PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Quantization Step Parity-based Steganography for MP3 Audio

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Petitcolas has proposed a steganographic technique called MP3Stego which can hide secret messages in a MP3 audio. This technique is well-known because of its high capacity. However, in rare cases, the normal audio encoding process will be terminated due to the endless loop problem caused by embedding operation. In addition, the statistical undetectability of MP3Stego can be further improved. Inspired by MP3Stego, a new steganographic method for MP3 audio is proposed in this paper. The parity bit of quantization step rather than the parity bit of block size in MP3Stego is employed to embed secret messages. Compared with MP3Stego, the proposed method can avoid the endless loop problem and achieve better imperceptibility and higher security.
Słowa kluczowe
Wydawca
Rocznik
Strony
1--14
Opis fizyczny
Bibliogr. 22 poz., tab., wykr.
Twórcy
autor
autor
autor
  • College of Information Science and Engineering Ningbo University, No. 818 Fenghua Rd., Ningbo, Zhejiang 315211, China, yandiqun@nbu.edu.cn
Bibliografia
  • [1] Petitcolas, F.A.P., Aderson R.J., and Kuhn, M.G.: Information hiding-a survey, Proceedings of IEEE, Special Issue on Protection of Multimedia Content, 87(7), 1062-1078, 1999.
  • [2] Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis, Communication of the ACM, 47(10), 2004, 76-82.
  • [3] Cvejic, N., Seppiinen, T.: Increasing the capacity of LSB-based audio steganography, IEEE Workshop on Multimedia Signal Processing, 2002, 336-338.
  • [4] Kirovski, D., Malvar, H.S.: Spread spectrum watermarking of audio signals, IEEE Transactions on Signal Processing, Special Issue on Data Hiding, 51(4), 2003, 1020-1033.
  • [5] Bender, W., Morimoto, N., and Lu, A.: Techniques for data hiding, IBM Systems Journal, 35(3&4), 1996, 313-336.
  • [6] Solomon, D.: Data compression: The complete reference, Springer Press, 2007.
  • [7] Qiao, L., Nahrstedt, N.: Non-invertible watermarking methods for MPEG video and audio, Multimedia and Security Workshop at ACM Multimedia, 1998, 93-98.
  • [8] Koukopoulos, D., Stamatiou, Y.C.: A compressed domain watermarking algorithm for MPEG Layer 3, Multimedia and Security Workshop at ACM Multimedia, 2001, 7-10.
  • [9] Takagi, K., Sakazawa, S., and Takishima, Y.: Light weight MP3 watermarking method for mobile terminals, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005, 2546-2554.
  • [10] Moghadam, N., Sadeghi,H.: Genetic content-basedMP3 audio watermarking in MDCT domain, Internatinal Enformatika Conference, 2005, 348-351.
  • [11] Koukopoulos, D., Stamatiou, Y.C.: A watermarking scheme for MP3 audio files, International Journal of Signal Processing (IJSP), 2(3), 2005, 206-213.
  • [12] Petitcolas, F.A.P.: MP3Stego, http://www.cl.cam.ac.uk/ fapp2/steganography/mp3stego/index.html, 2002.
  • [13] Achmad, Z.: MP3Stegz, http://sourceforge.net/projects/mp3stegz, 2008.
  • [14] Noch: Stego-Lame, http://sourceforge.net/projects/stego-lame, 2002.
  • [15] Westfeld, A.: Detecting low embedding rates, Proceedings of 5th international Workshop on Information Hiding, LNCS 2578, 2003, 324-339.
  • [16] ISO/IEC 11172-3: Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1.5Mbit/s - Part 3: Audio, International Standard, 1993.
  • [17] Gailly, J., Adler,M.: Zlib, http://zlib.net, 1995.
  • [18] Young, E.: OpenSSL Crypto Library Manual, https://www.openssl.org/docs/crypto/des.html, 1995.
  • [19] ITU-R BS.1387: Methods for objective measurements of perceived audio quality (PEAQ), International Telecommunications Union Radio Communication Assembly, 1998.
  • [20] Lang, A., Dittmann, J.: Transparency and complexity benchmarking of audio watermarking algorithms issues. Proceedings of 8th Workshop on Multimedia and Security, 2006, 190-201.
  • [21] Cachin, C.: An information-theoretic model for steganography, Proceedings of 2nd International Workshop on Information Hiding, LNCS 1525, 1998, 306-318.
  • [22] Cha, S.: Comprehensive survey on distance/similarity measures between probability density functions, International Journal of Mathematical Models and Methods in Applied Sciences, 1(4), 2007, 300-307.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0008-0062
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.