Applying Steganography in MP3 Files using Spread Spectrum Technique

Authors

  • Abdul Majid Malaysia University of Science and Technology

DOI:

https://doi.org/10.63876/jdsi.v1i1.1

Keywords:

steganography, MP3, Spread Spectrum technique,secret data, digital audio, digital audio

Abstract

This paper explores the use of steganography in MP3 files using the Spread Spectrum technique for the purpose of securely hiding secret data within digital audio. Steganography is a technique used for secret communication by hiding information within other data in a way that it is not easily detectable by unintended recipients. MP3 files are a popular digital audio format used for music and other audio recordings. The Spread Spectrum technique is a method of encoding data in a way that it is spread over a wider frequency range, making it more difficult to detect or interfere with. This paper presents the implementation of the Spread Spectrum technique for embedding secret data in MP3 files. The experimental results show that the proposed approach is able to embed the hidden data effectively in the MP3 file without degrading the audio quality. The paper also evaluates the security of the proposed approach and discusses its potential applications in various domains, such as information security, digital forensics, and copyright protection.

Downloads

Download data is not yet available.

References

M. A. Hameed, M. Hassaballah, S. Aly, and A. I. Awad, “An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques,” IEEE Access, vol. 7, pp. 185189–185204, 2019, doi: 10.1109/ACCESS.2019.2960254.

A. Yang, Y. Bai, T. Xue, Y. Li, and J. Li, “A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security,” Future Gener. Comput. Syst., vol. 145, pp. 293–302, Aug. 2023, doi: 10.1016/j.future.2023.03.035.

M. H. Khan, M. S. Farid, and M. Grzegorzek, “A comprehensive study on codebook-based feature fusion for gait recognition,” Inf. Fusion, vol. 92, pp. 216–230, Apr. 2023, doi: 10.1016/j.inffus.2022.12.001.

Saluky, S. H. Supangkat, and F. F. Lubis, “Moving Image Interpretation Models to Support City Analysis,” in 2018 International Conference on ICT for Smart Society (ICISS), Semarang: IEEE, Oct. 2018, pp. 1–5. doi: 10.1109/ICTSS.2018.8550012.

N. Algethami and S. Redfern, “A Robust Tracking-by-Detection Algorithm Using Adaptive Accumulated Frame Differencing and Corner Features,” J. Imaging, vol. 6, no. 4, p. 25, Apr. 2020, doi: 10.3390/jimaging6040025.

M. Guillermo et al., “Detection and Classification of Public Security Threats in the Philippines Using Neural Networks,” in 2020 IEEE 2nd Global Conference on Life Sciences and Technologies (LifeTech), Kyoto, Japan: IEEE, Mar. 2020, pp. 320–324. doi: 10.1109/LifeTech48969.2020.1570619075.

X.-H. Qian, G.-B. Xu, H.-K. Wang, and D.-H. Jiang, “Threshold secret sharing scheme of quantum images based on least significant bit theory,” Phys. Stat. Mech. Its Appl., vol. 608, p. 128248, Dec. 2022, doi: 10.1016/j.physa.2022.128248.

H. Sultana, A. H. M. Kamal, T. S. Apon, and Md. G. R. Alam, “Increasing embedding capacity of stego images by exploiting edge pixels in prediction error space,” Cyber Secur. Appl., vol. 2, p. 100028, 2024, doi: 10.1016/j.csa.2023.100028.

K. Žigić, J. Střelický, and M. Kúnin, “Copyright and firms’ own IPR protection in a software market: Monopoly versus duopoly,” Econ. Model., vol. 123, p. 106282, Jun. 2023, doi: 10.1016/j.econmod.2023.106282.

S. Nippita, J. D. Oviedo, M. G. Velasco, C. L. Westhoff, A. R. Davis, and P. M. Castaño, “A randomized controlled trial of daily text messages versus monthly paper diaries to collect bleeding data after intrauterine device insertion,” Contraception, vol. 92, no. 6, pp. 578–584, Dec. 2015, doi: 10.1016/j.contraception.2015.09.004.

S. Saluky, “A Survey on Abandoned Objects Detection from CCTV Surveillance,” ITEJ Inf. Technol. Eng. J., vol. 5, no. 2, pp. 105–118, Dec. 2020, doi: 10.24235/itej.v5i2.53.

Downloads

Published

2023-08-10

How to Cite

Majid, A. (2023). Applying Steganography in MP3 Files using Spread Spectrum Technique. Journal of Data Science and Informatics, 1(1), 9–19. https://doi.org/10.63876/jdsi.v1i1.1

Issue

Section

Articles