Research article Special Issues

High capacity reversible data hiding in MP3 based on Huffman table transformation

  • Received: 24 February 2019 Accepted: 01 April 2019 Published: 11 April 2019
  • In practice, most audio files such as MP3 and AAC are stored and transmitted in the form of compressed files, which can serve as the cover in audio steganography. Currently, the prevailing audio steganography methods are not ideal because of the drawbacks. Some are characterized by low capacity while others are irreversible. In this paper, we propose a method to embed secret messages in MP3 encoding. Our strategy is to hide the information by Huffman table transformation. We extract secret information by analyzing side information. Experimental results show that our method can greatly improve the steganographic capacity with low distortion and high security. Meanwhile, it featured with higher decoding rate and reversible over some state-of-the-art methods.

    Citation: Dingwei Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, Longlong Li. High capacity reversible data hiding in MP3 based on Huffman table transformation[J]. Mathematical Biosciences and Engineering, 2019, 16(4): 3183-3194. doi: 10.3934/mbe.2019158

    Related Papers:

  • In practice, most audio files such as MP3 and AAC are stored and transmitted in the form of compressed files, which can serve as the cover in audio steganography. Currently, the prevailing audio steganography methods are not ideal because of the drawbacks. Some are characterized by low capacity while others are irreversible. In this paper, we propose a method to embed secret messages in MP3 encoding. Our strategy is to hide the information by Huffman table transformation. We extract secret information by analyzing side information. Experimental results show that our method can greatly improve the steganographic capacity with low distortion and high security. Meanwhile, it featured with higher decoding rate and reversible over some state-of-the-art methods.
    加载中


    [1] I. Cox, M. Miller, J. Bloom, et al., Digital watermarking and steganography, 2008.
    [2] V. Viswanathan, Information hiding in wave files through frequency domain, Appl. Math. Comput., 201 (2008), 121–127.
    [3] O. T. C. Chen and W. C. Wu, Highly robust, secure, and perceptual-quality echo hiding scheme, IEEE Transact. Audio Speech Language Process., 16 (2008), 629–638.
    [4] M. L. Wang, H. X. Lin and M. T. Lee, Robust audio watermarking based on mdct coefficients, in International Conference on Genetic and Evolutionary Computing, 2013.
    [5] M. Bellaaj and K. Ouni, A robust audio watermarking technique operates in mdct domain based on perceptual measures, Int. J. Adv. Comput. Sci. Appl., 7 (2016), 169–178.
    [6] F. Petitcolas, Mp3stego. computer laboratory, cambridge.
    [7] H. Y. Gao, The mp3 steganography algorithm based on huffman coding, Acta Sci. Nat. Uni. Sunyatseni, 46 (2007), 32–35.
    [8] D. Q. Yan, R. D. Wang and L. G. Zhang, A high capacity mp3 steganography based on huffman coding, J. Sichuan Uni..
    [9] K. Yang, X. Yi, X. Zhao, et al., Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution, 2017.
    [10] Z. Ru, J. Liu and Z. Feng, A steganography algorithm based on mp3 linbits bit of huffman codeword, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2017.
    [11] D. Yan and R. Wang, Huffman table swapping-based steganograpy for mp3 audio, Multim. Tools Appl., 52 (2011), 291–305.
    [12] ISO/IEC, Information technologycoding of moving pictures and associated audio for digital storage media at up to about 1.5 mbit/s, 11172–3.
    [13] ITU, Methods for objective measurements of perceived audio quality, BS.1387.
    [14] C. Cachin, An Information-Theoretic Model for Steganography, 1998.
    [15] M. S. Atoum, A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography, 2015.
    [16] X. Yan, X. Liu and C. N. Yang, An enhanced threshold visual secret sharing based on random grids, J. Real-Time Image Process., 14 (2018), 61–73.
    [17] J. S. Pan, P. W. Tsai and H. C. Huang, Advances in intelligent information hiding and multimedia signal processing, Smart Innovat. System. Technol., 81.
    [18] M. Hanspach and M. Goetz, On covert acoustical mesh networks in air, arXiv preprint arXiv:1406.1213.
    [19] M. Guri, Y. Solwicz, A. Daidakulov, et al., Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication.

    © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
  • Reader Comments
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(461) PDF downloads(571) Cited by(1)

Article outline

Figures and Tables

Figures(4)  /  Tables(6)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog