Top Banner
A New Method for Audio Steganography Using Message Integrity 1 Mohammed Salem Atoum, 2 Subariah Ibrahim, 3 Ghazali Sulong and 4 Mazdak Zamani 1 Universiti Teknologi Malaysia, [email protected] *2,Corresponding Author Universiti Teknologi Malaysia, [email protected] 3 Universiti Teknologi Malaysia, [email protected] 4 Universiti Teknologi Malaysia, [email protected] Abstract Steganography which is normally used to solve security issues can be implemented using two processes, namely embedding and extracting. With current steganography methods it is not possible to ascertain and verify that the secret message has been attacked or otherwise. This paper proposes an enhanced secure method for audio steganography (SSAS) which can perform better than that proposed by Atoum et al [11]. This proposed method has the capability to verify whether the secret message has been attacked or not, thus improving the message security. PSNR and X 2 are two criteria used in the experiment to gauge the robustness and imperceptibility of the stego–object file for the proposed SSAS. Keywords: Steganography, Message Integrity, LSB, MP3 1. Introduction Nowadays, internet has become a key technology in which information is gathered, processed and distributed to people in different parts of the world. The internet enables quick and efficient information communication and acquisition. One of the issues of great concern to many users of the internet is information security. There are two basic ways in which information can be made secure; these include cryptography and steganography [1]. Cryptography is a Greek word which means secret writing. It refers to the process of changing information into a form that is hard to recognize using well defined rules (keys) which ensure that only those specific people who have the keys can get access to that information [2]. Steganography is a Greek word which means covered writing. It refers to hiding information or object in a secret place that cannot be accessed and detected by anyone except those who are familiar with the secret sender [2]. This paper introduces various concepts of steganography and compares the different communication protocols used. It discusses several important research works to show that not all steganography schemes use message integrity. This paper proposes SSAS and discusses the performance of SSAS through results of tests and experiments conducted. 2. Steganography Steganography or (Covert Communication) is an ancient art that has been reborn in recent years; it plays an increasingly important role in today's connected society, as the demand for covert communications and digital copyright protections continues to rise [3]. Steganography basically aims at hiding communication between two parties from the attackers [4]. Steganography operates by embedding a secret message which might be a copyright mark, or a covert communication, or a serial number in a cover message such as a video film, an audio recording, or computer code in such a way that it cannot be accessed by any wrong person during data exchange. A cover message containing a secret message is known as a Stego Object [5]. After data exchange, it is advisable for both parties (sender and receiver) to destroy the cover messages in order to avoid accidental reuse. The basic model of a Steganography system is shown in the Figure 1 [6]. Each steganography method consists of the embedding process and the extracting process. The embedding process is used to hide secret messages inside a cover messages, the embedding process is protected by a key word so that only those who possess the secret key word can access the hidden message, while the extracting algorithm is applied to a possibly modified carrier and returns the hidden secret message. A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani Journal of Convergence Information Technology(JCIT) Volume8, Number14, September 2013 35
10

A new method for audio steganography using message integrity

Apr 23, 2023

Download

Documents

Fatimah Puteh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A new method for audio steganography using message integrity

A New Method for Audio Steganography Using Message Integrity

1Mohammed Salem Atoum, 2Subariah Ibrahim, 3Ghazali Sulong and 4Mazdak Zamani 1Universiti Teknologi Malaysia, [email protected]

*2,Corresponding Author Universiti Teknologi Malaysia, [email protected] 3Universiti Teknologi Malaysia, [email protected]

4Universiti Teknologi Malaysia, [email protected]

Abstract Steganography which is normally used to solve security issues can be implemented using two

processes, namely embedding and extracting. With current steganography methods it is not possible to ascertain and verify that the secret message has been attacked or otherwise. This paper proposes an enhanced secure method for audio steganography (SSAS) which can perform better than that proposed by Atoum et al [11]. This proposed method has the capability to verify whether the secret message has been attacked or not, thus improving the message security. PSNR and X2 are two criteria used in the experiment to gauge the robustness and imperceptibility of the stego–object file for the proposed SSAS.

Keywords: Steganography, Message Integrity, LSB, MP3

1. Introduction

Nowadays, internet has become a key technology in which information is gathered, processed and

distributed to people in different parts of the world. The internet enables quick and efficient information communication and acquisition. One of the issues of great concern to many users of the internet is information security. There are two basic ways in which information can be made secure; these include cryptography and steganography [1].

Cryptography is a Greek word which means secret writing. It refers to the process of changing information into a form that is hard to recognize using well defined rules (keys) which ensure that only those specific people who have the keys can get access to that information [2].

Steganography is a Greek word which means covered writing. It refers to hiding information or object in a secret place that cannot be accessed and detected by anyone except those who are familiar with the secret sender [2]. This paper introduces various concepts of steganography and compares the different communication protocols used. It discusses several important research works to show that not all steganography schemes use message integrity. This paper proposes SSAS and discusses the performance of SSAS through results of tests and experiments conducted.

2. Steganography

Steganography or (Covert Communication) is an ancient art that has been reborn in recent years; it

plays an increasingly important role in today's connected society, as the demand for covert communications and digital copyright protections continues to rise [3].

Steganography basically aims at hiding communication between two parties from the attackers [4]. Steganography operates by embedding a secret message which might be a copyright mark, or a covert communication, or a serial number in a cover message such as a video film, an audio recording, or computer code in such a way that it cannot be accessed by any wrong person during data exchange. A cover message containing a secret message is known as a Stego Object [5]. After data exchange, it is advisable for both parties (sender and receiver) to destroy the cover messages in order to avoid accidental reuse. The basic model of a Steganography system is shown in the Figure 1 [6].

Each steganography method consists of the embedding process and the extracting process. The embedding process is used to hide secret messages inside a cover messages, the embedding process is protected by a key word so that only those who possess the secret key word can access the hidden message, while the extracting algorithm is applied to a possibly modified carrier and returns the hidden secret message.

A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani

Journal of Convergence Information Technology(JCIT) Volume8, Number14, September 2013

35

Page 2: A new method for audio steganography using message integrity

Figure.1 Basic Model Of Steganography Three types of steganography include the pure steganography, secret key steganography and public

key steganography. The three types of steganography are described in the sections below. Pure steganography does not require the prior exchange of some secret information (like a stego-

key). Its embedding process can be described by mapping E: C × M → C, The extraction process which involves the extraction of a secret message from a cover message is defined by mapping D: C → M. Where C is the set of possible covers and M is the set of possible messages and │C│≥│M│. In pure steganography, the only people who can access the algorithms used during the embedding and extraction processes are the sender and receiver not the public [5]. However the method has a drawback of being less secured since the sender and receiver rely only on the assumption that no other parties are aware of this secret message.

Secret key steganography requires exchange of a secret key (Stego-Key) prior to communication. Secret key steganography embeds the secret message inside a cover message by using a secret key (Stego-Key). In this method, the secret message can be read by parties who know the secret key. Unlike pure Steganography where a perceived invisible communication channel is present, secret key steganography exchanges a Stego-Key, which makes it more susceptible to interception. The advantage with the secret key steganography is that even if it is intercept, only parties who know the secret key can extract the secret message [7].

Public key steganography is based on the concepts of public key cryptography. Public key steganography uses a public key and a private key to secure the communication between the parties. Public key steganography operates in such a way that the sender uses the public key during the encoding process and uses only the private key, which has a direct mathematical relationship with the public key to decipher the secret message. Some of the advantages of Public key Steganography include its more robust in such a way that it utilizes much more robust and researched technology in public key cryptography.

It also has multiple levels of security which makes it difficult for others to access the secret message. They first have to make so many guesses during in order to crack the algorithm used in the public key system before they could intercept the secret message [7].

Referring to the types of Steganography model can be observed all types used the real information in the secret message to embed it by using any embedding algorithms. So if the attacker detects the stego-object, it is easily to read secret message, and can be easily to change or remove the secret message [9].

Thus to solve this problem, some of researchers use the cryptography technique to encrypt data before it is embedded. However, this way can be increase the complexity of steganography techniques and also reduce the size of the secret message that will be embedded, because the encryption algorithms can double the size of message.

Hence, an outlet should be found for addressing or scrambling the secret message without using encrypted algorithms, and for reducing how probable an attacker is to read the real information of secret message. Moreover, as the secret message is extracted, no validation checks are needed either if it is modified or is still the same. In our proposed method, we will develop a new model for steganography that can use message scrambling before embedding and message validation after extraction the secret message to achieve security as much as possible.

Extraction Process

Embedding Process

Message

Cover

Stego-Object Message

Key Key

A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani

36

Page 3: A new method for audio steganography using message integrity

3. Related works Little research is using message integrity in steganography. Most researchers work on image

steganography. Park et al., [8], has proposed an image steganography method which is used to verify the secret information that is embedded in a spatial domain of the cover image had been deleted, forged or changed by attackers. This method uses AC coefficients of the Discrete Cosine Transform (DCT) domain.

J. Fridrich et al., [12], has shown the analyzation of the security of Least Significant Bit (LSB) embedding for hiding messages in high-colour-depth digital images. They have focused a particular steganography attack that is stego-only attack. The method enables to detect the presence of pseudorandom message randomly spread in a colour image with quite reliability based on statistical analysis of the image colours in the RGB Cube. L.M. Marvel et al., [13], have presented a method of embedding information within digital image Steganography and used the combination of the techniques of spread spectrum communication, error control coding and Image processing. The secret information is embedded within the noise, which is then added to the digital Image. The noise is kept at low levels, such that it is not perceptible to human eye and susceptible to detection by computer analysis without access to the original image.

Dabeer et al., [14], proposed a theory of hypothesis testing to the detection of the hidden image in the least significant bit (LSB) of the host image based on two types of tests, one is the universal method that has a certain asymptotic optimality properties. And the other method is based on knowledge or the estimation of the host probability mass function (PMF). All previous work focused in Image file in frequency domain. In this paper discuss message integrity and verification in audio steganography in time domain by applied two mathematical and logical equations in secret message.

4. Proposed method

This section explains the proposed method. The framework consists of three phases: message

preparation, embedding, extracting process and message validation. The method will be conducted a cording to the workflow process as illustrated in Figure2.

Figure.2 Proposed Method

Cover

Message

Blocks Permutation

Stego-Embed

Map

Obscure Checksum

Embedding Process

Stego Object

Extracting Process

Validation Process

Message

Message integrity

A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani

37

Page 4: A new method for audio steganography using message integrity

4.1 Message preparation In this phase the input is Message (M). Block permutation is a process that contains three steps:

message partition, message permutation and message confirmation. By using Eq.1, M can be partitioned into multi blocks. These blocks are entered to Eq.2 to permutated blocks to reorder the M. From equation 1 and 2, the outputs are Stego-Embed (SE) and Map (P). SE will be used in embedding process and P will be used in extracting process to extract message.

N= Size(C) / Size (M) (1) Where, N is the number of partition and C is cover and M is message. P (N) =N! (2) Where, P (N) is permutation number and N number of blocks. The last step is to apply two equations; the first equation is a mathematical model to summation all

bits in M by Eq.3 and the second one is a logical equation to encode the secret message with sender's name and the result in Eq.4.

V1=checksum (M) (3) V2=XOR (M, sender name) (4) V1 and V2 can be used by the receiver to be matching with the secret message that is already

extracted to prove whether or not it is attacked.

4.2 Embedding and extraction process In this phase have two Processes; the embedding and extracting processes. In the embedding

process, using LSB technique is used to embed SE in C and the result is stego-object (SO) that will be sent to the receiver to extract message by using following steps:

To prepare C and SE. To generate random sequence to select first even byte from the first 10,000 byte in C GR= position (i) (5) To just use even value of byte in C for each embedding methods. To use 4-LSB to change bit stream from SE in byte in C. The position for embedding in byte start

from 2nd position to 5th position in the byte and start embedding in C not from first byte but from the GR value was computed in step 2

To calculate the next byte will be used to jump by using equation: J= I+(I mod 100) (6) Where I is index for position byte was used before to embed. To return from step 3 to complete embedding SE in C Having embedded the secret message into the cover audio data, the SO is constructed. Once the

embedded data is needed then the SO passes through the extraction process. Moreover, After finish embedding process will be evaluate SO before sending to receiver by using two statistical attacks: PSNR and chi-square, and discuss later in phase three evaluation and validation process.

During the extracting process the receiver will inverse the embedding steps to extract SE, apply P to the reorder M and return it as original M

To received SO. To search to find GR value. To extract bit from 2nd to 5th position from SO. To apply Eq.6 so as to jump then to the next byte. To return from step 3 to complete the extraction of SE. To return the secret message to be original by applying P to reordering the byte of SE to M. Figure 3 shows how can to return secret message was extracted to reorder SE to be M

Figure.3 Reorder Secret Message

SE P

M

A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani

38

Page 5: A new method for audio steganography using message integrity

4.3 Message validation and evaluation In this phase, there are two processes: the validation and the evaluation processes. In the validation

process, two equation checks will be applied checksum and XOR binary to construct V1' and V2' to be matching with the result that is received to end-user to check if the file is attacked or not.

the receiver applies Eq3 and Eq4 to calculate V1' and V2' to get result. If the V1=V1' and V2=V2', that should mean the message is not attacked; otherwise, the message is attacked. Figure 4 below shows the validation process.

Figure.4 Validation Process

In the evaluation process, Chi-Square (X2) will be used to attack and PSNR to evaluate proposed

method. The X2 attack is implemented to check the probability of containing the secret data in the SO. Chi-Square is one of the most popular statistical steganalysis techniques. In order to compute the value of Chi-Square, the number of occurrence for each bit value is computed by using Eq.7

f *2i = (7) Where, fi & fi+1 indicate the frequencies of vector i & i+1 respectively. Finally, the value of Chi-Square will be calculated as shown in Eq.8

X2 =∑ ∗∗ (8) Where k indicates the degree of freedom, f2i represents observation value and f*2i means the

expected value. The probability of the SO containing the secret data can be determined by using Eq.9. If the value of

the probability is close to one, this indicates that there is a message in the cover. Otherwise, if the probability is close to zero, this indicates that there is no message hidden in this cover. Furthermore, this attack is not only able to determine where a message has been embedded, but also calculates the length of the message [15].

Probability=1 − ∫ e x dx (9)

Mean Square Error: It is defined as the square of error between cover and the stego-object. The distortion in the cover can be measured using MSE.

V1=V'1? V2=V'2?

Yes

Apply V'1 and V'2 V'1= Checksum (SE)

V'2= XOR (SE, Receiver name)

No

SE

Message not attacked

Message attacked

A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani

39

Page 6: A new method for audio steganography using message integrity

MSE =∑ ( () ())^ (10) Where, N is the cover size. Peak Signal to Noise Ratio: It is the ratio of the maximum signal to noise in the stego- object.

PSNR = 20 ∗ √ (11)

5. Experimental results Data set uses for analysis show in the Table1, we will use a different size for the cover audio file

and 49,152 byte for the secret message size to evaluate our proposed method. According to Table1, the proposed method result is better than LSB based method. The results have

revealed that the imperceptibility is almost identical whereby the PSNR increase as the size if the cover increases. Furthermore, the PSNR is decrease if the payload increases. The result is near 70db if the size of file more 10MB. However, the result of proposed method is better than the result for LSB based. Moreover, the proposed method is more secure than the LSB based one. This refer to the spread secret message in the proposed method to all the cover; however, the sequential spread is used but in LSB based method.

Table1. Experimental Results

Figure 5 shows the result for Table1. According to figure 5 can derived the PSNR results for our

proposed method are better than LSB standred for all genre name and size.

Figure.5 PSNR results for method

In figure 6 shows the result for X2. The percentage of the cover starts from 0 to 100, where 100% refers to the testing of the whole cover. In contrast, the probability of the containing secret message starts from zero until the result of the Chi-Square attack. If the probability equals zero, this means that this cover does not contain secret message and vice versa when the probability equals one. Figure 6 depicts that the probability is almost zero for the entire test. This indicates there is no hidden message inside the cover.

Name of genre

Time (M)

Size (MB) Methods 1-LSB

2nd 2-LSB 2nd and 3rd

4-LSB 2nd to 5th

Pop 4:00 9.16 Proposed 68.1169 63.5346 54.0515 LSB Based 65.4643 61.2813 51.8210

Rock 4:33 10.4 Proposed 68.7939 64.2529 55.0656 LSB Based 65.9416 61.8958 52.5673

Blues 4:41 10.7 Proposed 68.8293 64.1227 54.5194 LSB Based 66.1580 61.8909 52.3518

Hip-hop 5:27 12.4

Proposed 69.4254 64.7310 55.3845 LSB Based 66.7714 62.5515 53.1363

Dance 6:12 14.2 Proposed 70.0500 65.4433 55.8976 LSB Based 67.3921 63.1824 53.6835

Metal 6:28 14.8 Proposed 70.1427 65.4555 56.0172 LSB Based 67.5639 63.3289 53.8740

A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani

40

Page 7: A new method for audio steganography using message integrity

Figure.6 Chi-Square Result

In order for future work to achieve potentially more security the idea of this work can be used for

other related works in [18-48].

6. Conclusions Basically the designer for Steganography technique used a basic model for embedding and

extracting the secret messages. Some of them used a key for embedded message in the host signal and also used the same key to extract secret messages.

The basic model of steganography used real information for the secret message that is embedded in the cover media, and the result stego-object contains the cover and the message. However, the probability for attackers to destroy the secret message and to read it is increased. So the attacked secret message can be modified or removed as it is has been discovered by because the attacker.

A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani

41

Page 8: A new method for audio steganography using message integrity

The proposed method has given two solutions: firstly, to scramble the secret message before it is embedded. Secondly, the verification process is used after extraction the secret message so as to check the secret message that was attacked, deleted and modified.

Additionally, the proposed method with random selections provides a high level of robustness, where these results are more similar to the results of the original cover than the results of the proposed method with sequential selection. Also, the random selection produces higher security as compared to the sequential selection. This is due the fact that the random embedding of the secret message makes it very difficult for the attacker to extract the whole message that is hidden inside the stego-object.

7. Acknowledgment

This work was supported by Universiti Teknologi Malaysia (UTM), Johor, Malaysia under the

VOT:Q.J13000.7128.00J29

8. References

[1] Lentij J., “Steganographic Methods”, Department Of Control Engineering And Information Technology, Budapest University. Periodica Poltechnica Ser. El. Eng. Vol.44, No. 3–4, P. 249–258 (2000), Url: Http://Www.Citesseer.Ist.Psu.Edu/514698.Html.

[2] Petitcolas F.A, Anderson R.J., Kuhn M.G., “Information Hiding – A Survey”, Ieee, Special Issue On Protection Of Multimedia Content: 1062-1078, July, 1999.

[3] R. Matthews. On the derivation of a chaotic encryption [4] algorithm.Cryptologia, XIII(1):29 42, 1989. [5] Seppanen T., Cvejic N., “Increasing The Capacity Of Lsb-Based Audio steganography”, Ieee 0-

7803-7713, 2002,Url:Www.Mediateam.Oulu.Fi/Puplications/Pdf/374.Pdf. [6] Katzenbeisser S., Peticotas F., “Information Hiding Techniques For steganography And Digital

Watermarking”, Artech House Inc.2000. [7] Cacciaguerra S., Ferretti S., “Data Hiding: Steganography And Copyright Marking”, Department

Of Computer Science, University Of Bologna, Italy, Url: Http://Www.Cs.Unibo.It/~Scacciag/HomeFile/Teach/Datahiding.Pdf.

[8] Dunbar, B., “Seganographic Techniques and their use in an Open-Systems Environment, The Information Security Reading Room, SANS Institute 2002

[9] http://www.sans.org/reading-room/whitepapers/covert/677.php [10] K. Y. Youngran Park, Hyunho Kang and K.Kobayashi, “Integrity verification of secret information

in image steganography,” The 20th Symposium on Information Theory and its Application, pp. 182–185,Nov 2006

[11] Atoum, M. S., Suleiman, M., Rababaa, A., Ibrahim, S., & Ahmed, A. (2011). A steganography Method Based on Hiding secretes data in MPEG / Audio Layer III. Journal of Computer Science, 11(5), 184-188.

[12] Atoum, M. S., Ibrahim, S., Sulong,G. & Ahmed, A. (2012). MP3 Steganography: Review. Journal of Computer Science issues, 9(6).

[13] Atoum, M. S., Ibrahim, S., Sulong, G., & Ahmed, A. (2013).New Secure Scheme in Audio Steganography (SSAS). Australian Journal of Basic and Applied Sciences, 7(6), 250–256.

[14] R. D. Jiri Fridrich and M. Long, “Steganalysis of LSB encoding in Color Images,” in International Conference on signal Processing, pp. 1279–1282, Jan 2000.

[15] C. T. R. Lisa M. Marvel and C. G. Boncelet, “Hiding Information in Images,” in International Conference on Image Processing, pp. 396–398,Mar 1998.

[16] U. M. S. Onkar Dabeer, kenneth Sullivan and B. S. Manjunath, “Detection of Hiding in the Least Significant Bit,” in IEEE Transaction on Signal Processing, pp. 362–375, Oct 2004.

[17] Fridrich, J. Goljan, M. and Soukal, D. (2003). Higher-Order Statistical Steganalysis of Palette Images. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, California, 178-190.

[18] Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Saman Shojae Chaeikar Hossein Rouhani Zeidanloo. “Genetic Audio Watermarking”. Book: Information

A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani

42

Page 9: A new method for audio steganography using message integrity

Processing and Management. Springer Berlin Heidelberg, ISBN: 978-3-642-12213-2. 514-517. 2010.

[19] Mazdak Zamani, Azizah Bt Abdul Manaf, Shahidan M. Abdullah, Saman Shojae Chaeikar. Mazdak Technique for PSNR Estimation in Audio Steganography. ISSN: 1660-9336. Applied Mechanics and Materials. Vols. 229-231 (2012). pp 2798-2803. Trans Tech Publications, Switzerland.

[20] Alaa A. Jabbar, Shahrin Bin Sahib, Mazdak Zamani. Pixel Correlation Behavior in Different Themes. Communications in Computer and Information Science. Springer Berlin Heidelberg. ISSN: 1865-0929. 2013. (2013 International Conference on Geo-Informatics in Resource Management & Sustainable Ecosystem [GRMSE2013]. Nov 08-Nov 10, 2013. Wuhan, China.)

[21] Alaa A. Jabbar, Shahrin Bin Sahib, Mazdak Zamani. Correlation Analysis of the Four Photo Themes in Five Layers. Communications in Computer and Information Science. Springer Berlin Heidelberg. ISSN: 1865-0929. 2013. (2013 International Conference on Geo-Informatics in Resource Management & Sustainable Ecosystem [GRMSE2013]. Nov 08-Nov 10, 2013. Wuhan, China.)

[22] Mazdak Zamani, Azizah Abdul Manaf, Rabiah Ahmad, Akram Zeki, and Shahidan Abdullah. A Genetic-Algorithm-Based Approach for Audio Steganography. World Academy of Science, Engineering and Technology. 30 2009. ISSN: 2070-3740. Pages: 355-358. 24-26 June 2009.

[23] Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad, and Akram M. Zeki. An Artificial-Intelligence-Based Approach for Audio Steganography. Journal of Open Problems in Science and Engineering. Volume: 1 Issue: 1. Oct 2009. ISSN: 2077-1118. Pg 64-68.

[24] Mazdak Zamani, Azizah Abdul Manaf, Rabiah Ahmad, Farhang Jaryani, Hamed Taherdoost, Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo. “A Novel Approach for Genetic Audio Watermarking”. Journal of Information Assurance and Security 5 (2010). ISSN: 1554-1010. Pages 102-111.

[25] Mazdak Zamani, Azizah Abdul Manaf, Rabiah Ahmad, Farhang Jaryani, Hamed Taherdoost, Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo. Genetic Audio Steganography. International Journal on Recent Trends in Engineering & Technology. Vol 3 (2), 2010. ISSN: 2158-5563. Pg 89-91.

[26] Shahidan M. Abdullah, Azizah A. Manaf, Mazdak Zamani. Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques. Journal of Information Security Research. Volume 1 Number 2. June 2010. Pg 64-70. ISSN: 0976-4143. Online ISSN: 0976-4151.

[27] Mazdak Zamani, Azizah Abdul Manaf, Hossein Rouhani Zeidanloo, and Saman Shojae Chaeikar. “Genetic Subtitution-Based Audio Steganography for High-Capacity Applications”. International Journal for Internet Technology and Secured Transactions (IJITST). Pages 97-110. ISSN 1748 - 5703 (Online). Volume 3 Issue 1, April 2011. Inderscience Publishers, Geneva, Switzerland.

[28] Akram M. Zeki, Azizah A. Manaf, Adamu A. Ibrahim and Mazdak Zamani. A Robust Watermark Embedding in Smooth Areas. Research Journal of Information Technology. Year: 2011. Volume: 3. Issue: 2. Page No.: 123-131. DOI: 10.3923/rjit.2011.123.131. eISSN: 2151-7959.

[29] Mazdak Zamani, Azizah Bt Abdul Manaf, Shahidan M. Abdullah. An Overview on Audio Steganography Techniques. International Journal of Digital Content Technology and its Applications. Advanced Institute of Convergence Information Technology. 2012. ISSN: 2233-9310.

[30] Alaa A. Jabbar, Shahrin Bin Sahib, Mazdak Zamani. Determining the threshold of pixel correlativity analysis. International Journal of Digital Content Technology and its Applications. Advanced Institute of Convergence Information Technology. Volume 7, Number 11, July 2013. doi : 10.4156/jdcta.vol7.issue11.19. ISSN: 2233-9310.

[31] Mazdak Zamani; Azizah Abdul Manaf. "Genetic algorithm for fragile audio watermarking". Telecommunication Systems, Special Issue on Innovations in Emerging Multimedia Communication Systems, “In Press”. ISSN: 1018-4864. Publisher: Springer. Impact factor: 1.027.

[32] Mazdak Zamani, Azizah Abdul Manaf, and Rabiah Ahmad. “Knots of Substitution Techniques of Audio Steganography”. The 2009 International Conference on Telecom Technology and Applications. Pages 415-419. June 6-8, 2009. Manila, Philippines.

[33] Mazdak Zamani, Azizah Abdul Manaf, and Rabiah Ahmad. “Current Problems of Substitution Technique of Audio Steganography”. International Conference on Artificial Intelligence and

A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani

43

Page 10: A new method for audio steganography using message integrity

Pattern Recognition. ISBN: 978-1-60651-007-0. Pg 154-160. 13-16 July 2009. Orlando, Florida, USA.

[34] Mazdak Zamani, Azizah Abdul Manaf, Rabiah Ahmad, Akram Zeki, and Shahidan Abdullah. “Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography”. The 2009 International Conference on Genetic and Evolutionary Methods. 13-16 July 2009. Pages 170-175. Las Vegas, Nevada, USA.

[35] Mazdak Zamani, Azizah Abdul Manaf, Rabiah Ahmad, Akram Zeki. An Approach to Improve the Robustness of Substitution Techniques of Audio Steganography. 2nd IEEE International Conference on Computer Science and Information Technology 2009. Vol 2. Pg 5-9. 8-11 Aug 2009. Beijing, China.

[36] Mazdak Zamani, Hamed Taherdoost, Azizah Abdul Manaf, Rabiah Ahmad, and Akram Zeki. “Robust Audio Steganography via Genetic Algorithm”. Third International Conference on Information & Communication Technologies. Pages 149 - 153. 15-16 August 2009. Karachi, Pakistan.

[37] Mazdak Zamani, Azizah Abdul Manaf, Rabiah Ahmad, Akram Zeki, and Pritheega Magalingam. “A Novel Approach for Audio Watermarking”. Fifth International Conference on Information Assurance and Security. ISBN: 978-0-7695-3744-3. Pages 83-86. 18-20, August 2009. Xi'an, China.

[38] Mazdak Zamani, Azizah Abdul Manaf, Rabiah Ahmad, Farhang Jaryani, Hamed Taherdoost, and Akram Zeki. “A Secure Audio Steganography Approach”. The 4th International Conference for Internet Technology and Secured Transactions. ISBN: 978-0-9564263-1-4. Pages 501-506. 9-12 November 2009. London, UK.

[39] Akram M. Zeki, Azizah A. Manaf, and Mazdak Zamani. Bit-Plane Model: Theory and Implementation. Engineering Conference 2010 (EnCon2010). 14-16 April 2010. Kuching, Sarawak, Malaysia.

[40] Nuha Omran Abokhdair, Azizah Bt Abdul Manaf, Mazdak Zamani. Integration of Chaotic Map and Confusion Technique for Color Medical Image Encryption. 6th International Conference on Digital Content, Multimedia Technology and its Applications. 20-23. 16-18 Aug 2010. Seoul, Korea.

[41] Shahidan M. Abdullah, Azizah A. Manaf, and Mazdak Zamani. Capacity and Quality Improvement in Reversible Image Watermarking Approach. 6th International Conference on Networked Computing and Advanced Information Management. 81-85. 16-18 August 2010. Seoul, Korea.

[42] Mazdak Zamani, Azizah Bt Abdul Manaf, Shahidan M. Abdullah, Saman Shojae Chaeikar. Correlation between PSNR and Bit per Sample Rate in Audio Steganography. 11th International Conference on Signal Processing. Pgs 163-168.. France, April 2-4, 2012.

[43] Mazdak Zamani, Azizah Bt Abdul Manaf, Shahidan M. Abdullah. Correlation between PSNR and Size Ratio in Audio Steganography. 11th International Conference on Telecommunications and Informatics. Pages 82-87. Saint Malo & Mont Saint-Michel. France, April 2-4, 2012.

[44] Mazdak Zamani, Azizah Bt Abdul Manaf, Shahidan M. Abdullah. Efficient Embedding for Audio Steganography. 2nd International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics. Pg 195-199. Saint Malo. France, April 2-4, 2012.

[45] Mazdak Zamani, Azizah Abdul Manaf, and Rusni Daruis. “Azizah Technique for Efficiency Measurement in Steganography”. ICIDT 2012, 8th International Conference on Information Science and Digital Content Technology 3, art. No. 6269320, pp. 480-484. June 26-28, 2012. Jeju, Korea.

[46] Alaa A. Jabbar, Shahrin Bin Sahib, Mazdak Zamani. An Introduction to Image Steganography Techniques. International Conference on Advanced Computer Science Applications and Technologies (ACSAT’12). 26-28 November 2012.

[47] Alaa A. Jabbar, Shahrin Bin Sahib, Mazdak Zamani. Multimedia Data Hiding Evaluation Metrics. 7th WSEAS International Conference on Computer Engineering and Applications (CEA '13). Milan, Italy. January 9-11, 2013.

[48] Alaa A. Jabbar, Shahrin Bin Sahib, Mazdak Zamani. An Introduction to Watermarking Techniques. 12th WSEAS International Conference on Applications of Computer Engineering (ACE '13). Cambridge, MA, USA. January 30 - February 1, 2013.

A New Method for Audio Steganography Using Message Integrity Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong, Mazdak Zamani

44