Skip to main content
Log in

Steganography Between Silence Intervals of Audio in Video Content Using Chaotic Maps

  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

Steganography is the art of hiding data, in such a way that it is undetectable under traffic-pattern analysis and the data hidden is only known to the receiver and the sender. In this paper, new method of text steganography over the silence interval of audio in a video file is presented. In the proposed method, first the audio signal is extracted from the video. After doing audio enhancement, the data on the audio signal are steganographed using new technique and then audio signal is rewritten in video file. To enhance the security level, we apply chaotic maps on arbitrary text. Furthermore, the algorithm in this paper gives a technique which states that undetectable stegotext and cover text have same probability distribution and no statistical test can detect the presence of the hidden message. Moreover, hidden message does not affect the transmission rate of video file at all.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. M.A. Ahmed, L.M. Kiah, B.B. Zaidan, A.A. Zaidan, A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Appl. Sci. 10, 59–64 (2010)

    Article  Google Scholar 

  2. W. Andreas, J. Wurzer, C. Fabian, E. Piller, Pit stop for an audio steganography algorithm, in Communications and Multimedia Security, ed. by B. De Decker, J. Dittmann, C. Kraetzer, C. Vielhauer (Springer, Berlin, 2013), pp. 123–134

    Google Scholar 

  3. L. Ballesteros, M. Dora, J.M. Moreno, A real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key. Comput. Electr. Eng. 39(4), 1192–1203 (2013)

    Article  Google Scholar 

  4. M. Berouti, R. Schwartz, J. Makhoul, Enhancement of speech corrupted by acoustic noise. IEEE Int. Conf. Acoust. Speech Signal Process. 4, 208–211 (1979)

    Google Scholar 

  5. D. Bhattacharyya, P. Dutta, M.O. Balitanas, T. Kim, P. Das, Hiding data in audio signal. Adv. Commun. Netw. Commun. Comput. Inf. Sci. 77, 23–29 (2010)

    Google Scholar 

  6. J.J. Chae, B.S. Manjunath, in Data hiding in video. Proceedings of the 6th IEEE International Conference on Image Processing (1999), pp. 311–315

  7. S.S. Christal Mary, Improved protection in video steganography used compressed video bit streams. Int. J. Comput. Sci. Eng. 2(3), 764–766 (2010)

    Google Scholar 

  8. I. Cohen, Noise spectrum estimation in adverse environments: improved minima controlled recursive averaging. IEEE Trans. Speech Audio Process. 11(5), 466–475 (2003)

    Article  Google Scholar 

  9. R. Darsana, A. Vijayan, Audio steganography using modified LSB and PVD, in Trends in Network and Communication, ed. by D.C. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, D. Nagamalai (Springer, Berlin, 2011), pp. 11–20

    Chapter  Google Scholar 

  10. K. Dasgupta, J.K. Mandal, P. DuttaL, Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Priv. Trust Manage. 1(2), 1–11 (2012)

    Google Scholar 

  11. F. Djebbar, B. Ayad, K. Abed-Meraim, H. Hamam, Unified phase and magnitude speech spectra data hiding algorithm. Secur. Commun. Netw. 6(8), 961–971 (2013)

    Article  Google Scholar 

  12. S. Doclo, M. Moonen, On the output SNR of the speech-distortion weighted multi-channel Wiener filter. IEEE Signal Process. Lett. 12(12), 809 (2005)

    Article  Google Scholar 

  13. P. Dutta, D. Bhattacharyya, T. Kim, Data hiding in audio signal: a review. J. Database Theory Appl. 2(2), 1–8 (2009)

    Google Scholar 

  14. EBU Tec. 3342, Loudness range, a descriptor to supplement loudness normalization according to EBU technical recommendation R128. Geneva (2010)

  15. Y. Ephraim, D. Malah, Speech enhancement using a minimum-mean square error short-time spectral amplitude estimator. IEEE Trans. Speech Signal Process. 32(6), 1109–1121 (1984)

    Article  Google Scholar 

  16. K. Fahad, S. Beg, Transference and retrieval of voice message over low signal strength in satellite communication. Innov. Syst. Softw. Eng. 8(4), 293–299 (2012)

    Article  Google Scholar 

  17. R. Fahimeh, T. Ma, M. Hempel, D. Peng, H. Sharif, in An anti-steganographic approach for removing secret information in digital audio data hidden by spread spectrum methods. IEEE International Conference on Communications (ICC) (2013), pp. 2117–2122

  18. D.-Y. Fang, L. Chang, in Data hiding for digital video with phase of motion vector. IEEE International Symposium on Circuits and Systems (ISCAS) (2006), p. 4

  19. J. Fridrich, R. Du, M. Long, in Stag-analysis of LSB encoding in color images. IEEE International Conference on Multimedia and Expo (2000), pp. 1279–1282

  20. T. Hui, J. Liu, S. Li, Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 1–12 (2013)

  21. L. Jin, K. Zhou, H. Tian, in Least-significant-digit steganography in low bit rate speech. 47th IEEE International Conference on Communications (ICC) (2012), pp. 1133–1137

  22. J.C. Judge, Steganography: Past, Present and Future (SANS Institute Info Sec Reading Room, version 1.2f. 2001)

  23. V. Korzhik, G.M. Luna, I. Fedyanin, in The use of wet paper codes with audio watermarking based on echo hiding. IEEE Federated Conference on Computer Science and Information Systems (FedCSIS) (2012), pp. 727–732

  24. J.R. Krenn, Steganography and Steganalysis (2004)

  25. M.L. Mat Kiah, B.B. Zaidan, A.A. Zaidan, A. Mohammed Ahmed, S. Hasan Al-bakri, A review of audio based steganography and digital watermarking. Int. J. Phys. Sci. 6(16), 3837–3850 (2011)

  26. S.K. Mitra, Digital Signal Processing: A Computer Based Approach (McGraw-Hill, New York, 2006)

    Google Scholar 

  27. M. Nutzinger, J. Wurzer, in A novel phase coding technique for steganography in auditive media. IEEE Sixth International Conference on Availability, Reliability and Security (ARES) (2011), pp. 91–98

  28. N. Parab, M. Nathan, K.T. Talele, Audio steganography using differential phase encoding, in Technology Systems and Management, ed. by K. Shah, V.R. Lakshmi Gorty, A. Phirke (Springer, Berlin, 2011), pp. 146–151

    Chapter  Google Scholar 

  29. J. Proakis, D. Manolakis, Digital Signal Processing, Principles, Algorithms and Applications, 2nd edn. (Macmillan Publishing Company, New York, 1992)

    Google Scholar 

  30. A.R. Remya, M.H. Supriya, A. Sreekumar, A novel non-repudiate scheme with voice feature marking, in Computational Intelligence, Cyber Security and Computational Models, ed. by G. Sai Sundara Krishnan, R. Anitha, R.S. Lekshmi, M. Senthil Kumar, A. Bonato, M. Graña (Springer, India, 2014), pp. 183–194

    Chapter  Google Scholar 

  31. V. Sampat, K. Dave, J. Madia, P. Toprani, in A novel video steganography technique using dynamic cover generation. National Conference on Advancement of Technologies—Information Systems & Computer Networks: Proceedings published in International Journal of Computer Applications (2012), pp. 26–30

  32. A.M. Shiddiqi, T. Priambadha, B.A. Pratomo, Echo Data Hiding Steganography and RSA Cryptography on Audio, Media (2012)

  33. R. Siwar, D. Guerchi, S.A. Selouani, H. Hamam, Speech steganography using wavelet and Fourier transforms. EURASIP J. Audio Speech Music Process. 1, 1–14 (2012)

  34. D. Stanescu, M. Stratulat, B. Ciubotaru, D. Chiciudean, R. Cioarga, M. Micea, in Embedding data in video stream using steganography. IEEE 4th International Symposium on Applied Computational Intelligence and Informatics (2007), pp. 241–244

  35. B. Steven, Suppression of acoustic noise in speech using spectral subtraction. IEEE Trans. Acoust. Speech Signal Process. 27(2), 113–120 (1979)

    Article  Google Scholar 

  36. D.T. Sudeep, S. Erandole, in Extended performance comparison of tiling based image compression using wavelet transforms & hybrid wavelet transforms. IEEE Conference on Information & Communication Technologies (ICT) (2013), pp. 1150–1155

  37. N. Wiener, Extrapolation, Interpolation and Smoothing of Stationary Time Series with Engineering Applications (Wiley, New York, 1949)

    MATH  Google Scholar 

  38. N. Wiener, R.E.A.C. Paley, Fourier Transforms in the Complex Domains (American Mathematical Society, Providence, 1934)

    Google Scholar 

  39. Y. Xiang, D. Peng, I. Natgunanathan, W. Zhou, Effective pseudo noise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo-based audio watermarking. IEEE Trans. Multimed. 13(1), 2–13 (2011)

    Article  Google Scholar 

  40. C. Xu, X. Ping, T. Zhang, in Steganography in compressed video stream. Proceedings of the First International Conference on Innovative Computing, Information and Control (2006), pp. 269–272

  41. W.A. Yost, M.C. Killion, Hearing thresholds. Encycl. Acoust. 3, 1545–1554 (1997)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Fahad Khan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, M.F., Baig, F. & Beg, S. Steganography Between Silence Intervals of Audio in Video Content Using Chaotic Maps. Circuits Syst Signal Process 33, 3901–3919 (2014). https://doi.org/10.1007/s00034-014-9830-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-014-9830-5

Keywords

Navigation