45 research outputs found

    Steganography integration into a low-bit rate speech codec

    Get PDF
    Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile communications, so that steganography in low bit-rate audio streams would have broad applications in practice. In this paper, the authors propose a new algorithm for steganography in low bit-rate VoIP audio streams by integrating information hiding into the process of speech encoding. The proposed algorithm performs data embedding while pitch period prediction is conducted during low bit-rate speech encoding, thus maintaining synchronization between information hiding and speech encoding. The steganography algorithm can achieve high quality of speech and prevent detection of steganalysis, but also has great compatibility with a standard low bit-rate speech codec without causing further delay by data embedding and extraction. Testing shows, with the proposed algorithm, the data embedding rate of the secret message can attain 4 bits / frame (133.3 bits / second)

    Audio Steganography Using High Frequency Noise Introduction

    Get PDF
    This paper presents a new method of audio steganography that allows character data to be encoded into audio in a way that is indiscernible to prying third-parties. Unlike typical methods of audio steganography that propose storage by modifying the least significant bits or the phase of the audio data, this approach makes use of frequency ranges that are undetectable to the human ear. The method proposed in this paper provides for a reasonably high-bandwidth and is resistant to common detection and prevention techniques

    RANCANG BANGUN APLIKASI UNTUK PENYISIPAN TEXT DAN FILE KE DALAM IMAGE DAN AUDIO FILE DENGAN METODE LEAST SIGNIFICANT BIT (LSB)

    Get PDF
    Steganography is a technique to secure the communications of data or message. Message is secured by embedding bits message into bits carrier file. A method to embed bits message into bits carrier is Least Significant Bit (LSB) Method that embeds bits message on small bits value of carrier file. Generally, this report discussed about designing of steganography applications that modified 2 bits of carrier file using LSB Method. Bitmap file (*.bmp) and wave file (*.wav) as carrier files recommendation for this application. There were two types message to be embedded to the carrier as text and file. This application was developed with Object Oriented Programming approach (Java). As result, this application was successfully to embed and retrieve messages as text and files without modifying carrier capacity before or after message embedded to the carrier, avarage quality 50.316 dB (bitmap) and 53.507 dB (wave), but it was still unrobust from a visual attacking. Key words: Carrier file, Embedding, Least Significant Bit (LSB), Object Oriented Programming, Retrieving, Steganography, Stegofile

    EFFECTIVE ROBUST PATCHWORK METHOD TO THE VULNERABLE ATTACK FOR DIGITAL AUDIO WATERMARKING

    Get PDF
    This paper presents patchwork based digital audio watermarking. The advanced growth in transmission of digital data has resulted in a corresponding elevation in the need for copyright protection of signal. Cryptography and steganography are used for the content protection but do not completely solve the copyright issue. Watermarking is a method to protect and identify the digital data while maintaining the quality of the host media, it permits various types of watermarks to be hidden in audio signal e.g. image, audio and video. This paper limits on image embedding technique using patchwork-based method. In patchwork based method average of all segments of approximate coefficients is calculated for embedding watermark into sound signal. The experimental results shows that proposed method achieves imperceptibility for audio signal as watermarked audio signal is inaudible after embedding watermark and robustness of watermark against different signal processing attacks with higher PSNR. The resulting audio is robust to attacks and exhibits good quality in term of peak signal to noise ratio. The simulation results show the effectiveness of the proposed system

    Steganography Integration Into a Low-Bit Rate Speech Codec

    Full text link

    UNDERWATER COMMUNICATIONS WITH ACOUSTIC STEGANOGRAPHY: RECOVERY ANALYSIS AND MODELING

    Get PDF
    In the modern warfare environment, communication is a cornerstone of combat competence. However, the increasing threat of communications-denied environments highlights the need for communications systems with low probability of intercept and detection. This is doubly true in the subsurface environment, where communications and sonar systems can reveal the tactical location of platforms and capabilities, subverting their covert mission set. A steganographic communication scheme that leverages existing technologies and unexpected data carriers is a feasible means of increasing assurance of communications, even in denied environments. This research works toward a covert communication system by determining and comparing novel symbol recovery schemes to extract data from a signal transmitted under a steganographic technique and interfered with by a simulated underwater acoustic channel. We apply techniques for reliably extracting imperceptible information from unremarkable acoustic events robust to the variability of the hostile operating environment. The system is evaluated based on performance metrics, such as transmission rate and bit error rate, and we show that our scheme is sufficient to conduct covert communications through acoustic transmissions, though we do not solve the problems of synchronization or equalization.Lieutenant, United States NavyApproved for public release. Distribution is unlimited

    Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)

    Full text link
    corecore