Sie sind auf Seite 1von 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/269300336

Exploring the Challenges of MP3 Audio Steganography

Conference Paper · December 2013


DOI: 10.1109/ACSAT.2013.38

CITATIONS READS
7 1,483

5 authors, including:

Mohammed Salem Atoum Ghazali Sulong


Irbid National University Universiti Teknologi Malaysia
19 PUBLICATIONS   76 CITATIONS    172 PUBLICATIONS   946 CITATIONS   

SEE PROFILE SEE PROFILE

Akram Zeki
International Islamic University Malaysia
89 PUBLICATIONS   567 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Offline handwritten signature identification using adaptive window positioning techniques View project

The awareness of the authenticity of Mobile Quran Apps View project

All content following this page was uploaded by Mohammed Salem Atoum on 29 May 2015.

The user has requested enhancement of the downloaded file.


Exploring the Challenges of MP3 Audio Steganography

Mohammed Salem Atoum, Subariah Ibrahimn, Ghazali Sulong, Akram Zeki, Adamu Abubakar
Faculty of Computing, Universiti Teknologi Malaysia
moh_atoom1979@yahoo.com, subariah@utm.my, ghazali@spaceutm.edu.my
Kulliyyah of Information and Communication Technology, International Islamic University Malaysia.
akramzeki@iium.edu.my, adamuabubakar9@gmail.com

Abstract— This paper presents the issues and challenges and finally, audio formats with lossy compression, such as
faced for steganographic techniques that uses MP3 (Moving MP3, AAC. This paper focuses on the MP3 file and the
Picture Experts Group-1 "MPEG-1" Audio Layer 3) files as steganographic techniques used for MP3 files together with
the cover or carrier file. The problem of steganographic the issues and challenges faced by those techniques [6-8].
techniques for MP3 is variety of MP3 states, where it exists at
higher or lower bit rates, with higher or lower resulting II. CHARACTERISTICS OF MP3FILES
quality. These have profound effects on strength of techniques
that will be used for a different state of MP3 files. Several MP3 was released in 1992 as a part of the MPEG model
techniques have already been proposed for embedding data in [9]. The term "MP3" refers to layer 3 of the MPEG-1
MP3 files using steganography systems. Unfortunately, there compression mode [10]. Layer-3 is the highest complexity
are lacks of general emergence research on the issues and the mode, optimized to provide the highest quality at low bit
challenges faced with the MP3 file in terms of steganography. rate (128 Kbit/s) [9]. It has become so successful because of
Some techniques for embedding information in MP3 files were its inherent ability to minimize the file size without audible
reviewed, and recommendations are being proposed for the compromise in quality. MP3 has caused a revolution online
best strategy of hide information in MP3 files and the
because it is the first audio format that made the process of
possibility of finding other new techniques hiding information
sharing audio files across the internet become feasible.
in MP3 files.
Previously, files of any high quality took many hours to
download. MP3 has cut the download to a tenth of the time
Keywords- MP3 file; Steganography; MP3 Compression;
without an identifiable change in the "sound" of the audio
Embedding bits; Extracting bit
[9-11].
I. INTRODUCTION Though MP3 compression is considered lossy because
some data cannot be recovered after compression, the MPEG
MP3 file as a cover or a carrier file for steganographic
algorithm can achieve transparent or perceptually lossless
systems dwells on the audio steganographic system. In
compression. This was concluded by asking expert listeners
audio steganographic system, the secret message is
to listen to MP3 files and it was found that expert listeners
embedded in digital sound. The secret message is embedded
could not distinguish between codes and original audio clips
by slightly altering the binary sequence of a sound file [1].
even with a six to one compression ratio [9]. When one looks
Embedding secret messages in digital sound files are more
for reasons why MP3 and other compression technology
difficult than embedding messages in other media, such as
have emerged as the main tool for Internet audio delivery,
digital images, due to the dynamic supremacy of the Human
the following comes to mind [11-17]:
Auditory System (HAS) over the human visual system
Open standard: MPEG-1 layer 3 is defined as an open
(HVS) [2]. Besides, the malicious mechanism against image
standard. The specification is available to anyone interested
steganography cannot be applied against the audio
in implementing standards, since no single company owns
steganography scheme [3]. In order to conceal secret
the standard.
messages successfully, a variety of methods for embedding
Availability of encoder and decoders: Driven by the
information in digital audio have been introduced. These
demand for professional use, many MP3 encoders and
methods range from rather simple algorithms that insert
decoders are readily available for use. This simplifies and
information in the form of signal noise to more powerful
accelerates the adoption of MP3 technology.
methods that exploit sophisticated signal processing
Supporting technologies: While audio compression is
techniques to hide information [4]. Audio steganography
viewed as the main enabling technology, and computer
needs to satisfy three basic requirements: perceptual
sound cards are widespread, computers are getting fast
transparency, capacity of hidden data and robustness. Notice
enough to do software audio decoding and even encoding.
the main problem of the audio steganographic algorithm is
Fast internet access for universities and businesses as well
considerably low robustness and capacity [5].
as the spread of CD-ROM and CD-Audio writers all have
Audio file format is commonly categorized into three;
contributed to the ease of distributing music in MP3 format
uncompressed audio formats, such as WAV, AIFF. Audio
formats with lossless compression, such as TTA, ATRAC
via computers. In short, MPEG-1/2/3 layer 3 was the right them down), a link to an album cover and the time it takes
technology available at the right time [10]. for each line of text should be displayed on the screen [20].
There are many existing plug-ins for popular MP3 players
III. STEGONOGRAPHY METHODS IN MP3 FILES that work with this standard.
Having reviewed the MP3 format and its properties in
B. Embedding During Compression
details, it is now possible to discuss the actual
steganographic approaches to store data in audio files. The There are four techniques for embedding during
available methods can be divided into three categories [18] : compression: Least Significant Bit (LSB), Phase Coding,
Embedding Before Compression, Embedding During Echo Hiding, and Spread Spectrum (SS) [8].
Compression, Embedding After Compression
1) Least Significant Bit Encoding
A. Embedding Before Compression Least significant bit (LSB) coding is the first technique
Embedding information into MP3 files is not a new idea. used to embed secret messages into audio file or other types
There are several methods to embed any information in because it is the simplest method of embedding and
MP3 files. This can be done by either using the ID3v2 extracting. The embedding process in LSB can be conducted
comment tags or the special extension of ID3 called by bringing the audio files along with the secret message
Lyrics3. and converting them into a bit stream and then embedding
1) ID3v2 Comment Frame the secret message and finally replaces the LSB bit from
In section II ID3v2 tags was discussed in details. These audio with an LSB bit from secret massage [21]. To extract
tags contain fields about artist name and others, in this field, secret message the receiver access to the sequence of sample
secret message can be embedded by exchange the indices used in the embedding process. The general method
information of these tags with information about the secret in LSB of how much information can be embedded in the
message and can be extracted by the end user. The audio file is 1 Kbps per I KHZ. In the world of
disadvantages of this method is not very efficient because steganography capacity and robustness are very important
there are no guidelines on how to format the text lyrics, how so many researchers’ developments many algorithms in
to split them among text frames and etc. Furthermore, not LSB to increase capacity and robustness [22-24]. It must be
all MP3 files use the ID3v2 tags so this is not a universal warned here that the increase in the size of embedded file
approach. [19] must affect the robustness and sound quality of the file,
2) Lyrics3 Standard because the HAS is very sensitive. In order to increase
To overcome the shortcomings of ID3v2 Comment capacity of embedding information in audio files, many
Frame, the ID3 standard was extended with the Lyrics3 researchers proposed a new algorithm such as hiding secret
specification. This technique describes how to add an extra information in the audio file. And message bits are
frame between the audio block and ID3 tag which would embedded into multiple and variable LSBs. These methods
contain song lyrics accompanied by meta-data [20]. In utilize up to 7 LSBs for embedding data.
Figure 1 shows a possible ways of embedding Lyrics3 In order to solve the problem of robustness, researcher
frame into an MP3 file. introduced efficient method for hiding the data from hackers
and sent to the destination in a safe manner. Or using higher
bit indices than the traditional least significant bit.
Researchers use lifting scheme to create perfect
reconstruction filter banks which are Int2lnt and hide data in
LSB of detail coefficient in an adaptive way to reduce the
error rate, or use a more powerful Genetic Algorithm GA
based LSB algorithm to encode the encrypted message into
audio data. And using genetic algorithm, message bits are
embedded into multiple, vague and higher LSB layers,
resulting in increased robustness [3-4].
2) Phase Coding
This technique addresses the disadvantages of the method
of noise inducing audio information hiding [12]. Phase
Figure 1: Way to Embed Lyrics3 Frame [20]. coding based on the fact that the ingredients sound stage is
not significant for the human ear and noise. Instead of
In Figure 1, it can be seen that the lyrics block always entering the unrest and technical bits encode the message
starts with a literal string LYRICSBEGIN and ends with as phase shifts in the phase spectrum of digital signals and
LYRICSEND. The Lyrics3 spec also includes fields achieve inaudible encoded in terms of signal to noise ratio
specifying the author of the lyrics (i.e. the person who wrote perceived. Figure 2. Below show the phase coding
technique.
parameters are appointed under the threshold of human
hearing is not so easy to solve echo. In addition, the offset
varies for the binary representation the message to be
encoded. One represents the offset value of one binary, and
the second value represents a zero offset binary.
The original signal is broken down into blocks before the
start of the encoding process. If the result of only one of the
original echo signals, it can encode only one bit of
information.
Figure 2: Phase coding technique [12]. So, once the process is complete coding sequence of the
blocks is together again to create the final signal.
To embedding secret massage by using Phase coding The process of extracting the secret message from the steg
the following steps for embedding: o signal, is done through the receiver is able to disperse
1. Separate the original sound signal up into smaller the signal sequence to the cluster itself, which was used
segments whose lengths equal the size of the message to be during the encoding process. Then can use
encoded. the function of automatic correlation cepstrum signal for dec
2. Applied Discrete Fourier Transform (DFT) is for each oding the message because it reveals a rise in a time
segment to create a matrix of the phases and Fourier corresponding to the echo, which allows the construction of
transforms magnitudes. the message [25].
3. Calculated Phase differences between adjacent segments.
4. Embedding the secret message in the first segment of an
audio file by using this equation 2

 if message bit  0
 2
phase _ new   (2)
   if message bit  1
 2
5. To calculate a new phase matrix using the new phase of
the first segment and the original phase differences.
6. Using the new phase matrix and original magnitude
matrix, the sound signal is reconstructed by applying the Figure 3: Binary offset [12].
inverse DFT and then concatenating the sound segments
back together. 4) Spread Spectrum (SS)
To extract the secret message from the audio file, the This method is to start a secret message in the audio file
receiver must know the length of the piece. The receiver can through the intersection of the spectrum with the spectrum
then use DFT to get the phases, and extract information. On of the audio signal as possible. Of course, this system is
e drawback associated with the encoding stage is the data similar to using the implementation of the LSB coding that
transfer rate of decline due to the fact that the secret any secret message bits are spread randomly within the
message is encoded in the signal only the first part. Phase entire audio file [26].
Coding can be addressed by increasing the length However, there is a difference between the two
of the signal. However, this change of relations between methods in the style of SS published a secret message over
the frequencies of each phase component of the chip more r the frequency spectrum in the audio file using the code in
adically, making it easier to detect the encoding. As a which the autonomy of the actual signal. As a result, the
result, the method is used only when the coding signal occupies the final bandwidth beyond what is really
phase produces a small amount of data (low capacity), such needed to go [27].
as a watermark, it must be concealed. In audio steganography, Spread Spectrum technique
3) Echo Hiding can use two versions: firstly Direct-Sequence Spread
Hide information in the audio file by using an Echo Spectrum (DSSS) and secondly, Frequency-Hopping Spread
Hiding technique by introducing an echo into a separate Spectrum (FHSS). In DSSS, the secret message is spread
signal. Similar way to spread spectrum, and therefore has out by a constant called the chip rate and then modulated
advantages in that it allows an increase of data transfer with a pseudorandom signal. But the FHSS, audio file's
rate, and also provides robustness compared with other frequency spectrum is altered so that it hops rapidly between
methods of inducing noise [12]. frequencies.
Embedding process in Echo Hiding techniques depends Many Researchers [28-30] modify some quantized
on the three parameters: amplitude, decay rate, and offset spectrum values of audio layer III to embed secret
(delay time) from the original signal. All three information into audios. One of them is based on the
technology of spectrum shift, when the distribution of Padding byte stuffing is an attractive method because it is
human speech becomes located in unheard places of the relatively straightforward to implement and has a good
music spectrum. The second one is based on the technology average storage capacity. It is possible to encode
of spectrum spreading when harmonics of the human voice information at 1 byte per frame as long as padding bytes are
and music are mixed between each researcher designs an available. Since lyrics files are usually small, there should
audio covert communication system based on SS data usually be enough padding bytes to contain the whole text.
hiding technology and enhanced DSSS system with aspects Surprisingly, there is very little research dealing with a
of frequency hopping to vary the carrier frequency of the padding byte stuffing. In fact there is little documentation
binary phase shift keying (BPSK) signal, representing the available regarding the nature of padding bytes, their
secret message. location in the frame and similar information. It seems to be
Advantage of SS method comparison with the LSB a new avenue for steganographic research [8].
method and phase coding techniques are better data
transmission rate while also maintaining a high level of 3) Before all frames
robustness against removal techniques. Before all frames (BAF) is methods development
C. Embedding After Compression from [32] in this method researchers embedded text file to
MP3 file. The text file before embedded was encrypted by
There is very little research done in the area of
using RSA algorithm to increase a security to secret
embedding after compression [16]. The reason for these rare
message, and after that embedding encrypted text before the
researches in this technique is due to be embedded after
first frame will be started. In this method the size of a file
compression. This technique cannot achieve a very
good spread of data steganography. Moreover, that there are can be embedded before all frames in MP3 files is 15 KB
doubts about impacts on the quality of the sound. The with encrypted and 30 KB without using encryption
coordination of MP3 files is not very flexible and relatively algorithm. The advantage of this method is can be
small size compared to other audio file types, but as we embedding capacity more than padding or unused bit
mentioned earlier that there are more bytes of random infor- methods and can be extract secret message more faster other
mation can be embedded in [8]. methods and the quality is conformable, on the other hand
However, for the purpose of this paper seems to be the the drawback is low robustness for an attacker Padding Byte
right approach. In previous methods as a limitation because Stuffing.
before or during compression usually exploit the quirks of
MP3 file structure, and hide data in blocks that do not 4) Between frames
belong to actual audio data sequences. Embedding after Between frames (BF) is methods development from
Compression methods can make audio corruption virtually [33] in this method researchers embedded text file to MP3
impossible. file. The text file before embedded was encrypted by using
There are two possible approaches to Embedding after RSA algorithm to increase a security to secret message, and
compression: Unused Header Bit Stuffing, Padding Byte after that embedding encrypted text in Between the frames
Stuffing. in MP3 files. In this method the size of a file can be
1) Unused Header Bit Stuffing embedded between all frames in MP3 files is more than 40
The MP3 frame headers are composed of various fields MB with encrypted and 80 MB without using encryption
explained in Error! Reference source not found.Some of these algorithm. The advantage of this method is can be
fields are very rarely used. Good examples are the Private embedding huge data more than all methods in an MP3 file,
bit, Copyright bit, Original bit, and Emphasis bit. Most MP3 and the quality is conformable, on the other hand the
players completely ignore these fields. So this field can use drawback is low robustness for the attacker.
for embedding secret message by replacing the bit stream of
secret message with bit in this field. Changing one of these TABLE I. SHOW THE SUMMARIZED AND ANALYSIS OF ALL MP3
fields may at worst cause the player to misinterpret STEGANOGRAPHY METHODS

copyright information about the given frame [16]. By using Methods Techniques Advantage Disadvantage
this proposed method of implementation of digital name
watermarks, the tapes will be embedding a logical extension Embedding ID3V2  Simple if  Not efficient
Before comment found  Not all MP3 uses tag
of this approach. And thus 4 bits in each frame are able Compression frame  Loss of information
to achieve good capacity but low robustness [31]. Lyrics  Easy to  Low extraction
2) Padding Byte Stuffing standard implement accuracy
Some MP3 audio frames are padded with an "empty" byte  Loss of information
to even out the frame rate. On average MP3 files tend to  Poor anti-attack
capability
have hundreds of frames which need to be padded. Since the
Embedding Least  Simplest  Low robustness
padding bytes do not carry any audio information they are a During significant way
good target for data stuffing [16,8]. Compression bit  Large
capacity AKNOWLEDGMENT
Phase  Good robust  Low data The authors would like to thank the Universiti Teknologi
coding transmission Malaysia (UTM) for sponsoring this research under the
 Complex FRGS Grant (Vote number 4F220) under the Ministry of
Echo hiding  Good  Low robustness Higher Education (MOHE) in Malaysia
capacity
Spread  High level  Can introduce noise
spectrum robustness
REFERENCES
Embedding Unused  Efficient  Low robustness
After header bit  Simple [1] M. Zamani, R.B. Ahmad, A.B.A. Manaf, and A.M. Zeki, “An
Compression stuffing approach to improve the robustness of substitution techniques of
Padding  Efficient  Not all MP3 found just audio steganography,” 2009 2nd IEEE International Conference on
byte  Simple in ABR or VBR. Computer Science and Information Technology, 2009, pp. 5-9.
stuffing [2] Shahreza S.S. and Shalmani M.T.M., “Adaptive wavelet
[3] Zamani, M., Manaf, A. A., Ahmad, R. B., Zeki, A. M., & Abdullah,
Before All  Low  Low robustness and
S. (2009). A Genetic-Algorithm-Based Approach for Audio
Frames capacity. security Steganography, 355–358.
[4] K. Bhowal, a J. Pal, G.S. Tomar, and P.P. Sarkar, “Audio
Steganography Using GA,” 2010 International Conference on
Between  High  Low robustness and Computational Intelligence and Communication Networks, Nov.
Frames 2010, pp. 449-453.
capacity. security
[5] K .Angurajs, ," A structured system of embedding based in AI by
 Simple incorporating GA", IEEE 2010 , pp. 451-454 ,2010.
[6] Deng, J.I.E. Tan, B.O. Yang, and X. Li, “A Novel Steganography
Method Based on Modifying Quantized Spectrum Values of MPEG /
Embedding information before compression will result Audio Layer III *,” Science, 2007, pp. 325-330.
in loss of information and low extraction accuracy, and the [7] Haiying Gao, The MP3 steganography algorithm based on Huffman
algorithm is about large computation, low efficiency and coding[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni.
poor anti-attack capability. Embedding during compression Vo1.46. No.4. Ju1.2007. p32-3S.
generally hide information by modifying the DCT [8] Atoum, M. S., Ibrahim, S., Sulong, G., & M-ahmad, A. (2012). MP3
Steganography : Review. Journal of Computer Science, 9(6), 236–
quantization coefficients [34], or DWT quantization 244.
coefficients [35]. However there are error accumulation and [9] Pan D., "A Tutorial on MPEG/ Audio Compression", IEEE
low-capacity with this strategy. When it comes to Multimedia Journal, summer, 1995, URL:
embedding after compression, the efficiency is increased http://www.Info.pub.permisiion @IEEE . org. domain audio
without encoding and decoding process during embedding steganography with high capacity and low error rate”, in Proc. IEEE
International Conference on Acoustics, Speech and Signal
and extraction, such as the MP3 steganography algorithm Processing, pp: 1729 – 1732, 2008.
based on Huffman coding [7] and digital watermark [10] Brandenburg K., "MP3 And AAC Explained", Proceeding of AES 17
algorithm for MIDI [36-37] and so on. th. International Conference on High Quality Audio Coding, 1999,
URL: http://web.unic.ca/~jinxing/ wMP3/3-1.pdf.
[11] Supurovic P., "MPEG Audio Compression Basics", URL:
IV. CONCLUSION http://www.chested. chalmers.se\~kf96svgu\, 1998.
[12] P.K. Singh, H. Singh, and K. Saroha, “A Survey on Steganography in
Several techniques have been discussed in this Audio,” Audio, 2009.
chapter for embedding data in MP3 files using [13] Akram M Zeki, Adamu A Ibrahim, Azizah A Manaf, Steganographic
steganography systems. Three methods for embedding Software: Analysis and Implementation. International Journal Of
information in MP3 files were discussed, that are: Computers And Communications, 21(1), pp. 35-42.
Embedding information before compression, Embedding [14] www.delossoft.com/extractor/Introduction/Encode%20Setting%20Wi
during compression and Embedding after compression. On ndow.htm visited 20/6/2011.
Embedding before compression can occurs a loss of [15] P. Supurovic, "MPEG Audio Frame Header",1998 DataVoyage,
available in internet
information and low Extraction accuracy, and low www.dv.co.yu/mpgscript/mpeghdr.htm#MPEGTAG.
robustness. But Embedding during compression generally [16] M. Nilsson, "ID3 tag version 2.4.0 - Main Structure", November
there are error accumulation and low-capacity with this 2000, available in internet www.id3.org/id3v2.4.0-structure.txt .
strategy. When it comes to embedding after compression, [17] L. Maciak and M. Ponniah and R. Sharma, "MP3
the efficiency is increased without encoding and decoding STEGANOGRAPHY", 2008.
process during embedding and extraction. [18] "The Private Life of MP3 Frames", available in internet
Finally we expect to be hiding information after the <www.id3.org/MP3frame.html>.
compression is the best strategy to hide information in MP3 [19] K. Deng, Y. Tian, X. Yu, X. Niu, Y. Yang, and S. Technology,
"Steganalysis of the MP3 Steganographic Algorithm Based on
files with the possibility of finding other ways to hide Huffman Coding," Test, 2010, pp. 79-82.
information that is mentioned earlier with the increase [20] M. Nilsson, "ID3 tag version 2.3.0", February 1999,
in research on information hiding in audio files http://www.id3.org/id3v2.3.0.html
[21] Strnad Peter, Gingold Peter, "Lyrics3 Tag v2.00", Jun 1998, [30] Z.Zhang and X.Wu, “An Audio Covert Communication System for
http://www.id3.org/lyrics3200.html Anolog Channels,” 2010 International Conference on Electrical and
[22] M. Wakiyama, Y. Hidaka, and K. Nozaki, “An Audio Steganography Control Engineering, Jun. 2010, pp. 3279-3282.
by a Low-Bit Coding Method with Wave Files,” 2010 Sixth [31] M. Nutzinger,C.Fabian, and M. Marschalek, “Secure Hybrid Spread
International Conference on Intelligent Information Hiding and Spectrum System for Steganography in Auditive Media,” 2010 Sixth
Multimedia Signal Processing, Oct. 2010, pp. 530-533 International Conference on Intelligent Information Hiding and
[23] H.B. Kekre, Athawale, B.S. Rao, and U. Athawale, “Increasing the Multimedia Signal Processing, Oct. 2010, pp. 78-81.
Capacity of the Cover Audio Signal by Using Multiple LSBs for [32] Koso A., Turi A., and Obimbo C., "Embedding Digital Signatures in
Information Hiding,” 2010 3rd International Conference on Emerging MP3s", from proceedings 477 Internet and Multimedia Systems, and
Trends in Engineering and Technology, Nov. 2010, pp. 196-201. Applications, 2005
[24] D. Bhattacharyya, P. Dutta, and M.O. Balitanas, “Hiding Data in [33] Atoum, M. S., Rababah, O. A. A.-, & Al-attili, A. I. (2011).New
Audio Signal,” Database, pp. 23-29. Technique for Hiding Data in Audio Files. Journal of Computer
[25] K. Gopalan, “Audio Steganography using Bit Modification – A Science, 11(4), 173-177.
Tradeoff on Perceptibility and Data Robustness for Large Payload [34] Atoum, M. S., Suleiman, M., Rababaa, A., Ibrahim, S., & Ahmed, A.
Audio Embedding,” Computer Engineering, 2010. (2011). A steganography Method Based on Hiding secretes data in
[26] H. Ozer, "Steganalysis of audio based on audio quality metrics," MPEG / Audio Layer III. Journal of Computer Science, 11(5), 184-
Proceedings of SPIE", 2003, pp. 55-66 188.
[27] A. Delforouzi and M. Pooyan, “Adaptive Digital Audio [35] Shiva Zaboli and Mohammad Shahram Moin. CEW: A Non-Blind
Steganography Based on Integer Wavelet Transform,” Circuits, Adaptive Image Watermarking Approach Based on Entropy in
Systems & Signal Processing, vol. 27, Mar. 2008, pp. 247-259. Contourlet Domain[C]. Industrial Electronics,2007. ISIE 2007. IEEE
International Symposium on. 4-7 June 2007. pp l687 - 1692.
[28] Z. Kexin, “Audio Steganalysis of Spread Spectrum Hiding Based on
Statistical Moment,” Signal Processing, 2010, pp. 381-384. [36] Bahareh Akhbari and Shahrokh Ghaemmaghami. Watermarking of
Still Images in Wavelet Domain based on Entropy Masking
[29] D.E. Skopin, I.M.M. El-Emary, R.J. Rasras, and R.S. Diab, Model[C]. TENCON 200S 200S IEEE Region 10. Nov.200S. pl-6.
“Advanced algorithms in audio steganography for hiding human
speech signal,” 2010 2nd International Conference on Advanced [37] Haiying Gao, Rui Lv, Digital Watermark Algorithm for MIDI [J].
Computer Control, 2010, pp. 29-32. Microelectronics and Computer, 2007 (J J) , pp83-84.

View publication stats

Das könnte Ihnen auch gefallen