An Audio Steganography Technique to Maximize Data Hiding Capacity along with Least Modification of Host

  • Lukman Bin Ab. RahimEmail author
  • Shiladitya Bhattacharjee
  • Izzatdin B A Aziz
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 285)


Steganography is the concept of concealing information within a cover media. In this paper, we present a technique to hide the text information within an audio file using a higher Least Significant Bit (LSB) layer. To hide text information within the audio file, we propose an approach that uses two LSB layers of the host file. The data hiding is done by minimum modification to the host file, which implies that changes of host audio file do not impact the Human Auditory System (HAS). Hiding of dual bit in the 4th and 1st LSB layer improves the hiding capacity of the host file. The proposed approach is also robust with respect to the errors, occurred during embedding of text in the audio files, as minimum modifications are performed on the original host audio [1].


Higher LSB layer HAS Text hiding Host audio Robust Embedding of text 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Djebbar, B. Ayad, K. Meraim, H. Hamam, Comparative study of digital audio steganography techniques, EURASIP Journal on Audio, Speech, and Music Processing, Springer International Publishing AG, Volume 2012, October 2012, Pages 1-16.Google Scholar
  2. 2.
    K. Bhowal, D. Bhattacharyya, A. J. Pal, T. H. Kim, A GA based audio steganography with enhanced security, Telecommunication Systems, Springer US, Volume 52, April 2013, Pages 2197-2204.Google Scholar
  3. 3.
    N. Samphaiboon, Steganography via running short text messages, Multimedia Tools and Applications, Springer US, Volume 52, April 2011, Pages 569-596.Google Scholar
  4. 4.
    Li. Z. Qin, X. Zhang, X. Wang, Auditory Cryptography Security Algorithm With Audio Shelters, Procedia Engineering, Volume 15, 2011, Pages 2695-2699.Google Scholar
  5. 5.
    S. Xu, P. Zhang, P. Wang, H. Yang, Performance Analysis of Data Hiding in MPEG-4 AAC Audio, Tsinghua Science & Technology, Volume 14, February 2009, Pages 55-61.Google Scholar
  6. 6.
    K. Sakthisudhan, P. Prabhu, P. Thangaraj, C. M. Marimuthu, Dual Steganography Approach for Secure Data Communication, Procedia Engineering, Volume 38, 2012, Pages 412-417.Google Scholar
  7. 7.
    R. Petrovic, D. T. Yang, Audio watermarking in compressed domain, Telecommunication in Modern Satellite, Cable, and Broadcasting Services, TELSIKS ‘09. 9th International Conference on, October 2009, Pages 395-401.Google Scholar
  8. 8.
    K. Ren, H. Li, Large capacity digital audio watermarking algorithm based on DWT and DCT, Mechatronic Science, Electric Engineering and Computer (MEC), 2011 International Conference on , August 2011, Pages 1765-1768.Google Scholar
  9. 9.
    M. B. Begum, Y. Venkataramani, LSB Based Audio Steganography Based On Text Compression, Procedia Engineering, Volume 30, 2012, Pages 703-710.Google Scholar
  10. 10.
    Yang, X. Wang, T. Ma, A robust digital audio watermarking using higher-order statistics, AEU - International Journal of Electronics and Communications, Volume 65, June 2011, Pages 560-568.Google Scholar
  11. 11.
    Yan, R. Wang, X. Yu, J. Zhu, Steganography for MP3 audio by exploiting the rule of window switching, Computers & Security, Volume 31, July 2012, Pages 704-716.Google Scholar
  12. 12.
    Satir, H. Isik, A compression-based text steganography method, Journal of Systems and Software, Volume 85, October 2012, Pages 2385-2394.Google Scholar
  13. 13.
    M. K. Khan, Research advances in data hiding for multimedia security, Multimedia Tools and Applications, Springer US, Volume 52, April 2011, Pages 257-261.Google Scholar
  14. 14.
    W. Zeng, R. Hu, H. Ai, Audio steganalysis of spread spectrum information hiding based on statistical moment and distance metric, Multimedia Tools and Applications, Springer US,Volume-55, December 2012, Pages 525-556.Google Scholar
  15. 15.
    X.Y. Wang, P. P. Niu, H. Y. Yang, A robust digital audio watermarking based on statistics characteristics, Pattern Recognition, Volume 42, November 2009, Pages 3057-3064Google Scholar
  16. 16.
    A. Cheddad, J. Condell, K. Curran, P. M. Kevitt, Digital image steganography: Survey and analysis of current methods, Signal Processing, Volume 90, March 2010, Pages 727-752.Google Scholar
  17. 17.
    O. Cetin, A. T. Ozcerit, A new steganography algorithm based on color histograms for data embedding into raw video streams, Computers & Security, Volume 28, October 2009, Pages 670-682.Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2014

Authors and Affiliations

  • Lukman Bin Ab. Rahim
    • 1
    Email author
  • Shiladitya Bhattacharjee
    • 1
  • Izzatdin B A Aziz
    • 1
  1. 1.Universiti Teknologi PetronasBandar Seri IskandarMalaysia

Personalised recommendations