Export file:


  • RIS(for EndNote,Reference Manager,ProCite)
  • BibTex
  • Text


  • Citation Only
  • Citation and Abstract

High capacity reversible data hiding in MP3 based on Huffman table transformation

National University of Defense Technology, Hefei 230037, China

Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication

In practice, most audio files such as MP3 and AAC are stored and transmitted in the form of compressed files, which can serve as the cover in audio steganography. Currently, the prevailing audio steganography methods are not ideal because of the drawbacks. Some are characterized by low capacity while others are irreversible. In this paper, we propose a method to embed secret messages in MP3 encoding. Our strategy is to hide the information by Huffman table transformation. We extract secret information by analyzing side information. Experimental results show that our method can greatly improve the steganographic capacity with low distortion and high security. Meanwhile, it featured with higher decoding rate and reversible over some state-of-the-art methods.
  Article Metrics

Keywords MP3 steganography; data hiding; Huffman table; reversible; large capacity

Citation: Dingwei Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, Longlong Li. High capacity reversible data hiding in MP3 based on Huffman table transformation. Mathematical Biosciences and Engineering, 2019, 16(4): 3183-3194. doi: 10.3934/mbe.2019158


  • 1 I. Cox, M. Miller, J. Bloom, et al., Digital watermarking and steganography, 2008.
  • 2 V. Viswanathan, Information hiding in wave files through frequency domain, Appl. Math. Comput., 201 (2008), 121–127.
  • 3 O. T. C. Chen and W. C. Wu, Highly robust, secure, and perceptual-quality echo hiding scheme, IEEE Transact. Audio Speech Language Process., 16 (2008), 629–638.
  • 4 M. L. Wang, H. X. Lin and M. T. Lee, Robust audio watermarking based on mdct coefficients, in International Conference on Genetic and Evolutionary Computing, 2013.
  • 5 M. Bellaaj and K. Ouni, A robust audio watermarking technique operates in mdct domain based on perceptual measures, Int. J. Adv. Comput. Sci. Appl., 7 (2016), 169–178.
  • 6 F. Petitcolas, Mp3stego. computer laboratory, cambridge.
  • 7 H. Y. Gao, The mp3 steganography algorithm based on huffman coding, Acta Sci. Nat. Uni. Sunyatseni, 46 (2007), 32–35.
  • 8 D. Q. Yan, R. D. Wang and L. G. Zhang, A high capacity mp3 steganography based on huffman coding, J. Sichuan Uni..
  • 9 K. Yang, X. Yi, X. Zhao, et al., Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution, 2017.
  • 10 Z. Ru, J. Liu and Z. Feng, A steganography algorithm based on mp3 linbits bit of huffman codeword, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2017.
  • 11 D. Yan and R. Wang, Huffman table swapping-based steganograpy for mp3 audio, Multim. Tools Appl., 52 (2011), 291–305.
  • 12 ISO/IEC, Information technologycoding of moving pictures and associated audio for digital storage media at up to about 1.5 mbit/s, 11172–3.
  • 13 ITU, Methods for objective measurements of perceived audio quality, BS.1387.
  • 14 C. Cachin, An Information-Theoretic Model for Steganography, 1998.
  • 15 M. S. Atoum, A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography, 2015.
  • 16 X. Yan, X. Liu and C. N. Yang, An enhanced threshold visual secret sharing based on random grids, J. Real-Time Image Process., 14 (2018), 61–73.
  • 17 J. S. Pan, P. W. Tsai and H. C. Huang, Advances in intelligent information hiding and multimedia signal processing, Smart Innovat. System. Technol., 81.
  • 18 M. Hanspach and M. Goetz, On covert acoustical mesh networks in air, arXiv preprint arXiv:1406.1213.
  • 19 M. Guri, Y. Solwicz, A. Daidakulov, et al., Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication.


Reader Comments

your name: *   your email: *  

© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)

Download full text in PDF

Export Citation

Copyright © AIMS Press All Rights Reserved