High Data Rate Audio Steganography

  • Sangita RoyEmail author
  • Vivek Kapoor
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1059)


Steganography is an art to hide information without affecting perceptual transparency of digital media files. Media files include audio, video, image, text, software and so on. Hiding information is required for secure transmission of data. In general, media files are known as cover file which wrap the data to be transmitted. The media file must be imperceptible before and after embedding of data. But when we embed data, we do some modification at different bit plane that introduces error or noisy media. Motivation of this work is based on the property of human auditory system (HAS) which is discernible towards any kind of modification or distortion in audio file. Keeping in mind this HAS property, in this work, we concentrate on hiding a large amount of data in a small size cover file considering reduced noise and minimized bit error rate.


Steganography Least Significant Bit(LSB) Audio 


  1. 1.
    Asad M, Gilani J, Khalid A (2011) An enhanced least significant bit modification technique for audio steganography. In: 2011 international conference on computer networks and information technology (ICCNIT), pp 143–147Google Scholar
  2. 2.
    Rana L, Banerjee S (2013) Dual layer randomization in audio steganography using random byte position encoding. Int J Eng Innov Technol 2(8)Google Scholar
  3. 3.
    Gandhi K, Garg G (2012) Modified LSB audio steganography approach. Int J Emerg Technol Adv Eng 3(6):158–161Google Scholar
  4. 4.
    Priyanka B, Vrushabh K, Komal P (2012) Audio steganography using LSB. Int J Electron Commun Soft Comput Sci Eng 90–92Google Scholar
  5. 5.
    Divya SS, Reddy MRM (2012) Hiding text in audio using multiple LSB steganography and provide security using cryptography. Int J Sci Technol Res 1:68–70Google Scholar
  6. 6.
    Kundu N, Kaur A (2017) A secure approach to audio steganography. Int J Eng Trends Technol (IJETT) 44:1–7CrossRefGoogle Scholar
  7. 7.
    Gadicha AB (2011) Audio wave steganography. Int J Soft Comput Eng (IJSCE) 1:174–177Google Scholar
  8. 8.
    Zamani M et al (2009) A secure audio steganography approach. In: International conference for internet technology and secured transactionsGoogle Scholar
  9. 9.
    Sridevi R, Damodaram A, Narasimham S (2009) Efficient method of audio steganography by modified LSB algorithm and strong encryption key with enhanced security. J Theor Appl Inf Technol 771–778Google Scholar
  10. 10.
    Djebbar F, Ayad B, Meraim KA, Hamam H (2012) Comparative study of digital audio steganography techniques. EURASIP J Audio Speech Music ProcessGoogle Scholar
  11. 11.
    Garg P, Sharma M, Agarwal S, Kumar Y (2018) Security on cloud computing using split algorithm along with cryptography and steganography. In: ICICC’18, vol 1, pp 71–79Google Scholar
  12. 12.
    Gupta P, Bhagat J (2018) Image steganography using LSB substitution facilitated by shared password. In: ICICC’18, pp 369–376Google Scholar
  13. 13.
    Roy S, Manasmita M (2011) A novel approach to format based text steganography. In: ICCCS’11, February 12–14Google Scholar
  14. 14.
    Roy S, Parida J, Singh AK, Sairam AS (2012) Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization. In: International conference on computational science engineering and information technology, pp 372–376Google Scholar
  15. 15.
    Ramya Devi R, Pugazhenthi D (2016) Ideal sampling rate to reduce distortion in audio steganography. Procedia Comput Sci 85:418–424CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Thapar Institute of Engineering and TechnologyPatialaIndia

Personalised recommendations