Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Despite advancements in encryption technology, the issue of covert data transmission remains relevant. Researchers are actively enhancing established methods of concealing information with software tools that utilize mathematical models and developing new data entry methods. Steganographic techniques can be used with cryptographic methods to enhance the confidentiality of information within a container or as a standalone software tool. This article examines the steganographic integrity of concealing confidential information within audio files. The steganographic technique was selected as the phase coding method, which involves substituting the audio element's phase with the secret message's relative phase. An implementation of the chosen method was developed for the experiment. During the experiment, secret data of varying lengths were used to assess the impact of the length of the concealed information on the distortion of the audio file that may be perceptible to the listener. The study also investigated the resilience of the concealed information to noise attacks, allowing for the determination of the threshold of its robustness. The findings provide insight into the reliability of this steganographic method for hiding classified information within media objects.
Słowa kluczowe
Rocznik
Tom
Strony
1005--1011
Opis fizyczny
Bibliogr. 22 poz., rys., tab.
Twórcy
autor
- University of Bielsko-Biala
autor
- National Aviation University
autor
- University of Bielsko-Biala
autor
- National Aviation University
Bibliografia
- [1] Y. Zhang, Y. Liu, Z. Chen, and H. Zhang, "Audio Steganography Based on Phase Coding with Improved Embedding Efficiency," in IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 343-353, Feb. 2019. https://doi.org/10.3724/sp.j.1087.2009.02942
- [2] R. K. Jha and D. Sharma, "Phase Coding Method for Audio Steganography," in Proceedings of the 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1467-1471, Sep. 2018.
- [3] Z. Liu, W. Lu, and H. Zhang, "A New Audio Steganography Method Based on Phase Coding and Key Modulation," in IEEE Access, vol. 7, pp. 35481-35493, 2019. https://doi.org/10.1109/ACCESS.2019.2906775
- [4] R. Li and X. Li, "An Audio Steganography Scheme Based on Phase Coding with High Embedding Capacity," in Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 10-15, Oct. 2019.
- [5] J. Núñez, V. Alarcón-Aquino, and F. J. Gallegos-Funes, "Audio Steganography Using Phase Coding and Echo Hiding," in IEEE Access, vol. 7, pp. 171145-171156, 2019. https://doi.org/10.1109/ACCESS.2019.2959396
- [6] Y. Yuan, S. Zhu, and L. Feng, "High-Capacity Audio Steganography Based on Phase Coding Using Spectrogram Analysis," in IEEE Access, vol. 7, pp. 123469-123479, 2019. https://doi.org/10.1109/ACCESS.2019.2934521
- [7] Y. Yang and S. Jia, "Audio Steganography Using Phase Coding with a Hybrid Modulation Technique," in Proceedings of the 2019 International Conference on Electronics, Communications and Information Technology (ICECIT), pp. 53-57, Dec. 2019.
- [8] R. Li and X. Li, "An Audio Steganography Scheme Based on Phase Coding with High Embedding Capacity," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1969-1981, Sept. 2015. https://doi.org/10.1109/TIFS.2015.2446164
- [9] D. Kahn, "The Codebreakers: The Story of Secret Writing." Macmillan Publishing Company, New York, USA, 1996.
- [10] J. R. Kim, Y. S. Moon, "A robust wavelet-based digital watermark using level-adaptive thresholding," in Proc. of the 6th IEEE Int. Conf. on Image Processing, 1999, p. 202.
- [11] I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," in IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 535-064, Dec. 1997. https://doi.org/10.1109/southc.1996.535064
- [12] L. Von Ahn and N.J. Hopper, “Public-Key Steganography,” in Advances in Cryptology: EurocryptŁ2004 (C. Cachin and J. Camenisch, eds.), vol. 3027 of Lecture Notes in Computer Science, pp. 322-339, Springer, 2004. https://doi.org/10.1007/978-3-540-24676-3_20
- [13] M. Backes, C. Cachin, “Public-Key Steganography with Active Attacks,” IBM Research Zurich Research Laboratory, CH-8803, Ruschlikon, Switzerland, August 26, 2004. https://doi.org/10.1007/978-3-540-30576-7_12
- [14] P. Moulin, J.A. O’Sullivan, “Information-Theoretic Analysis of Information Hiding,” IEEE Transactions on Information Theory, vol. 49, no. 3, pp. 563-593, March 2003. https://doi.org/10.1109/isit.2000.866309
- [15] J.K. Su, J.J. Eggers, B. Girod, “Analysis of Digital Watermarks Subjected to Optimum Linear Filtering and Additive Noise Signal Processing,” Special Issue on Information Theoretic Issues in Digital Watermarking, vol. 81, no. 6, pp. 1141-1175, 2001. https://doi.org/10.1016/s0165-1684(01)00038-x
- [16] F. Petitcolas, R.J. Anderson, M.G. Kuhn, „Information Hiding - A Survey,” Proceedings IEEE, Special Issue on Identification and Protection of Multimedia Information, vol. 87, no. 7, pp. 1069-1078, 1999. https://doi.org/10.1109/5.771065
- [17] F. Hartung, M. Kutter, “Multimedia Watermarking Techniques,” Proceedings IEEE, Special Issue on Identification and Protection of Multimedia Information, vol. 87, no. 7, pp. 1079-1107, 1999. https://doi.org/10.1109/5.771066
- [18] M.D. Swanson, M. Kobayahi, A.H. Tewfik, “Multimedia Data-Embedding and Watermarking Strategies,” Proceedings of IEEE, vol. 86, no. 6, pp. 1064-1087, 1998. https://doi.org/10.1109/5.687830
- [19] T. Basar, G.J. Olsder, Dynanic Noncooperative Game Theory. SIAM Classics in Applied Mathematics, Philadelphia, PA: SIAM, 1999. https://doi.org/10.1137/1026092
- [20] O. Yudin, R. Ziubina, S. Buchyk, O. Bohuslavska, and V. Teliushchenko, “Speaker’s Voice Recognition Methods in High-Level Interference Conditions,” in 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON), Jul. 2019, doi:10.1109/ukrcon.2019.8879937.
- [21] G. Langelaar, R. Lagendijk, J. Biemond, “Robust labeling methods for copy protection of images,” Proc. of SPIE. Storage and Retrieval for Image and Video Databases, 1997, vol. 3022, pp. 298-309. https://doi.org/10.1117/12.263418
- [22] A. Kuznetsov, A. Onikiychuk, O. Peshkova, T. Gancarczyk, K. Warwas, and R. Ziubina, “Direct Spread Spectrum Technology for Data Hiding in Audio,” Sensors, vol. 22, no. 9, p. 3115, Apr. 2022, doi:10.3390/s22093115. https://doi.org/10.3390/s22093115
Uwagi
1. Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
2. Źle przypisany numer DOI. Pod tym DOI znajduje się inny arykuł z numerem 10.24425/ijet.2024.152087
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-83d6f53f-22b4-499d-9c03-8a70c1ae880f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.