A Robust Data Embedding Method for MPEG Layer III Audio Steganography
نویسندگان
چکیده
A new method of MP3 steganography is proposed with emphasis on increasing the robustness of data embedding based on the MP3 statistical properties, which used Modified Discrete Cosine Transform (MDCT) to compress these properties. In order to achieve this purpose, modification of selected MDCT coefficients is done through MPEG audio compression procedure. In this algorithm, secret message is embedded directly after achievement of MDCT coefficient and before quantization step in process of MP3 encoder. It is feasible to embed some hidden data by substitution of the least significant bit of the MDCT coefficients during compression of MP3 files. The proposed algorithm performance results show considerable robustness against common audio processing attacks, especially MPEG compression with lower computational complexity compared to MP3Stego. The retrieved hidden message obtained from the algorithm has the highest quality against various steganographic attacks and different signal types which shows an excellent imperceptibility for the new algorithm.
منابع مشابه
A Novel Steganography Method Based on Modifying Quantized Spectrum Values of MPEG/Audio Layer III
This paper proposes a novel information-hiding method to hide much more information into audios, compared with software mp3stego. The music files in MP3 format is so popular on Internet due to its characteristically high compression ratio and tone quality. Our proposed method can simultaneously accomplish the information embedding procedure when performing compression of MP3. In the proposed me...
متن کاملپنهان نگاری وفقی براساس پیچیدگی نسبی پیکسلها در تصاویر دوسطح
In recent years steganography has attracted the attention of many researchers. Steganography can be used in media such as still image, audio, and video. Image is one of the most frequently used media. One of the forms of presentation of an image is halftone. In this paper a method is presented which hides data in halftone images. The data hiding process is performed during the halftoning step. ...
متن کاملLocally most-powerful detector for secret key estimation in spread spectrum image steganography
Kernel Fisher discriminant for steganalysis of JPEG hiding methods p. 13 On estimation of secret message length in LSB steganography in spatial domain p. 23 Steganalysis using color wavelet statistics and one-class support vector machines p. 35 Steganalysis using modified pixel comparison and complexity measure p. 46 Performance evaluation of blind steganalysis classifiers p. 58 Searching for t...
متن کاملEigenvalues-based LSB steganalysis
So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016