolation is proposed in this paper. The HSI and CMY image models are interpolated using High Capacity Reversible Steganography (CRS) technique. The median plane of both HSI and CMY color models are selected for secret message bit concealing. The secret message bits are concealed in the cover plane by Exclusive OR (XOR) operation. Since the cover image is recovered after secret message bit retrieval, this finds application in military and medical imaging applications. The experimental results of proposed scheme showed very high embedding capacity of about 16 bits in each pixel location of calculated pixel value, good image quality with a surface similarity index measure (SSIM) value 1 and high PSNR. Also, high robustness is achieved on comparing with the existing works.


Sign in / Sign up

Export Citation Format

Share Document