Intelligent Silhouette Wave Steganography (I-SiWaS)

V.G. Jagtap, S.S. Pande, Dr. Parag Kulkarni

Abstract


In the field of Data Security, Steganography plays an important role. The steganography is basically used to hide the data in file. The audio steganography hides data in the mono or stereo channel of carrier file. There are different types of audio stegaography approaches. LSB Wave Steganography is one of the types of steganography, in which LSB bits of carrier wave file are used to hide data. In standard LSB wave steganography, number of bits under consideration decides the nodes to hide data. But the major problems with this approach are 1.security of hidden data depends on selection of number of bits, 2.also it adds noise in carrier file. Hence there is need for an intelligent and efficient method to find appropriate nodes to hide data. This paper proposes I-SiWaS: a method which intelligently finds noisy nodes to hide data. This in turn removes dependency on selection of number of bits, improves security and reduces the noise. I-SiWaS uses silhouette clustering and Vivaldi for intelligent noisy nodes selection. The results show that, I-SiWaS do not affect the size of carrier wave file and reduces the distortion significantly.

Keywords


Steganography, Silhouette Cluster, Vivaldi

References


Tag Vaughan, Multimedia – Making it work, 5th edition, TMGH, 2004.

Los Alamos Nat. Lab., NM, “Digital steganography: hiding data within data”, Internet Computing, IEEE, May/Jun 2001, Volume: 5, Issue: 3.

W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol. 35, 1996.

I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for images, audio and video,” in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, vol. 111, pp. 243–246.

C. Yeh, C. Kuo "Digital Watermarking through Quasi m-Arrays", Proc. IEEE Workshop on Signal Processing Systems, Taipei, Taiwan, October 1999, pp. 456-461.

T. Cedric, R. Adi, I. Mcloughlin "Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion", Proc. IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, September 2000, pp. 275-278.

K. Gopalan, "Audio steganography by cepstrum although the algorithm is applicable to other resolution modification," In Proc. IEEE Int. Conf. Acoustics, Speech, levels of wavelet and Signal Processing, Vol. 5, pp. 481-484, March 2005.

Anant Umbarkar, Abhijit Joshi, Ajay Jadhav, “Wave Steganography Approach by ModifiedLSB”Second International Conference on Emerging Trends in Engineering and Technology, ICETET-09.

Anant Umbarkar, Abhijit Joshi, Ajay Jadhav, “Wave Steganography”, 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).

Xinpeng Zhang, “Separable Reversible Data Hiding in Encrypted Image”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012.

Tomáš Filler, Jan Judas and Jessica Fridrich, “Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011.

Jagtap V. G. and Pande S.S., “Noisy Node Detection in Wave file by using Iterative Silhouette Clustering and Vivaldi”, International Journal of Computer Applications (0975 – 8887) Volume 59– No.4, December 2012.

W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35, issue 3-4, September 1996, pp. 313-336.

N. Cvejic and T. Seppanen, "Channel capacity of high bit rate data hiding algorithms in diverse transform domains”, Proceeding of IEEE international Symposium on Communications and Information Technology (ISCIT 2004), October 2004, vol.1, pp. 84- 88.

N. Taraghi - Delgarm, Speech Watermarking, M.Sc. Thesis, Computer Engineering Department, Sharif University of Technology, Tehran, IRAN, May 2006.

L. Gang, A.N. Akansu, and M. Ramkumar, "MP3 resistant oblivious steganography," Proceedings of 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'01), May 2001 vol.3, pp. 1365-1368.

Y. Linde, A. Buzo, R. M. Gray, “An Algorithm for Vector Quantizer Design”, IEEE Trans. on Communications, Vo1.28, [7] N. M. Nasrabadi and R. A. King, “Image coding using vector quantization: A review”, IEEE Trans. Commun., vol. 36, pp. 84-95, 1980.


Refbacks

  • There are currently no refbacks.