LSB-based Audio Steganographical Framework for Securing Data in Transit
Asian Journal of Research in Computer Science,
The benefits that individuals and organizations derive from the digital era comes with its own challenges. Globally, data has become one of the greatest assets for decision making and operational improvements among businesses, government agencies and even individuals. Data on its own and at its source does not make so much contribution to business processes. Data is transmitted from one location to another towards attainment of its goal as a critical resource in decision making. However, data including sensitive or confidential ones are transmitted via public channels such as the Internet. The data so transmitted via the Internet is vulnerable to interception and unauthorized manipulation. This demands that data in transit is protected from the prying eyes of the malicious internet users. One of such strategies for transmitting data via public channels such as the Internet without attracting attention from intruders is steganography. In this paper, the least significant bit algorithm was used with an audio file for hiding data in transit. The algorithm used in this research proves to be one of the simplest ways of securing data using audio steganography. The method employed the LSB technique by using audio files as the stego object for the final implementation in the Java programming language. The experimental results proved to be one of the best methods of implementing steganography. The accuracy of the stego objects shows high quality, and similarity scores with an improved processing time.
- least significant bit
How to Cite
[Accessed 15 December 2021].
Dickson B. The Daily Swig: Cybersecurity news and views, PortSwigger, 06 February; 2020. [Online].
[Accessed 17 December 2021].
Ibrahim iTMaDS. Effect of Communication Channel on Transferred Data," Diyala Journal of Pure Science. October 2013;9(4):75-92.
Qadir MA, Ahmad I. Digital text watermarking: secure content delivery and data hiding in digital documents. in Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology; 2005.
Mangal JMaS. An Overview of Image Steganography using LSB Technique. IJCA Proceedings on National Conference on Advances in Computer Science and Applications (NCACSA 2012), 2012;3: 10-13.
Honeyman NPP. Detecting Steganographic Content on the Internet. University of Michigan. Michigan; 2001.
Alekhya Orugonda S. Hiding the Military Secret Message by Reversible Data Hiding," International Journal of Engineering adn Innovative Technology(IJEIT). 2013;3(4):165-168.
Shin-Yan Chiou TJWJMC. Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature. Security and Communication Networks. 2017:1-16.
Raja CRCKRVaLMPKB. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images. in 2005 3rd International Conference on Intelligent Sensing and Information Processing, Bangalore; 2005.
Ayush Singhal NSMSB. An Advanced Approach for Implementation of Audio Steganography. International Journal For Science, Technology and Engineering. 2015;1(12): 66-71.
Tanwar R, Bisla M. Audio Steganography. in 2014 International Conference on Reliability Optimization and Information Technology (ICROIT); 2014.
Kazem Qazanfari RS. A new steganography method which preserves histogram: Generalization of LSB++,," Information Sciences. 2014;277:90-101.
Baritha Begum YVM. LSB Based Steganography based on Text Compression," Procedia Engineering. 2012;30:703-712.
Wiseman Y. Protecting Seaport Communication System by Steganography Based Procedures. International Journal of Security and Its Applications. 2014;8(4): 25-36.
Jadhav SCaA. Steganography an Art of Hiding Data. International Journal on Computer Science and Engineering (IJCSE); 2009.
Johnson JS NF. Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith D. (eds) Information Hiding.IH 1998. Lecture Notes in Computer Science, vol 1525, Berlin: Springer; 1998.
Jajodia NFJaS. Exploring steganography: Seeing the unseen. Computer. 1998;31(2): 26-34.
Provos PHN. Detecting Steganographic Content on the Internet. CITI Technical Report. Michigan; 2021:01-11.
Anderson R. Analysis of LSB Based Image Steganography Techniques. IEEE. 1998; 474-481.
Cachin C. "An Information-Theorectical Model for Steganography," in In Proceeding of 2nd Information Hiding Workshop; 1998.
Katzenbeisser FPS. Defining security in Steganographic Systems. in Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV; 2002.
Petitcolas RJAaMGKFAP. Information hiding-a survey. in In Proceedings of the IEEE; 1999.
Gary CH, Kessler C. Chapter 2- An Overview of Steganography," in Advances in Computers, Marvin V. Zelkowitz, Ed., Elsevier. 2011;83: 51-107.
Miroslav Goljan JFTH. New blind steganalysis and its implications. in Proceedings, Security, Steganography, and Watermarking of Multimedia Contents VIII;, San Jose. 2006;6072.
Parahar M. Difference between Steganography and Cryptography," Tutorial Point, 15 April; 2020. [Online].
[Accessed 16 December 2021].
Gasser M. Building A secure Computer Systems, USA: Van Nostrand Reinhold Co; 1998.
SLNFMaLOJT. Brassil. Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications. 1995;13(8):1495-1504.
Techopedia. Least Significant Bit(LSB). Janalta Interactive; 2021.
[Accessed11 December 2021].
Abood MH. An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms. in 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Baghdad, Iraq; 2017.
Ms.Shridevishetti MS. A Secure Image Steganography based on RSA Algorithm and Hash-LSB Technique," International Journal of Engineering Research & Technology (Ijert) Icesmart. 2015;3(19): 1-7.
BR al. Hash Based Least Significant Bit Technique For Video Steganography," International Journal of Engineering Research and Applications. 2014;4(1.3): 44-49.
Peterson DC. IOWA State University, Digital Repository," IOWA State University, 01 January; 2012.
[Accessed 11 December 2021].
ADSBaSD, Vanitha T. A Review on Steganography-Least Significant Bit Algorithm and Discrete Wavelet Transform Algorithm. International Journal of Innovative Research in Computer and Communication Engineering. 2014;2(5): 89-95.
Tiwari SaRK. Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization," International Journal of Computer Science and Network Security. 2008;8(1): 228-233.
Vaishali JACaD. Image steganographic techniques with improved embedding capacity and robustness. in 2011 International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, India; 2011.
Gupta PKSaDRK. A Review of Digital Image Steganography. Journal of Pure and Applied Science & Technology. 2012;2(1):98-106.
Project M. Image Steganography Techniques," M4JPEG Project; 2018. [Online].
[Accessed 17 December 2021].
Bhat VPaP. Transform Domain Techniques for Image Staganography. International journal of innovative research in electrical, electronics, instrumentation and control engineering. 2015;3(1):65-58.
Watson A, Image Compression Using the Discrete Cosine Transform. Mathematical Journal, 1994;4(1):81-88.
Kumar VKaD. Performance evaluation of DWT based image steganography," in 2010 IEEE 2nd International Advance Computing Conference (IACC), Patiala, India; 2010.
GEG, Tzanetakis CP. Audio Analysis using the Discrete Wavelet Transform. Semantic Scholar, 2001;1-6.
Marshall D. Dave Marshall Multimedia. 10 April 2001. [Online].
[Accessed 17 December 2021].
Shanthakumari BSaR. "Efficient Adaptive Steganography for Color Images Based on LSBMR Algorithm. ICTACT Journal on Image and Video Processing. 2012;02(03):387-392.
Arora SK. Audio Steganography : The art of hiding secrets within earshot(part 2 of 2)," 17 June; 2018. [Online].
[Accessed 1 August 2021].
Ramkumar M, Akansu AN. "Some design issues for robust data hiding systems," in Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020); 1999.
Abstract View: 71 times
PDF Download: 35 times