Image steganography: hiding short audio messages withidin digital images

Authors

  • M. I. Khalil Reactor Physics Department, Nuclear Research Center, Atomic Energy Authority, Cairo, Egypt

Keywords:

Steganography, Cryptography, Audio message, Image hiding, Least-significant bit (LSB) method

Abstract

It is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography and it is the process of hiding one medium of communication within another. Many different carrier file formats (text, sound or image) can be used, but digital images are the most popular because of their frequency on the Internet. Essentially, the information-hiding process in a steganographic system starts by identifying a cover meduim's redundant bits (those that can be modified without destroying that medium's integrity). The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. This paper will discuss the possibility of hiding short audio messages inside a digital image. The proposed approach encrypts the audio message before hiding it in image file. The process of extracting the audio message from stego-image will be discussed as well

Downloads

Download data is not yet available.

References

[1] William Stallings, Cryptography and Network Security, Principles and Practice, Third Edition, PearsonEducation, Singapore, 2003.
[2] R.J. Anderson and F. A.P. Peticolas (2001) On the limits of the Steganography, IEEE Journal Selected Areas in Communications, 16(4), pp. 474-481.
[3] Johnson, Neil F., and SushilJajodia, "Exploring Steganography: Seeing the Unseen." IEEE Computer Feb. 1998: 26-34.
[4] A. Ker, "Improved detection of LSB steganography in grayscale images." in Proc. Information Hiding Workshop, vol. 3200, Springer LNCS, pp. 97-115, 2004.
[5] C.C. Lin and W. H. Tsai, "Secret Image Sharing with Steganography and Authentication." Journal of Systems and Software, 73(3): 405-414, December 2004.
[6] KafaRabah. Steganography. The Art of Hiding Data. Information technology Journal 3 (3) - 2004.
[7] A. Westfeld, "F5-A Steganography Algorithm: High Capacity Despite Better Steganalysis", LNCS, Vol.2137, pp. 289-302, April 2001.
[8] Krenn, R., "Steganography and Steganalysis", http://www.Krenn.nl/univ/cry/steg/article.pdf
[9] A. Ker, "Steganalysis of LSB matching in greyscale images." IEEE Signal Process. Lett., Vol. 12, No. 6, pp.441-444, June 2005.
[10] T. Moerland, "Steganography and Steganalysis", Leiden Institute of Advanced Computing Science, www.Liacs.nl/home/tmoerl/priytech.pdf
[11] File Formats Handbook by Gunter Born, 1995.
[12] J. Fridich, M. Long, "Steganalysis of LSB encoding in colorimages," Multimedia and Expo, vol. 3, pp. 1279-1282, July 2000.

Downloads

Published

2011-10-03

How to Cite

Khalil, M. I. (2011). Image steganography: hiding short audio messages withidin digital images. Journal of Computer Science and Technology, 11(02), p. 68–73. Retrieved from https://journal.info.unlp.edu.ar/JCST/article/view/670

Issue

Section

Original Articles