Skip to main content
Log in

A high-capacity performance-preserving blind technique for reversible information hiding via MIDI files using delta times

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A new high-capacity information hiding method for embedding secret messages into MIDI files is proposed. The method can preserve the original musical performance of the cover MIDI file. The property of the variable-length quantity, which expresses the magnitude of the delta time before every event in a MIDI file, is utilized for secret bit embedding. The embedding is accomplished by padding the delta times with different numbers of leading constant bytes of 8016 to represent the secret bits. The method is both reversible and blind because the original cover MIDI file can be restored completely from the stego-MIDI file by extracting the embedded data out from the resulting stego-MIDI file without referencing the original cover MIDI file. A capability of hiding a large amount of secret information is achieved since the delta time is a basic parameter that appears before every event in the MIDI file. Good experimental results yielded by the proposed method as well as a comparison of the method with five existing performance-preserving methods from the viewpoints of stego-file quality, payload capacity, and data security show the superiority and feasibility of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799–17823

    Article  Google Scholar 

  2. Adli A, Mirza H, Nakao Z (2008) A watermarking approach for MIDI file based on velocity and duration modulation. In: International conference on knowledge-based and intelligent information and engineering system, Zagreb, Croatia, pp 133–140.

  3. Adli A, Nakao Z (2005) Three steganography algorithms for MIDI files. In: 2005 international conference on machine learning and cybernetics, Guangzhou, China, pp 2401–2404

  4. Ahn JH, Boneh D, Camenisch J, Hohenberger S, Shelat A, Waters B (2015) Computing on authenticated data. J Cryptol 28:351–395

    Article  MathSciNet  Google Scholar 

  5. Biryukov A, Khovratovich D (2009) Related-key cryptanalysis of the full AES-192 and AES-256. In: ASIACRYPT 2009, LNCS, 5912. Springer, Heidelberg, pp 1–18

    Google Scholar 

  6. EL-Latif AAA, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92–102

    Article  Google Scholar 

  7. El-Latif AAA, Abd-El-Atty B, Venegas-Andraca SE, Mazurczyk W (2019) Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Futur Gener Comput Syst 100:893–906

    Article  Google Scholar 

  8. Guérin R (2009) MIDI power!: the comprehensive guide. Thomson Course Technology PTR, Boston

    Google Scholar 

  9. He W, Xiong G, Weng S, Cai Z, Wang Y (2018) Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion, Inf. Sciences 467:784–799

    Google Scholar 

  10. Hsu CT, Wu JL (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8:58–68

    Article  Google Scholar 

  11. Huber DM (2012) The MIDI manual: a practical guide to MIDI in the project studio. Focal Press, Waltham

    Book  Google Scholar 

  12. Ing X, Huang W, Zhang M, Zhao I (2016) A topography structure used in audio steganography. In: 2016 IEEE international conference on acoustics, speech and signal process (ICASSP), Shanghai, China, pp 2134–2138

  13. Inoue D, Matsumoto T (2002) A scheme of standard MIDI files steganography and its evaluation. In: Proceedings of SPIE 4675, security and watermarking of multimedia contents IV. https://doi.org/10.1117/12.465276

  14. John C Steganography V-hiding messages in MIDI songs, The Code Project. Available https://www.codeproject.com/Articles/5390/Steganography-V-Hiding-Messages-in-MIDI-Songs

  15. Katz J, Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton, FL, USA

  16. Lee YL, Tsai WH (2014) A new data hiding method via revision history records on collaborative writing platforms. ACM Trans Multimed Comput Commun Appl 10:20

    Article  Google Scholar 

  17. Li JS, Hsieh CJ, Hung CF (2010) A novel DRM framework for peer-to-peer music content delivery. J Syst Softw 83:1689–1700

    Article  Google Scholar 

  18. Li Q, Yan B, Li H, Chen N (2018) Separable reversible data hiding in encrypted images with improved security and capacity. Multimed Tools Appl 77:30749–30768

    Article  Google Scholar 

  19. Liu YH, Wu DC (2012) Hiding data in MIDI files by using a variable-length property. In 2012 symposium on engineering science & technology, college of electrical engineering and computer science college, Nation Kaohsiung First University of Science and Technology, Kaohsiung, Taiwan, pp 116-121

  20. Lu CS, Liao HY (2003) Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans Multimed 5:161–173

    Article  Google Scholar 

  21. MIDI Manufacturers Association. The Complete MIDI 1.0 Detailed Specification. Available https://www.midi.org/specifications-old/item/the-midi-1-0-specification

  22. Miyata H, Uda R, Okada K (2009) The efficiency method of sanitizable signature scheme for SMF. In: 2009 international conference on advanced information networking and applications AINA’09, Bradford, UK, pp 495–502

  23. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16:354–362

    Article  Google Scholar 

  24. Pramila A, Keskinarkaus A, Seppänen T (2018) Increasing the capturing angle in print-cam robust watermarking. J Syst Softw 135:205–215

    Article  Google Scholar 

  25. Schwenk M MidiEditor. Available https://www.midieditor.org/index.php?category=manual

  26. Shiu H, Tang S, Huang CH, Lee RC, Lei C (2014) A reversible acoustic data hiding method based on analog modulation, Inf. Sciences 273:233–246

    Google Scholar 

  27. Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19:906–910

    Article  Google Scholar 

  28. Tambouratzis G, Raptis S. VEMUS: Virtual European Music School. Available http://www.ilsp.gr/en/infoprojects/meta?view=project&task=show&id=76

  29. Vaske C, Wecksten M, Jarpe E (2017) Velody-A novel method for music steganography. In: 2017 3rd international conference on frontiers of signal process (ICFSP), Paris, France, pp 15–19

  30. Walker J MIDI <-> CSV. Available https://www.fourmilab.ch/webtools/midicsv/

  31. Wu DC, Chen MY (2016) Information hiding in standard MIDI files based on velocity reference values. Int J Netw Secur 18:274–282

    Google Scholar 

  32. Wu DC, Chen MY (2015) Reversible data hiding in standard MIDI files by adjusting delta time values. Multimed Tools Appl 74:9827–9844

    Article  Google Scholar 

  33. Yamamoto K, Iwakiri M (2009) A standard MIDI file steganography based on fluctuation of duration. In: 2009 international conference on availability, reliability and security (ARES), Fukuoka, Japan, pp 774–779

  34. Yoshida T, Miyazaki T, Araki S, Uehara S, Nogami Y (2017) Detecting falsification to MP3 audio signals for conference record using digital watermarking. In: 2017 IEEE international conference on Consumer Electronics – Taiwan (ICCE-TW), Taipei, Taiwan, pp 253–254

Download references

Acknowledgements

This work was supported by the National Science Council, Taiwan under Project No. NSC 100-2221-E-327-029. The basic idea of the proposed method in this paper has been published previously in Liu and Wu [19] as a 6-page short paper (in Chinese), which includes limited technical details and few experimental results using only sixteen MIDI files selected from a data set called VEMUS [28] as the tested files. In this paper, a great deal of improvement has been made, including: (1) enlarging the survey of related studies and adding more references; (2) elaborating the detailed steps of the data embedding algorithm (Algorithm 1); (3) including additionally a data extraction algorithm (Algorithm 2) which is described in detail; (4) using 452 MIDI files which are the whole set of the VEMUS database plus six files collected from the Internet (instead of just the 16 files used in [19] which are only 4% of the 458 files used here) as the tested data in the experiments; (5) providing more experimental results and analyses of them by graphs or diagrams; (6) comparing the results of the proposed method with those of five existing methods; and (7) evaluating the characteristics of the proposed method from various parametric viewpoints such as quality, payload capacity, and data security. Finally, the authors want to express our gratitude to the VEMUS team [28] for allowing us to use their MIDI database in the experiments; without their support of the MIDI files, this study cannot be completed.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Da-Chun Wu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, YH., Wu, DC. A high-capacity performance-preserving blind technique for reversible information hiding via MIDI files using delta times. Multimed Tools Appl 79, 17281–17302 (2020). https://doi.org/10.1007/s11042-019-08526-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08526-9

Keywords

Navigation