Abstract

The rapid spread in digital data usage in many real life applications have urged new and effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by implementing steganograhy techniques. Novel and versatile audio steganographic methods have been proposed. The goal of steganographic systems is to obtain secure and robust way to conceal high rate of secret data. We focus in this paper on digital audio steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital audio steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. Another contribution of this paper is the provision of a robustness-based classification of steganographic models depending on their occurrence in the embedding process. A survey of major trends of audio steganography applications is also discussed in this paper.

Highlights

  • The growing use of Internet among public masses and the abundant availability of public and private digital data has driven industry professionals and researchers to pay a particular attention to data protection

  • The selected reference method was applied successfully in detecting the presence of hidden messages in high capacity LSBs-based steganography algorithms. It allows the enhancement of the signal discontinuities due to the noise generated by the hidden data [51]

  • A support vector machine (SVM) with RBF kernel [52] is applied to the features to distinguish between cover- and stego-audio signals

Read more

Summary

Introduction

The growing use of Internet among public masses and the abundant availability of public and private digital data has driven industry professionals and researchers to pay a particular attention to data protection. Three main methods are being used: cryptography, watermarking, and steganography. Cryptography techniques are based on rendering the content of a message garbled to unauthorized people. Data are hidden to convey some information about the cover medium such as ownership and copyright. Even though cryptography and watermarking techniques are salient for reinforcing data security, a heightened interest in exploring better or complementary new techniques has been the focus of much ongoing research. The terminology used for steganography blocks was imposed for the first time at the first international conference on information hiding [1]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call