High capacity and inaudibility audio steganography scheme

Haider Ismael Shahadi, Razali Jidin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

Steganography is an information hiding technique where secret message is embedded into unsuspicious cover signal. Measurement of good steganography algorithm includes security, capacity, robustness and imperceptibility. These measures are contradicted, therefore improving one, affects the others. In this paper, we propose a new high capacity audio steganography algorithm based on the wavelet packet transform with adaptive hiding in least significant bits. The adaptive hiding is determined depend on the cover samples strength and bits block matching between message and cover signals. The results show that message can be embedded up to 42 % of the total size of the cover audio signal with at least of 50 dB signal to noise ratio.

Original languageEnglish
Title of host publicationProceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011
Pages104-109
Number of pages6
DOIs
Publication statusPublished - 01 Dec 2011
Event2011 7th International Conference on Information Assurance and Security, IAS 2011 - Malacca, Malaysia
Duration: 05 Dec 201108 Dec 2011

Publication series

NameProceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011

Other

Other2011 7th International Conference on Information Assurance and Security, IAS 2011
CountryMalaysia
CityMalacca
Period05/12/1108/12/11

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'High capacity and inaudibility audio steganography scheme'. Together they form a unique fingerprint.

  • Cite this

    Shahadi, H. I., & Jidin, R. (2011). High capacity and inaudibility audio steganography scheme. In Proceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011 (pp. 104-109). [6122803] (Proceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011). https://doi.org/10.1109/ISIAS.2011.6122803