A randomized approach for data embedding in audio steganography

R. Vijaya Arjunan, Arunaav Alok

Research output: Contribution to journalArticle

Abstract

Exchange of information over the internet or an intranet is inevitable in today’s technological atmosphere. Information hiding using steganographic techniques like LSB Steganography do provide us with a decent defense against hackers, however, recent advancements in computing, internet usage have paved the way for hackers to breach data hiding measures like steganography to a considerable extent. This paper presents a novel approach with a randomized embedding scheme for audio steganography, which absolve the lack of security, and the localized nature of the distortions produced in the stego object. The main advantage of a randomized embedding scheme is that, the data values can be stored at any random position in the audio data set. This protects the stego object against an unauthorized breach by unwanted entities. Although the random number generation increases the overall computational complexity of the entire process, the resultant improvement in security and dataset integrity is certainly worth it. Experimental results indicate that the proposed method has an improved security and dataset integrity check with genuine protection for the hidden information, when compared to a basic embedding scheme like the sequential embedding scheme as referred to in the earlier paper [16]. The scope of earlier work confirms the practical feasibility of implementation of a randomized embedding scheme, which could challenge attackers with impregnable protections for data hiding.

Original languageEnglish
Pages (from-to)6-13
Number of pages8
JournalJournal of Advanced Research in Dynamical and Control Systems
Volume11
Issue number2
Publication statusPublished - 01-01-2019
Externally publishedYes

Fingerprint

Steganography
Random number generation
Internet
Intranets
Computational complexity

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Engineering(all)

Cite this

@article{39247ab7e1cf4403a32a194161d5eee8,
title = "A randomized approach for data embedding in audio steganography",
abstract = "Exchange of information over the internet or an intranet is inevitable in today’s technological atmosphere. Information hiding using steganographic techniques like LSB Steganography do provide us with a decent defense against hackers, however, recent advancements in computing, internet usage have paved the way for hackers to breach data hiding measures like steganography to a considerable extent. This paper presents a novel approach with a randomized embedding scheme for audio steganography, which absolve the lack of security, and the localized nature of the distortions produced in the stego object. The main advantage of a randomized embedding scheme is that, the data values can be stored at any random position in the audio data set. This protects the stego object against an unauthorized breach by unwanted entities. Although the random number generation increases the overall computational complexity of the entire process, the resultant improvement in security and dataset integrity is certainly worth it. Experimental results indicate that the proposed method has an improved security and dataset integrity check with genuine protection for the hidden information, when compared to a basic embedding scheme like the sequential embedding scheme as referred to in the earlier paper [16]. The scope of earlier work confirms the practical feasibility of implementation of a randomized embedding scheme, which could challenge attackers with impregnable protections for data hiding.",
author = "{Vijaya Arjunan}, R. and Arunaav Alok",
year = "2019",
month = "1",
day = "1",
language = "English",
volume = "11",
pages = "6--13",
journal = "Journal of Advanced Research in Dynamical and Control Systems",
issn = "1943-023X",
publisher = "Institute of Advanced Scientific Research",
number = "2",

}

A randomized approach for data embedding in audio steganography. / Vijaya Arjunan, R.; Alok, Arunaav.

In: Journal of Advanced Research in Dynamical and Control Systems, Vol. 11, No. 2, 01.01.2019, p. 6-13.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A randomized approach for data embedding in audio steganography

AU - Vijaya Arjunan, R.

AU - Alok, Arunaav

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Exchange of information over the internet or an intranet is inevitable in today’s technological atmosphere. Information hiding using steganographic techniques like LSB Steganography do provide us with a decent defense against hackers, however, recent advancements in computing, internet usage have paved the way for hackers to breach data hiding measures like steganography to a considerable extent. This paper presents a novel approach with a randomized embedding scheme for audio steganography, which absolve the lack of security, and the localized nature of the distortions produced in the stego object. The main advantage of a randomized embedding scheme is that, the data values can be stored at any random position in the audio data set. This protects the stego object against an unauthorized breach by unwanted entities. Although the random number generation increases the overall computational complexity of the entire process, the resultant improvement in security and dataset integrity is certainly worth it. Experimental results indicate that the proposed method has an improved security and dataset integrity check with genuine protection for the hidden information, when compared to a basic embedding scheme like the sequential embedding scheme as referred to in the earlier paper [16]. The scope of earlier work confirms the practical feasibility of implementation of a randomized embedding scheme, which could challenge attackers with impregnable protections for data hiding.

AB - Exchange of information over the internet or an intranet is inevitable in today’s technological atmosphere. Information hiding using steganographic techniques like LSB Steganography do provide us with a decent defense against hackers, however, recent advancements in computing, internet usage have paved the way for hackers to breach data hiding measures like steganography to a considerable extent. This paper presents a novel approach with a randomized embedding scheme for audio steganography, which absolve the lack of security, and the localized nature of the distortions produced in the stego object. The main advantage of a randomized embedding scheme is that, the data values can be stored at any random position in the audio data set. This protects the stego object against an unauthorized breach by unwanted entities. Although the random number generation increases the overall computational complexity of the entire process, the resultant improvement in security and dataset integrity is certainly worth it. Experimental results indicate that the proposed method has an improved security and dataset integrity check with genuine protection for the hidden information, when compared to a basic embedding scheme like the sequential embedding scheme as referred to in the earlier paper [16]. The scope of earlier work confirms the practical feasibility of implementation of a randomized embedding scheme, which could challenge attackers with impregnable protections for data hiding.

UR - http://www.scopus.com/inward/record.url?scp=85066053506&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85066053506&partnerID=8YFLogxK

M3 - Article

VL - 11

SP - 6

EP - 13

JO - Journal of Advanced Research in Dynamical and Control Systems

JF - Journal of Advanced Research in Dynamical and Control Systems

SN - 1943-023X

IS - 2

ER -