A steganographic approach to hide secret data in digital audio based on XOR operands triplet property with high embedding rate and good quality audio

A steganographic approach to hide secret data in digital audio based on XOR operands triplet property with high embedding rate and good quality audio

: In this paper, a unique and transparent data hiding algorithm based on XOR operands triplet (XOT) is proposed. In XOT, an XOR operation applied on any two members of a triplet provides the third member of the same triplet. Taking advantage of the low computational complexity and fascinating properties of the XOR operator, it is possible to embed 4-ary secret digits with negligible changes in the host digital audio. The proposed scheme has been designed to ensure that a minimum number of bit alterations happen in the host digital audio during the data hiding process, which also increases the security of the scheme and provides high quality embedded audio without compromising the statistical property of host audio signals. The scheme confirms that the maximum change is less than 12.5% of the digital audio samples and the average error for the individual digital audio sample is less than 6.25%. The experimental results show that the scheme has a high capacity (88 kbps) without perceptual distortion (objective difference grades are0.1 to 0.31) and provides robustness against intentional or unintentional attack detection. Comparative analysis shows that our method has better performance than data hiding techniques reported recently in terms of imperceptibility, capacity, and security.

___

  • [1] Swanson MD, Zhu B, Tewfik AH. Current state of the art, challenges and future directions for audio watermarking. In: IEEE 1999 Multimedia Computing and Systems Conference; 07–11 June 1999; Florence, Italy. New York, NY, USA: IEEE. pp. 19-24.
  • [2] Bhowal K, Bhattacharyya D, Pal AJ, Kim TH. A GA based audio steganography with enhanced security. Telecommun Syst 2013; 52: 2197-2204.
  • [3] Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding. IBM Syst J 1996; 35: 313-336.
  • [4] Kekre HB, Athawale A, Rao S, Athawale U. Information hiding in audio signals. International Journal of Computer Applications 2010; 7: 14-19.
  • [5] Cox I, Miller M, Bloom J, Fridrich J, Kalker T. Digital Watermarking and Steganography. 2nd ed. San Francisco, CA, USA: Morgan Kaufmann, 2008. pp. 425-490.
  • [6] Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 2006; 10: 781-783.
  • [7] Swanson MD, Zhu B, Tewfik AH, Boney L. Robust audio watermarking using perceptual masking. Signal Process 1998; 66: 337-355.
  • [8] Fallahpour M, Meg´ıas D. Audio watermarking based on Fibonacci numbers. IEEE T Audio Speech 2015; 23: 1273- 1282.
  • [9] Khaldi K, Boudraa A. Audio watermarking via EMD. IEEE T Audio Speech 2013; 21: 675-680.
  • [10] Bassia P, Pitas I, Nikolaidis N. Robust audio watermarking in the time domain. IEEE T Multimedia 2001; 3: 232-241.
  • [11] Baras C, Moreau N, Dymarski P. Controlling the inaudibility and maximizing the robustness in an audio annotation watermarking system. IEEE T Audio Speech 2006; 14: 1772-1782.
  • [12] Lie W, Chang L. Robust and high-quality time-domain audio watermarking based on low frequency amplitude modification. IEEE T Multimedia 2006; 8: 46-59.
  • [13] Xiang S, Kim JH, Huang J. Audio watermarking robust against time-scale modification and MP3 compression. Signal Process 2008; 88: 2372-2387.
  • [14] Mansour M, Tewfik A. Data embedding in audio using time-scale modification. IEEE T Speech Audi P 2005; 13: 432-440.
  • [15] Thiede T, Treurniet WC, Bitto R, Schmidmer C, Sporer T, Beerens JG, Colomes C, Keyhl M, Stoll G, Brandenburg K et al. PEAQ - The ITU standard for objective measurement of perceived audio quality. J Audio Eng Soc 2000; 48: 3-29.
  • [16] Ryd´en T, Stoll G, Sporer T, Keyhl M. Perceptual Evaluation of Audio Quality (PEAQ) Software. Erlangen, Germany: OPTICOM GmbH, 1998.
  • [17] Unoki M, Imabeppu K, Hamada D, Haniu A, Miyauchi R. Embedding limitations with digital-audio watermarking method based on cochlear delay characteristics. Journal of Information Hiding and Multimedia Signal Processing 2011; 2: 1-23.
  • [18] Wang S, Unoki M. Speech watermarking method based on formant tuning. IEICE T Inf Syst 2015; E98-D: 29-37.
  • [19] Quackenbush SR, Barnwell TP 3rd, Clements MA. Objective Measures of Speech Quality. Englewood Cliffs, NJ, USA: Prentice Hall, 1988.
  • [20] Westfeld A, Pfitzmann A. Attacks on steganographic systems. Lect Notes Comp Sci 1999; 1768: 61-76.
  • [21] Ozer H, Avcibas I, Sankur B, Memon N. Steganalysis of audio based on audio quality metrics. In: SPIE 2003 Security and Watermarking of Multimedia Contents Conference; January 2003; Santa Clara, CA, USA. pp. 55-66.
  • [22] Avcibas I. Audio steganalysis with content-independent distortion measures. IEEE Signal Proc Let 2006; 13: 92-95.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK