Digital audio steganography: Systematic review, classification, and analysis of the current state of the art
Tài liệu tham khảo
Kaur, 2017, Localized & self adaptive audio watermarking algorithm in the wavelet domain, J. Inf. Secur. Appl., 33, 1
Vimal, 2014, Audio steganography using dual randomness LSB method, 941
Ballesteros L, 2012, Highly transparent steganography model of speech signals using efficient wavelet masking, Expert Syst. Appl., 39, 9141, 10.1016/j.eswa.2012.02.066
Asad, 2011, An enhanced least significant bit modification technique for audio steganography, 143
Djebbar, 2012, Comparative study of digital audio steganography techniques, EURASIP J. Audio Speech Music Process., 2012, 1, 10.1186/1687-4722-2012-25
Bender, 1996, Techniques for data hiding, IBM Syst. J., 35, 313, 10.1147/sj.353.0313
Bilal, 2015, Recent advancement in audio steganography, 402
Dastoor, 2011, Comparative analysis of steganographic algorithms intacting the information in the speech signal for enhancing the message security in next generation mobile devices, 279
Farouk, 2014, Steganography and security of speech signal, 45
Tanwar, 2014, Audio steganography, 322
Balgurgi, 2013, Audio steganography used for secure data transmission, Adv. Intell. Syst. Comput., 174, 699, 10.1007/978-81-322-0740-5_83
Zamani, 2012, An overview on audio steganography techniques, Int. J. Digit. Content Technol. Appl., 6, 107
Djebbar, 2011, A view on latest audio steganography techniques, 409
Kiah, 2011, A review of audio based steganography and digital watermarking, Int. J. Phys. Sci., 6, 3837
Das, 2012, Steganography: Secret data hiding in multimedia, 275
Johri, 2015, Review paper on text and audio steganography using GA, 190
Abdelfattah, 2013
C. Paulin, S.-A. Selouani, E. Hervet, A comparative study of audio/speech steganalysis techniques catherine, in: 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE) A, 2017.
Atoum, 2016, Exploring the challenges of MP3 audio steganography, 156
Atoum, 2015, A comparative study of combination with different LSB techniques in MP3 steganography, 551
Shafi, 2010, A novel audio steganography scheme using amplitude differencing, 163
Bhattacharyya, 2010, Hiding data in audio signal, 23, 10.1007/978-3-642-13405-0_3
M. Khademi, M. Ali Tinati, Audio steganography by using of linear predictive coding analysis in the safe places of discrete wavelet transform domain, in: Electrical Engineering (ICEE), 2011 19th Iranian Conference on. IEEE, 2011, pp. 1–5.
Collins, 2011, System for non-disruptive high capacity indexed data embedding and recovery using multimedia signal covers, 1
Shafi, 2010, A novel audio steganography scheme using amplitude differencing, 163
Sakthisudhan, 2012, Dual steganography approach for secure data communication, Proc. Eng., 38, 412, 10.1016/j.proeng.2012.06.051
Baritha Begum, 2012, LSB Based audio steganography based on text compression, Proc. Eng., 30, 702
Balgurgi, 2012, Intelligent processing: An approach of audio steganography, 1
Olanrewaju, 2013, Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique, World Appl. Sci. J., 21, 79
Ballesteros L, 2013, Speech-in-speech hiding scheme based on least significant bit substitution and adaptive key, Comput. Electr. Eng., 39, 1192, 10.1016/j.compeleceng.2013.02.006
Huo, 2013, Reversible audio watermarking algorithm using non-causal prediction, Wuhan Univ. J. Nat. Sci., 18, 455, 10.1007/s11859-013-0956-2
Zhu, 2013, Content integrity and non-repudiation preserving audio- hiding scheme based on robust digital signature, Secur. Commun. Netw., 6, 1331, 10.1002/sec.715
Shahadi, 2014, Lossless audio steganography based on lifting wavelet transform and dynamic stego key, Indian J. Sci. Technol., 7, 323, 10.17485/ijst/2014/v7i3.14
Li, 2014, An audio hiding algorithm based on spline interpolation and wavelet transform, Appl. Mech. Mater., 571–572, 39
Bazyar, 2015, A new method to increase the capacity of audio steganography based on the LSB algorithm, J. Teknol., 74, 49
Bazyar, 2015, A robust data embedding method for MPEG layer III audio steganography, Int. J. Secur. Appl., 9, 317
Kanhe, 2015, Robust audio steganography based on advanced encryption standards in temporal domain, 1449
Datta, 2015, Robust high capacity audio steganography using modulo operator
H. S, 2015, Audio steganography in discrete wavelet transform domain, Int. J. Appl. Eng. Res. ISSN, 10, 973
Devi, 2016, Ideal sampling rate to reduce distortion in audio steganography, Proc. Comput. Sci., 85, 418, 10.1016/j.procs.2016.05.185
Taneja, 2016, Implementation of dual security through DSA and audio steganography, 1349
Gambhir, 2016, Integrating RSA cryptography & audio steganography, 481
Baig, 2016, Onion steganography: a novel layering approach, Nonlinear Dynam., 84, 1431, 10.1007/s11071-015-2580-5
Sahu, 2016, A novel technique for embedding audio in audio to ensure secrecy, 83
Renza, 2016, Highly transparent and secure scheme for concealing text within audio, 10125
Trivedi, 2017, Metamorphic cryptography using strength of chaotic sequence and XORing method, J. Intell. Fuzzy Syst., 32, 3365, 10.3233/JIFS-169277
Parthasarathi, 2017, Secured data hiding in audio files using audio steganography algorithm, Int. J. Pure Appl. Math., 114, 743
S.E. El-Khamy, N. Korany, M.H. El-Sherif, Robust image hiding in audio based on integer wavelet transform and chaotic maps hopping, in: Radio Science Conference (NRSC), 2017 34th National. IEEE, 2017, 2017, pp. 205–212.
Devi, 2016, Novel audio steganography technique for ECG signals in point of care systems (NASTPOCS), 101
Huang, 2008, Design and implementation of synchronized audio-to-audio steganography scheme, 331
Pal, 2013, Lossless audio steganography in spatial domain (LASSD), 575
Pathak, 2014, A new audio steganography scheme based on location selection with enhanced security, 1
Kakde, 2015, Audio-video steganography, 1
Shah, 2008, Adaptive wavelet packet based audio steganography using data history, 0
Gopalan, 2010, Audio steganography using bit modification - A tradeoff on perceptibility and data robustness for large payload audio embedding
Asad, 2012, Three layered model for audio steganography, 270
Ghosh, 2012, A double layered additive space sequenced audio steganography technique for mobile network, 29
Kumar, 2012, Enhanced LSB technique for audio steganography
Rekik, 2012, Speech steganography using wavelet and fourier transforms, EURASIP J. Audio Speech Music Process., 1, 1
Zhang, 2013, A novel algorithm for embedding watermarks into audio signal based on DCT, 29
Mukherjee, 2013, Evolutionary multibit grouping steganographic algorithm, vol. 8303, 285
Jiang, 2013, Real-time covert voip communications over smart grids by using AES-based audio steganography, 2102
Dieu, 2013, Hiding data in audio using modified CPT scheme, 396
Tang, 2014, Audio steganography with AES for real-time covert voice over internet protocol communications, Sci. China Inf. Sci., 57, 1
Gupta, 2014, Dwt and LSB based audio steganography, 428
Verma, 2014, A novel technique for data hiding in audio carrier by using sample comparison in DWT domain, 639
Charfeddine, 2014, A new DCT audio watermarking scheme based on preliminary MP3 study, Multimedia Tools Appl., 70, 1521, 10.1007/s11042-012-1167-0
Bilal, 2015, Audio steganography using QR decomposition and fast fourier transform, Indian J. Sci. Technol., 8, 10.17485/ijst/2015/v8i1/69604
Punetha, 2015, Safe transmission of text files through a new audio steganography technique, 58
N.C. Debnath, H. Abushama, C. Science, A Multilayered Scheme for Transparent Audio Data Hiding, in: 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), 2015, pp. 1–6.
G.P. TVS, S. Varadarajan, A novel hybrid audio steganography for imperceptible data hiding, in: Communications and Signal Processing (ICCSP), 2015, pp. 634–638.
V. Sharma, LSB modification based audio steganography using trusted third party key indexing method, in: 2015 Third International Conference On Image Information Processing (ICIIP), 2015, pp. 403–406.
Huang, 2016, Covert voice over internet protocol communications based on spatial model, Sci. China Technol. Sci., 59, 117, 10.1007/s11431-015-5955-4
Datta, 2016, Multi-bit data hiding in randomly chosen LSB layers of an audio, 283
Hussain, 2016, Enhanced audio LSB steganography for secure communication, Int. J. Adv. Comput. Sci. Appl., 7, 340
Jadhav, 2016, An efficient new audio steganography scheme based on location selection with enhanced security, Int. J. Eng. Sci. Comput., 5, 334
Bhalde, 2016, Performance improvement: Audio steganography technique parity bit combined with cryptography
Alsabhany, 2017, A hybrid method for data communication using encrypted audio steganography, Adv. Sci. Lett., 23, 10.1166/asl.2017.8946
Jiang, 2017, An efficient and secure voip communication system with chaotic mapping and message digest, Multimed. Syst., 1
Shiu, 2017, High-capacity data-hiding scheme on synthesized pitches using amplitude enhancement—A new vision of non-blind audio steganography, Symmetry (Basel), 9, 92, 10.3390/sym9060092
El-Khamy, 2017, A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption, Multimedia Tools Appl., 76, 24091, 10.1007/s11042-016-4113-8
Zou, 2015, A wav-audio steganography algorithm based on amplitude modifying, 489
Shahreza, 2007, Adaptive wavelet domain audio steganography with high capacity and low error rate, 25
Pooyan, 2007, LSB-Based audio steganography method based on lifting wavelet transform, 600
Delforouzi, 2008, Adaptive digital audio steganography based on integer wavelet transform, Circuits, Syst. Signal Process., 27, 247, 10.1007/s00034-008-9019-x
Gopalan, 2008, Audio steganography by modification of cepstrum at a pair of frequencies, 2178
Gopalan, 2009, A unified audio and image steganography by spectrum modification
Delforouzi, 2009, Adaptive and efficient audio data hiding method in temporal domain, 0
Chang, 2010, Copyright-proving scheme for audio with counter-propagation neural networks, Digit. Signal Process., 20, 1087, 10.1016/j.dsp.2009.12.001
Skopin, 2010, Advanced algorithms in audio steganography for hiding human speech signal, 3, 29
Wakiyama, 2010, An audio steganography by a low-bit coding method with wave files, 530
Ahmed, 2010, A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm, J. Appl. Sci., 10, 59, 10.3923/jas.2010.59.64
Sheikhan, 2011, Improvement of embedding capacity and quality of DWT-based audio steganography systems, World Appl. Sci. J., 13, 507
Wu, 2011, Audio watermarking scheme with dynamic adjustment in mute period, Expert Syst. Appl., 38, 6787, 10.1016/j.eswa.2010.12.069
Roselinkiruba, 2013, Secure steganography in audio using inactive frames of voip streams, 491
H.B. Dieu, An Improved Technique for Hiding Data in Audio, in: Digital Information and Communication Technology and it’s Applications (DICTAP), 2014 Fourth International Conference on. IEEE, 2014, pp. 149–153.
Gopalan, 2015, An imperceptible and robust audio steganography employing bit modification, 1635
K. Gopalan, A robust bit modification audio steganography for covert communication, in: The Eleventh Advanced International Conference on Telecommunications A, 2015, no. c, pp. 7–10.
Kar, 2015, A multi-threshold based audio steganography scheme, J. Inf. Secur. Appl., 23, 54
Bazyar, 2016, A new data embedding method for mpeg layer iii audio steganography, J. Teknol., 78, 65
Kanhe, 2016, DCT Based audio steganography in voiced and un-voiced frames, 1
Shoaib, 2016, Performance improvement of threshold based audio steganography using parallel computation, Int. J. Adv. Comput. Sci. Appl., 7, 290
Liu, 2017, Adaptive audio steganography scheme based on wavelet packet energy, 26
Nathan, 2011, Audio steganography using spectrum manipulation, 152
Luo, 2017, Adaptive audio steganography based on advanced audio coding and syndrome-trellis coding, 177
Esen, 2012, Comparison of forbidden zone data hiding and quantization index modulation, Digit. Signal Process., 22, 181, 10.1016/j.dsp.2011.10.005
Sun, 2010, Dynamic matrix encoding strategy for voice-over-IP steganography, J. Cent. South Univ. Technol., 17, 1285, 10.1007/s11771-010-0633-y
Zamani, 2011, Genetic substitution-based audio steganography for high capacity applications, Internet Technol. Secur. Trans., 3, 97, 10.1504/IJITST.2011.039681
Anguraj, 2011, A fusion of A-B MAP cipher and ASET algorithms for the enhanced security and robustness in audio steganography, 205
Darsana, 2011, Audio steganography using modified LSB and PVD, Trends Netw. Commun., 197, 11, 10.1007/978-3-642-22543-7_2
Roy, 2012, Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization, 372
Banerjee, 2013, A variable higher bit approach to audio steganography, 46
Bhowal, 2013, A GA based audio steganography with enhanced security, Telecommun. Syst., 52, 2197, 10.1007/s11235-011-9542-0
Tanwar, 2014, A robust substitution technique to implement audio steganography, 290
Rahim, 2014, An audio steganography technique to maximize data hiding capacity along with least modification of host, 277
Bhattacharjee, 2015, Hiding of compressed bit stream into audio file to enhance the confidentiality and portability of a data transmission system, 196
Huang, 2014, Reversible audio information hiding based on integer DCT coefficients with adaptive hiding locations, Digit. Watermarking, 8389, 376
Zamani, 2015, Genetic algorithm for fragile audio watermarking, Telecommun. Syst., 59, 291, 10.1007/s11235-014-9936-x
M. Rana, F.B. Kunwar, A temporal domain audio steganography technique using genetic algorithm, in: Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on. IEEE, 2016, pp. 2016, pp. 3141–3146.
Liu, 2017, Steganography integrated into linear predictive coding for low bit-rate speech codec, Multimed. Tools Appl., 76, 2837, 10.1007/s11042-016-3257-x
Yang, 2017, Adaptive MP3 steganography using equal length entropy codes substitution, 202
Ren, 2017, An AMR adaptive steganography algorithm based on minimizing distortion, Multimed. Tools Appl., 77, 12095, 10.1007/s11042-017-4860-1
Shahadi, 2011, High capacity and inaudibility audio steganography scheme, 104
E.T. Su, Robust data embedding based probabilistic global search in MDCT domain, in: International Conference on Informatics Engineering and Information Science, 2011, pp. 290–300.
Srivastava, 2011, A novel approach to secure communication using audio steganography, Adv. Mater. Res., 403–408, 963, 10.4028/www.scientific.net/AMR.403-408.963
Shahadi, 2014, A novel and high capacity audio steganography algorithm based on adaptive data embedding positions, Res. J. Appl. Sci. Eng. Technol., 7, 2311, 10.19026/rjaset.7.531
Mandal, 2014, An approach for enhancing message security in audio steganography, 383
Van Tam, 2015, Embedding data into audio signal by combining sliding window technique with a novel marking bit method, Adv. Multimed. Ubiquitous Eng., 352, 191, 10.1007/978-3-662-47487-7_29
Tian, 2015, Improved adaptive partial-matching steganography for Voice over IP, Comput. Commun., 70, 95, 10.1016/j.comcom.2015.08.011
Chowdhury, 2016, A view on LSB based audio steganography, Int. J. Secur. Appl., 10, 51
Hemalatha, 2016, Audio data hiding technique using integer wavelet transform, Int. J. Electron. Secur. Digit. Forensics, 8, 131, 10.1504/IJESDF.2016.075586
Ali, 2017, Enhancing the hiding capacity of audio steganography based on block mapping, J. Theor. Appl. Inf. Technol., 95, 1441
Ali, 2020, An adaptive high capacity model for secure audio communication based on fractal coding and uniform coefficient modulation, circuits, syst, Signal Process., 1
Djebbar, 2013, Unified phase and magnitude speech spectra data hiding algorithm, Secur. Commun. Networks, 6, 961, 10.1002/sec.644
Rivas, 2007, Fourier phase domain steganography: Phase bin encoding via interpolation, mob. Multimedia/image process, Mil. Secur. Appl., 6579, 65790W
Parab, 2011, Audio steganography using differential phase encoding, Technol. Syst. Manag., 146, 10.1007/978-3-642-20209-4_20
Lu, 2012, Digital audio information hiding based on arnold transformation and double random-phase encoding technique, Optik (Stuttg), 123, 697, 10.1016/j.ijleo.2011.06.027
F. Djebbar, B. Ayad, Audio steganograpgy by phase modification, in: 8th International Conference on Emerging Security Information. Syst. Technol. 2014, pp. 31–35.
Moon, 2014, Application of data hiding in audio-video using anti forensics technique for authentication and data security, 1110
Pal, 2015, Secured data transmission through audio signal (SDTAS)
Fatnassi, 2016, A new hybrid steganalysis based approach for embedding image in audio and image cover media, IFAC-PapersOnLine, 49, 1809, 10.1016/j.ifacol.2016.07.845
Alsabhany, 2019, The adaptive multi-level phase coding method in audio steganography, IEEE Access, 7, 129291, 10.1109/ACCESS.2019.2940640
R.M. Nugraha, Implementation of direct sequence spread spectrum steganography on audio data, in: 2011 International Conference on Electrical Engineering and Informatics (ICEEI), 2011, pp. 1–6.
Chang, 2012, Location based robust audio watermarking algorithm for social TV system, 726
Shokri, 2013, Error probability in spread spectrum (SS) audio watermarking, 169
Kaur, 2015, Enhanced steganographic method preserving base quality of information using LSB, parity and spread spectrum technique, 148
Crawford, 2009, Supraliminal audio steganography: Audio files tricking audiophiles, Vol. 5806, 1
Szczypiorski, 2016, Stegibiza: New method for information hiding in club music, 20
Mazurczyk, 2010, LACK-A voip steganographic method, Telecommun. Syst., 45, 153, 10.1007/s11235-009-9245-y
Yan, 2011, Huffman table swapping-based steganograpy for MP3 audio, Multimed. Tools Appl., 52, 291, 10.1007/s11042-009-0430-5
Yan, 2012, Steganography for MP3 audio by exploiting the rule of window switching, Comput. Secur., 31, 704, 10.1016/j.cose.2012.04.006
Sun, 2012, Data hiding in audio based on audio-to-image wavelet transform and vector quantization, 313
Mazurczyk, 2014, Using transcoding for hidden communication in IP telephony, Multimed. Tools Appl., 70, 2139, 10.1007/s11042-012-1224-8
Ghasemzadeh, 2016, Toward a robust and secure echo steganography method based on parameters hopping, 143
Naumann, 2016, Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions, Secur. Commun. Networks, 9, 2972, 10.1002/sec.1500
Yadav, 2016, Audio steganography using ZDT : Encryption using indexed based chaotic sequence
Janicki, 2014, Steganalysis of transcoding steganography, Ann. des Telecommun. Telecommun., 69, 449, 10.1007/s12243-013-0385-4
Mohammed, 2015, A system for semantic information extraction from mixed soundtracks deploying MARSYAS framework, 1084
2018
Liu, 2009, Temporal derivative-based spectrum and mel-cepstrum audio steganalysis, IEEE Trans. Inf. Forensics Secur., 4, 359, 10.1109/TIFS.2009.2024718
Wei, 2007, A novel steganalysis algorithm of phase coding in audio signal, 261
Zeng, 2008, An algorithm of echo steganalysis based on power cepstrum and pattern classification, 1344
Ghasemzadeh, 2018, Comprehensive review of audio steganalysis methods, IET Signal Process., 12, 673, 10.1049/iet-spr.2016.0651
Ren, 2017, A steganalysis scheme for AAC audio based on MDCT difference between intra and inter frame, 217
Wang, 2020, MP3 steganalysis based on joint point-wise and block-wise correlations, Inf. Sci. (Ny), 512, 1118, 10.1016/j.ins.2019.10.037
Özer, 2006, Detection of audio covert channels using statistical footprints of hidden messages, Digit. Signal Process. A Rev. J., 16, 389, 10.1016/j.dsp.2005.12.001
Liu, 2009
Ghasemzadeh, 2017, Universal audio steganalysis based on calibration and reversed frequency resolution of human auditory system, IET Signal Process., 11, 916, 10.1049/iet-spr.2016.0690
Han, 2018, A new audio steganalysis method based on linear prediction, Multimed. Tools Appl., 77, 15431, 10.1007/s11042-017-5123-x
Z. Zhang, X. Yi, X. Zhao, Improving audio steganalysis using deep residual networks, in: International Workshop on Digital Watermarking, 2019, pp. 57–70.
