Advertisement

A Comparative Study of Methods for Hiding Large Size Audio File in Smaller Image Carriers

  • Abraham Ayegba Alfa
  • Kharimah Bimbola Ahmed
  • Sanjay MisraEmail author
  • Adewole Adewumi
  • Ravin Ahuja
  • Foluso Ayeni
  • Robertas Damasevicius
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 985)

Abstract

The last 13 years or more has been characterized by unmatched progress in multimedia content and undercover communication. Sound file is chief among mode of transmitting classified and confidential information across the cyberspace and channels. Steganography is a traditional solution to address the problems of data security on public channels and transmitters. In general, the practice of image steganography favored smaller size secret message transmission in larger size carrier approach. However, there is a major of challenge of concealing classified large size audio data inside a smaller image cover with lesser distortions and quality retention of the cover medium and original message respectively. To achieve these, the audio file is compressed to appropriate size before embedding it into two distinct image files (grayscale and RGB color) at binary level using both Most Significant Bits (MSBs) and Least Significant Bits (LSBs) methods. This paper established that the most suitable of MSBs and LSBs in terms of robustness, payload size, and retention of perception transparency of media understudied.

Keywords

Steganography LSBs MSBs Grayscale RGB colour Binary level Hiding Carrier Imperceptibility Audio Image 

Notes

Acknowledgments

We acknowledge the support and sponsorship provided by Covenant University through the Centre for Research, Innovation, and Discovery (CUCRID).

References

  1. 1.
    Shelke, F.N., Dongre, A.A., Soni, P.N.: Comparison of different techniques for steganography in images. Int. J. Appl. Innov. Eng. Manag. 3(2), 171–176 (2014)Google Scholar
  2. 2.
    Al-Hasainy, M.A.F., Al-Sewadi, H.A.A.: Full capacity image steganography using seven-segment display pattern as secret key. J. Comput. Sci. 14(6), 753–763 (2018)CrossRefGoogle Scholar
  3. 3.
    Singh, P.: A comparative study of audio steganography techniques. Int. Res. J. Eng. Technol. 03(04), 580–585 (2016)Google Scholar
  4. 4.
    Qui, H.: An efficient data protection architecture based on fragmentation and encryption. Unpublished Ph.D. thesis, Institute of Sciences and Technologies, Paris Institute of Technology, Paris, France, pp. 1–136 (2017)Google Scholar
  5. 5.
    Krati, V., Pal, B.L.: A proposed method in image steganography to improve image quality with LSB technique. Int. J. Adv. Res. Comput. Commun. Eng. 3(1), 5246–5251 (2014)Google Scholar
  6. 6.
    Jeevan, K.M., Krishnakumar, S.: An image steganography method using pseudo hexagonal image. Int. J. Pure Appl. Math. 118(18), 2729–2735 (2018)Google Scholar
  7. 7.
    Kaul, N., Bajaj, N.: Audio in image steganography based on wavelet transform. Int. J. Comput. Appl. 79(3), 7–10 (2013)Google Scholar
  8. 8.
    Jung, K.: Comparative histogram analysis of LSB-based image steganography. WSEAS Trans. Syst. Control 13, 103–112 (2018)Google Scholar
  9. 9.
    Hanzlik, P.: Steganograhy in reed-solomon codes. Unpublished M.Sc. thesis, Department of Business Administration, Lulea University of Technology, Scandinavia, Sweden, pp. 1–68 (2011)Google Scholar
  10. 10.
    Arya, A., Soni, S.: A literature review on various recent steganography techniques. Int. J. Future Revolut. Comput. Sci. Commun. Eng. 4(1), 143–149 (2018)Google Scholar
  11. 11.
    Dilawar, A.: Image steganography: for hiding audio messages within grayscale image using LSB, DCT and AES algorithm. Unpublished M.Tech thesis, Department of Computer Science and Software Engineering, International Islamic University, Islamabad, Pakistan pp. 1–80 (2014)Google Scholar
  12. 12.
    Kumar, N.M., Kumar, M.P., Rao, M.S.: Data hiding using image steganography. Int. J. Adv. Res. Dev. 3(2), 53–56 (2018)Google Scholar
  13. 13.
    Ashita, K., Smitha, V.P.: Randomized steganography in skin tone images. Int. J. Comput. Sci. Eng. Inf. Technol. 8(2–3), 1–8 (2018)Google Scholar
  14. 14.
    Devi, K.J.: A secure image steganography using LSB technique and pseudo-random encoding technique. Unpublished B.Tech thesis, Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, pp. 1–40 (2013)Google Scholar
  15. 15.
    Badescu, I., Dumitrescu, C.: Steganography in image using discrete wavelet transformation. In: Advanced in Mathematical Models and Production Systems in Engineering, vol. 1, no. 1, pp. 69–72 (2013)Google Scholar
  16. 16.
    Al-Asadi, S.A.: Image steganography based on variable sized segments. J. Eng. Appl. Sci. 13(1), 2282–2287 (2018)Google Scholar
  17. 17.
    Jayaram, P., Ranganatha, H.R., Anupama, H.S.: Information hiding using audio steganography – a survey. Int. J. Multimed. Its Appl. 3(3), 86–96 (2011)CrossRefGoogle Scholar
  18. 18.
    Goel, S., Rana, A., Kaur, M.: Comparison of image steganography techniques. Glob. J. Comput. Sci. Technol. 13(4), 7–14 (2013)Google Scholar
  19. 19.
    Lahiri, S.: Audio steganography using echo hiding in wavelet domain with pseudorandom sequence. Int. J. Comput. Appl. 140(2), 16–19 (2016)Google Scholar
  20. 20.
    Baluja, D.: Hiding images in plain sight: deep steganography. In: 31st Conference on Neural Information Processing Systems, Long Beach, USA, pp. 1–11 (2017)Google Scholar
  21. 21.
    Temiatse, O.S., Misra, S., Dhawale, C., Ahuja, R., Matthews, V.: Image enhancement of lemon grasses using image processing techniques (histogram equalization). In: Panda, B., Sharma, S., Roy, N.R. (eds.) REDSET 2017. CCIS, vol. 799, pp. 298–308. Springer, Singapore (2018).  https://doi.org/10.1007/978-981-10-8527-7_24CrossRefGoogle Scholar
  22. 22.
    Dhawale, C.A., Misra, S., Thakur, S., Jambhekar, N.D.: Analysis of nutritional deficiency in citrus species tree leaf using image processing. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2248–2252. IEEE, September 2016Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Abraham Ayegba Alfa
    • 1
  • Kharimah Bimbola Ahmed
    • 1
  • Sanjay Misra
    • 2
    Email author
  • Adewole Adewumi
    • 2
  • Ravin Ahuja
    • 3
  • Foluso Ayeni
    • 4
  • Robertas Damasevicius
    • 5
  1. 1.Kogi State College of EducationAnkpaNigeria
  2. 2.Covenant UniversityOtaNigeria
  3. 3.Shri Vishwakarma Skill UniversityGurgaonIndia
  4. 4.Southern UniversityBaton RougeUSA
  5. 5.Kanus University of TechnologyKaunasLithuania

Personalised recommendations