Steganography Between Silence Intervals of Audio in Video Content Using Chaotic Maps
详细信息    查看全文
  • 作者:Muhammad Fahad Khan (1)
    Faisal Baig (2)
    Saira Beg (3)
  • 关键词:Video steganography ; Voice steganography ; Audio silence interval ; Audio analysis ; Chaotic maps ; Signal processing
  • 刊名:Circuits, Systems, and Signal Processing
  • 出版年:2014
  • 出版时间:December 2014
  • 年:2014
  • 卷:33
  • 期:12
  • 页码:3901-3919
  • 全文大小:2,515 KB
  • 参考文献:1. M.A. Ahmed, L.M. Kiah, B.B. Zaidan, A.A. Zaidan, A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Appl. Sci. 10, 59-4 (2010) CrossRef
    2. W. Andreas, J. Wurzer, C. Fabian, E. Piller, Pit stop for an audio steganography algorithm, in / Communications and Multimedia Security, ed. by B. De Decker, J. Dittmann, C. Kraetzer, C. Vielhauer (Springer, Berlin, 2013), pp. 123-34
    3. L. Ballesteros, M. Dora, J.M. Moreno, A real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key. Comput. Electr. Eng. 39(4), 1192-203 (2013) CrossRef
    4. M. Berouti, R. Schwartz, J. Makhoul, Enhancement of speech corrupted by acoustic noise. IEEE Int. Conf. Acoust. Speech Signal Process. 4, 208-11 (1979)
    5. D. Bhattacharyya, P. Dutta, M.O. Balitanas, T. Kim, P. Das, Hiding data in audio signal. Adv. Commun. Netw. Commun. Comput. Inf. Sci. 77, 23-9 (2010)
    6. J.J. Chae, B.S. Manjunath, in / Data hiding in video. Proceedings of the 6th IEEE International Conference on Image Processing (1999), pp. 311-15
    7. S.S. Christal Mary, Improved protection in video steganography used compressed video bit streams. Int. J. Comput. Sci. Eng. 2(3), 764-66 (2010)
    8. I. Cohen, Noise spectrum estimation in adverse environments: improved minima controlled recursive averaging. IEEE Trans. Speech Audio Process. 11(5), 466-75 (2003) CrossRef
    9. R. Darsana, A. Vijayan, Audio steganography using modified LSB and PVD, in / Trends in Network and Communication, ed. by D.C. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, D. Nagamalai (Springer, Berlin, 2011), pp. 11-0 CrossRef
    10. K. Dasgupta, J.K. Mandal, P. DuttaL, Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Priv. Trust Manage. 1(2), 1-1 (2012)
    11. F. Djebbar, B. Ayad, K. Abed-Meraim, H. Hamam, Unified phase and magnitude speech spectra data hiding algorithm. Secur. Commun. Netw. 6(8), 961-71 (2013) CrossRef
    12. S. Doclo, M. Moonen, On the output SNR of the speech-distortion weighted multi-channel Wiener filter. IEEE Signal Process. Lett. 12(12), 809 (2005) CrossRef
    13. P. Dutta, D. Bhattacharyya, T. Kim, Data hiding in audio signal: a review. J. Database Theory Appl. 2(2), 1- (2009)
    14. EBU Tec. 3342, Loudness range, a descriptor to supplement loudness normalization according to EBU technical recommendation R128. Geneva (2010)
    15. Y. Ephraim, D. Malah, Speech enhancement using a minimum-mean square error short-time spectral amplitude estimator. IEEE Trans. Speech Signal Process. 32(6), 1109-121 (1984) CrossRef
    16. K. Fahad, S. Beg, Transference and retrieval of voice message over low signal strength in satellite communication. Innov. Syst. Softw. Eng. 8(4), 293-99 (2012) CrossRef
    17. R. Fahimeh, T. Ma, M. Hempel, D. Peng, H. Sharif, in / An anti-steganographic approach for removing secret information in digital audio data hidden by spread spectrum methods. IEEE International Conference on Communications (ICC) (2013), pp. 2117-122
    18. D.-Y. Fang, L. Chang, in / Data hiding for digital video with phase of motion vector. IEEE International Symposium on Circuits and Systems (ISCAS) (2006), p. 4
    19. J. Fridrich, R. Du, M. Long, in / Stag-analysis of LSB encoding in color images. IEEE International Conference on Multimedia and Expo (2000), pp. 1279-282
    20. T. Hui, J. Liu, S. Li, Improving security of quantization-index-modulation ste
  • 作者单位:Muhammad Fahad Khan (1)
    Faisal Baig (2)
    Saira Beg (3)

    1. Foundation University Islamabad, Rawalpindi Campus, Rawalpindi, Pakistan
    2. Federal Urdu University of Arts, Science and Technology, Islamabad, Pakistan
    3. COMSATS Institute of Information Technology, Islamabad, Pakistan
  • ISSN:1531-5878
文摘
Steganography is the art of hiding data, in such a way that it is undetectable under traffic-pattern analysis and the data hidden is only known to the receiver and the sender. In this paper, new method of text steganography over the silence interval of audio in a video file is presented. In the proposed method, first the audio signal is extracted from the video. After doing audio enhancement, the data on the audio signal are steganographed using new technique and then audio signal is rewritten in video file. To enhance the security level, we apply chaotic maps on arbitrary text. Furthermore, the algorithm in this paper gives a technique?which states that undetectable?stegotext and cover text have same probability distribution and no statistical test can detect the presence of the hidden message. Moreover, hidden message does not affect the transmission rate of video file at all.
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.