Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL)

Part of the Advances in Intelligent Systems and Computing book series (volume 167)

Abstract

Embedding message into audio signal especially within songs without compromising its audible quality is one of the growing research areas. The techniques are used for different purposes in practical life. Various methods are evolved for hiding information into audio signals and quality is maintained only by calculating the acceptance ratio of embedding data using human perception. Therefore, an efficient way of finding the limit of embedding information in song signal is one of the challenging issues. In this paper, using modulation of channel capacity in modified form is used to determine the embedded data and song signal trade-off ratio for getting future guideline embedding information in song signal with correlation among embedded data is fabricated. A comparative study has been made with similar existing techniques for performance analysis and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

Keywords

Embedding secret message in quality song linear coding song authentication tolerance level of embedding message encoding lower frequencies 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mondal, U.K., Mandal, J.K.: A Practical Approach of Embedding Secret Key to Authenticate Tagore Songs (ESKATS). In: Wireless Information Networks & Business Information System Proceedings (WINBIS 2010), vol. 6(1), pp. 67–74. Rural Nepal Technical Academy (Pvt.) Ltd, Nepal (2010) ISSN 2091-0266Google Scholar
  2. 2.
    Mondal, U.K., Mandal, J.K.: A Novel Technique to Protect Piracy of Quality Songs through Amplitude Manipulation (PPAM). In: International Symposium on Electronic System Design (ISED 2010), pp. 246–250 (2010) ISBN 978-0-7695-4294-2 Google Scholar
  3. 3.
    Mondal, U.K., Mandal, J.K.: A Fourier Transform Based Authentication of Audio Signals through Alternation of Coefficients of Harmonics (FTAT). In: Nagamalai, D. (ed.) PDCTA 2011. CCIS, vol. 203, pp. 76–85. Springer, Heidelberg (2011) ISSN 1865-0929, ISBN 978-3-642-24036-2Google Scholar
  4. 4.
    Xiaoxiao, D., Mark, F., Bocko, Z.I.: Data Hiding Via Phase Manipulation of Audio Signals. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2004), vol. 5, pp. 377–380 (2004) ISBN 0-7803-8484-9 Google Scholar
  5. 5.
    Erten, G., Salam, F.: Voice Output Extraction by Signal Separation. In: ISCAS 1998, vol. 3, pp. 5–8 (1998) ISBN 07803-4455-3Google Scholar
  6. 6.
    Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000) ISBN 978-1-58053-035-4Google Scholar
  7. 7.
    Arnold, M.: Audio watermarking: Features, applications and algorithms. In: IEEE International Conference on Multimedia and Expo., New York, NY, vol. 2, pp. 1013–1016 (2000)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Dept. of CSE & ITCollege of Engg. & ManagementKolaghatIndia
  2. 2.Dept. of CSEUniversity of KalyaniKalyaniIndia

Personalised recommendations