+
X
Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Communications and Multimedia Security
  3. Conference paper

Pit Stop for an Audio Steganography Algorithm

  • Conference paper
  • pp 123–134
  • Cite this conference paper
Communications and Multimedia Security (CMS 2013)
Pit Stop for an Audio Steganography Algorithm
  • Andreas Westfeld19,
  • Jürgen Wurzer20,
  • Christian Fabian20 &
  • …
  • Ernst Piller20 

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8099))

Included in the following conference series:

  • IFIP International Conference on Communications and Multimedia Security
  • 1438 Accesses

Abstract

Steganography plays an important role in the field of secret communication. The security of such communication lies in the impossibility of proving that secret communication is taking place.

We evaluate the implementation of a previously published spread spectrum technique for steganography in auditive media. We have unveiled and solved several weaknesses that compromise undetectability.

The spread-spectrum approach of the technique under evaluation is rather unusual for steganography and makes the secret message fit to survive A/D and D/A conversions of analogue audio telephony, re-encoded speech channels of GSM/UMTS, or VoIP. Its impact to signal statistics, which is at least concealed by the lossy channel, is reduced. There is little published on robust audio steganography, its steganalysis, and evaluation, with the possible exception of audio watermarking, where undetectability is not as important.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding

Chapter © 2017

Development of an Audio Steganography System Using Discrete Cosine Transform and Spread Spectrum Techniques

Chapter © 2020

Secured Storage of Information Using Audio Steganography

Chapter © 2023

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Cryptology
  • Signal Processing
  • Signal, Speech and Image Processing
  • Speech and Audio Processing
  • Speech and Audio Signal Processing
  • Electroacoustics

References

  1. Tachibana, R., Shimizu, S., Nakamura, T., Kobayashi, S.: An audio watermarking method robust against time- and frequency-fluctuation. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents III (Proc. of SPIE), San Jose, CA, pp. 104–115 (2001)

    Google Scholar 

  2. van der Veen, M., Bruekers, F., Haitsma, J., Klaker, T., Lemma, A.N., Oomen, W.: Robust multi-functional and high-quality audio watermarking technology. In: 110th Audio Engineering Society Convention. Volume Convention Paper 5345 (2001)

    Google Scholar 

  3. Kirovski, D., Malvar, H.S.: Spread-spectrum watermarking of audio signals. IEEE Trans. on Signal Processing 51, 1020–1033 (2003)

    Article  MathSciNet  Google Scholar 

  4. Steinebach, M., Petitcolas, F., Raynal, F., Dittmann, J., Fontaine, C., Seibel, S., Fates, N., Ferri, L.: StirMark benchmark: audio watermarking attacks. In: International Conference on Information Technology: Coding and Computing, pp. 49–54 (2001)

    Google Scholar 

  5. Arnold, M., Baum, P.G., Voeßing, W.: A phase modulation audio watermarking technique. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 102–116. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing 8, 1075–1083 (1999)

    Article  Google Scholar 

  7. Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of spread-spectrum communications—a tutorial. IEEE Transactions on Communications 30, 855–884 (1982)

    Article  Google Scholar 

  8. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Westfeld, A.: Steganography for radio amateurs— A DSSS based approach for slow scan television. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 201–215. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Nutzinger, M., Fabian, C., Marschalek, M.: Secure hybrid spread spectrum system for stegnanography in auditive media. In: 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP, pp. 78–81 (2010)

    Google Scholar 

  11. Nutzinger, M., Wurzer, J.: A novel phase coding technique for steganography in auditive media. In: 6th International Conference on Availability, Reliability and Security, ARES, pp. 91–98 (2011)

    Google Scholar 

  12. Maes, M.: Twin Peaks: The histogram attack to fixed depth image watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 290–305. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  13. Bas, P., Westfeld, A.: Two key estimation techniques for the broken arrows watermarking scheme. In: Proc. of ACM Multimedia and Security Workshop, Princeton, NJ, USA, pp. 1–8 (2009)

    Google Scholar 

  14. Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Kodovský, J., Fridrich, J.: Calibration revisited. In: Proc. of ACM Multimedia and Security Workshop, Princeton, NJ, USA, pp. 63–73 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Dresden University of Applied Sciences, Germany

    Andreas Westfeld

  2. St. Pölten University of Applied Sciences, Austria

    Jürgen Wurzer, Christian Fabian & Ernst Piller

Authors
  1. Andreas Westfeld
    View author publications

    Search author on:PubMed Google Scholar

  2. Jürgen Wurzer
    View author publications

    Search author on:PubMed Google Scholar

  3. Christian Fabian
    View author publications

    Search author on:PubMed Google Scholar

  4. Ernst Piller
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Computer Science, KU Leuven, iMinds-DistriNet, Celestijnenlaan 200A, 3001, Leuven, Belgium

    Bart De Decker

  2. Otto-von-Guericke-Universität Magdeburg, Universitätsplatz 2, 39106, Magdeburg, Germany

    Jana Dittmann  & Christian Kraetzer  & 

  3. Fachhochschule Brandenburg, Otto-von-Guericke-Universität Magdeburg, Magdeburger Str. 50, 14770, Brandenburg, Germany

    Claus Vielhauer

Rights and permissions

Reprints and permissions

Copyright information

© 2013 IFIP International Federation for Information Processing

About this paper

Cite this paper

Westfeld, A., Wurzer, J., Fabian, C., Piller, E. (2013). Pit Stop for an Audio Steganography Algorithm. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds) Communications and Multimedia Security. CMS 2013. Lecture Notes in Computer Science, vol 8099. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40779-6_10

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-40779-6_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40778-9

  • Online ISBN: 978-3-642-40779-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • information hiding
  • steganalysis
  • spread spectrum BPSK
  • VoIP steganography

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

23.94.208.52

Not affiliated

Springer Nature

© 2025 Springer Nature

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载