Abstract
This paper describes a method for achieving audio steganography through spectrum modification of the cover signal- the signal into which the useful and valuable information is embedded. The embedded data signal is inserted into the regions of the cover signal spectrum where power of frequency content is low. Also the level of the embedded signal is kept low enough inorder to avoid the crossing of thresholds for audio perception. By performing these steps, the data signal shows no trace of being embedded in the cover signal. This method of audio steganography can be used to robust covert communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gopalan, K., Wenndt, S., Noga, A., Haddad, D., Adams, S.: Covert speech communication via cover speech by tone insertion. In: Proc. 2003 IEEE Aerospace Conference, vol. 4, pp. 41647–41653 (2003)
Gopalan, K.: Audio steganography using bit modification. In: Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2003), vol. 2, pp. 421–424 (2003)
Gopalan, K.: Audio Steganography for Covert Data Transmission by Imperceptible Tone Insertion. In: Proc. The IASTED International Conference on Communication Systems And Applications (CSA 2004), Banff, Canada (2004)
Al-Najjar, A.J., Alvi, A.K., Idrees, S.U., Al-Manea, A.M.: Hiding encrypted speech using steganography. In: Proceedings of the 7th Conference on 7th WSEAS International Conference on Multimedia, Internet & Video Technologies, vol. 7, pp. 275–281 (2007)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3/4), 313–336 (1996)
Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia data embedding and watermarking technologies. Proc. IEEE 86, 1064–1087 (1998)
Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. Selected Areas in Communications 16(4), 474–481 (1998)
Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L.: Robust audio watermarking using perceptual masking. Signal Processing 66, 337–355 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nathan, M., Parab, N., Talele, K.T. (2011). Audio Steganography Using Spectrum Manipulation. In: Shah, K., Lakshmi Gorty, V.R., Phirke, A. (eds) Technology Systems and Management. Communications in Computer and Information Science, vol 145. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20209-4_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-20209-4_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20208-7
Online ISBN: 978-3-642-20209-4
eBook Packages: Computer ScienceComputer Science (R0)