Audio steganography in discrete wavelet transform domain

S. Hemalatha, U. Dinesh Acharya, A. Renuka, S. Deepthi, K. Jyothi Upadhya

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)

Abstract

Information security is one of the main factors to be considered when internet is used for secret information transmission. Secret data transmitted over the network must be protected from malicious or conspicuous users. Steganography is one of the foremost and fast developing techniques currently used in network to send the secret data without being distracted and which is a better technique than the earlier commonly used cryptography. In steganography a carrier signal is used for the secure transmission of secret information. The secret information is concealed in the carrier and transmitted. Audio steganography uses audio signals to hide the secret information. In the proposed audio steganography technique, cover audio file is transformed from time domain to wavelet domain using Discrete Wavelet Transform (DWT), leading to secure data hiding. Text message is encrypted using dynamic encryption algorithm. Cipher text is then hidden in wavelet coefficients of cover audio signal. Signal to Noise Ratio (SNR) and Squared Pearson Correlation Coefficient (SPCC) values are computed to judge the quality of the stego audio signal. Results show that stego audio signal is perceptually indistinguishable from the cover audio signal. Stego audio signal is robust against common signal processing attacks such as cropping, filtering, noise addition, resampling etc. Proposed method provides secure and least error data extraction.

Original languageEnglish
Pages (from-to)37544-37549
Number of pages6
JournalInternational Journal of Applied Engineering Research
Volume10
Issue number16
Publication statusPublished - 01-09-2015

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Audio steganography in discrete wavelet transform domain'. Together they form a unique fingerprint.

Cite this