Skip to main content

Audio Steganography Using Differential Phase Encoding

  • Conference paper
Technology Systems and Management

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 145))

Abstract

This paper proposes a novel technique of camouflaging a block of binary data in an audio file for secured covert communication. The phase of the cover signal is used as a medium for steganography. Cover signal may be a song or a speech signal. Instead of modifying the absolute phase values of selected component frequencies, the difference between the phase values of the selected component frequencies and their adjacent frequencies of the cover signal are modified by a small amount to hide data bits. The change is so minute that it hardly alters the phase spectrum and is imperceptible to human auditory system(HAS). This technique provides robustness, noise insensitivity, high data capacity and almost accurate data recovery from the cover signal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gopalan, K., Wenndt, S.J., Adams, S.F., Haddad, D.M.: Audio steganography by amplitude or phase modification. In: Proceedings Security and Watermarking of Multimedia Contents, vol. 5020, pp. 67–76.

    Google Scholar 

  2. Basu, P.N., Bhowmik, T.: On Embedding of Text in Audio – A case of Steganography. In: International Conference on Recent Trends in Information, Telecommunication and Computing (2010)

    Google Scholar 

  3. Gopalan, K., Wenndt, S., Noga, A., Haddad, D., Adams, S.: Cover speech communication via cover speech by tone insertion. In: Proc.2003 IEEE Aerospace Conference, vol. 4, pp. 41647–41653 (2003)

    Google Scholar 

  4. Gopalan, K.: Audio Steganography for Covert Data Transmission by Imperceptible Tone Insertion. In: Proc. The IASTED International Conference on Communication Systems And Applications (CSA 2004), Banff, Canada (2004)

    Google Scholar 

  5. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3/4), 313–336 (1996)

    Article  Google Scholar 

  6. Gopalan, K.: Audio steganography using bit modification. In: Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2003), vol. 2, pp. 421–424 (2003)

    Google Scholar 

  7. Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L.: Robust audio watermarking using perceptual masking. Signal Processing 66, 337–355 (1998)

    Article  MATH  Google Scholar 

  8. Wang, Q.S., Sun, S.H.: A novel algorithm for embedding watermarks into digital audio signals. ACTA Acustica 26(5), 464–467 (2001)

    Google Scholar 

  9. Gopalan, K., Wenndt, S., Haddad, D.: Steganographic method for covert audio communications. U.S. Patent 7 231 271 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Parab, N., Nathan, M., Talele, K.T. (2011). Audio Steganography Using Differential Phase Encoding. In: Shah, K., Lakshmi Gorty, V.R., Phirke, A. (eds) Technology Systems and Management. Communications in Computer and Information Science, vol 145. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20209-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20209-4_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20208-7

  • Online ISBN: 978-3-642-20209-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics