Araştırma Makalesi
BibTex RIS Kaynak Göster

Stereo Audio Steganography based on Mid/Side Processing

Yıl 2025, Cilt: 8 Sayı: 1, 38 - 45, 23.06.2025

Öz

This paper introduces a novel audio steganography algorithm that integrates principles from music theory and audio mixing techniques. In the field of steganography, audio files are often less favored as cover media due to the heightened sensitivity of the human auditory system. To maintain the principle of imperceptibility, data-hiding capacity is typically reduced. However, the method proposed in this work demonstrates how music production technologies can be effectively applied in audio steganography, ensuring minimal perceptual impact. In particular, the process of separately mixing the mid and side components of the sound with signal processing tools, often used by mixing engineers, brings a new perspective to audio steganography. Experimental results show that even when the entire cover file is utilized for data embedding, the imperceptibility remains intact. Additionally, the proposed method exhibits strong robustness, maintaining message integrity even after MP3 compression also known as one of the common stego-attack-. MATLAB codes related to this study are available at the following link: http://bit.ly/3R6uwZv

Etik Beyan

This manuscript is the original work of the author(s) and has not been published or submitted elsewhere. All relevant ethical guidelines have been followed, and no part of this work involves any form of unethical practice. The data used in this study was obtained from publicly available sources and does not violate any privacy or copyright regulations.

Teşekkür

This article is an updated and expanded version of the paper titled "Audio Steganography with Stereo Audio by Using Mid/Side Processing," presented at the International Conference on Cyber Security and Digital Forensics (ICONSEC'24). We would like to express our gratitude to the conference committee for their valuable feedback, the reviewers who will evaluate this manuscript, and Prof. Dr. Murat Gök for his contributions.

Kaynakça

  • [1] G. Kale, A. Joshi, I. Shukla, and A. Bhosale, “A Video Steganography Approach with Randomization Algorithm Using Image and Audio Steganography,” in 2024 International Conference on Emerging Smart Computing and Informatics, ESCI 2024, Institute of Electrical and Electronics Engineers Inc., 2024. doi: 10.1109/ESCI59607.2024.10497225.
  • [2] Q. Li, B. Ma, X. Wang, C. Wang, and S. Gao, “Image Steganography in Color Conversion,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 71, no. 1, pp. 106–110, Jan. 2024, doi: 10.1109/TCSII.2023.3300330.
  • [3] S. He, D. Xu, L. Yang, H. Dai, and S. Wang, “An anti-steganalysis adaptive steganography for HEVC video based on PU partition modes,” J Vis Commun Image Represent, vol. 98, Feb. 2024, doi: 10.1016/j.jvcir.2023.103995.
  • [4] F. ASLANTAŞ and C. HANİLÇİ, “Comparative Analysis Of Audio Steganography Methods,” Journal of Innovative Science and Engineering (JISE), Jan. 2022, doi: 10.38088/jise.932549.
  • [5] A. E. Altinbaç and Y. Yalman, “Bit Reduction based Audio Steganography Algorithm,” in Proceedings - 6th International Conference on Computer Science and Engineering, UBMK 2021, Institute of Electrical and Electronics Engineers Inc., 2021, pp. 703–706. doi: 10.1109/UBMK52708.2021.9558943.
  • [6] X. Zhang, C. Li, and L. Tian, “Advanced audio coding steganography algorithm with distortion minimization model based on audio beat,” Computers and Electrical Engineering, vol. 106, Mar. 2023, doi: 10.1016/j.compeleceng.2023.108580.
  • [7] R. Bona, D. Fantini, G. Presti, M. Tiraboschi, J. I. Engel Alonso-Martinez, and F. Avanzini, “Automatic Parameters Tuning of Late Reverberation Algorithms for Audio Augmented Reality,” in ACM International Conference Proceeding Series, Association for Computing Machinery, Sep. 2022, pp. 36–43. doi: 10.1145/3561212.3561236.
  • [8] J. Jezdimirovic, N. Pekez, and J. Kovacevic, “Security enhancement of LSB-based audio steganography method,” in 2023 IEEE Zooming Innovation in Consumer Technologies Conference, ZINC 2023, Institute of Electrical and Electronics Engineers Inc., 2023, pp. 77–82. doi: 10.1109/ZINC58345.2023.10174020.
  • [9] H. Rafiee and M. Fakhredanesh, “Presenting a Method for Improving Echo Hiding,” Journal of Computer and Knowledge Engineering, vol. 2, no. 1, 2019, doi: 10.22067/cke.v2i1.74388.
  • [10] M. S. Yadnya, B. Kanata, and M. K. Anwar, “Using Phase Coding Method for Audio Steganography with the Stream Cipher Encrypt Technique,” in Proceedings of the First Mandalika International Multi-Conference on Science and Engineering 2022, MIMSE 2022 (Informatics and Computer Science), Atlantis Press International BV, 2022, pp. 66–75. doi: 10.2991/978-94-6463-084-8_8.
  • [11] A. Kuznetsov, A. Onikiychuk, O. Peshkova, T. Gancarczyk, K. Warwas, and R. Ziubina, “Direct Spread Spectrum Technology for Data Hiding in Audio,” Sensors, vol. 22, no. 9, 2022, doi: 10.3390/s22093115. [12] J. Li, K. Wang, and X. Jia, “A Coverless Audio Steganography Based on Generative Adversarial Networks,” Electronics (Switzerland), vol. 12, no. 5, Mar. 2023, doi: 10.3390/electronics12051253.
  • [13] H. J. Shiu, B. S. Lin, B. S. Lin, W. C. Lai, C. H. Huang, and C. L. Lei, “A Stereo Audio Steganography by Inserting Low-Frequency and Octave Equivalent Pure Tones,” in Advances in Intelligent Systems and Computing, Springer Verlag, 2018, pp. 244–253. doi: 10.1007/978-3-319-68527-4_27.
  • [14] Z. Su, G. Zhang, Z. Shi, D. Hu, and W. Zhang, “Message-Driven Generative Music Steganography Using MIDI-GAN,” IEEE Trans Dependable Secure Comput, 2024, doi: 10.1109/TDSC.2024.3372139.
  • [15] A. S. Master, L. Lu, and N. Swedlow, “Stereo Speech Enhancement Using Custom Mid-Side Signals and Monaural Processing,” AES: Journal of the Audio Engineering Society, vol. 71, no. 7–8, pp. 431–440, 2023, doi: 10.17743/jaes.2022.0070.
  • [16] A. Hines, J. Skoglund, A. Kokaram, and N. Harte, “ViSQOL: The Virtual Speech Quality Objective Listener,” in IWAENC 2012; International Workshop on Acoustic Signal Enhancement, 2012, pp. 1–4.
  • [17] C. H. Taal, R. C. Hendriks, R. Heusdens, and J. Jensen, “A short-time objective intelligibility measure for time-frequency weighted noisy speech,” in 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, 2010, pp. 4214–4217. doi: 10.1109/ICASSP.2010.5495701.
  • [18] A. Hines and N. Harte, “Speech intelligibility prediction using a Neurogram Similarity Index Measure,” Speech Commun, vol. 54, no. 2, pp. 306–320, 2012, doi: https://doi.org/10.1016/j.specom.2011.09.004.
  • [19] ITU, “Mapping function for transforming P.862 raw result scores to MOS-LQO,” Int. Telecomm. Union, Geneva, Switzerland, ITU-T Rec. P.862.1, 2003.
  • [20] A. E. Altinbas, Y. Yalman, “Audio Steganography with Stereo Audio by Using Mid/Side Processing,” in ICONSEC 2024; International Conference on Cyber Security and Digital Forensics, 2024.

Orta/Kenar Bileşenlerinin İşlenmesi Tabanlı Stereo Ses Steganografisi

Yıl 2025, Cilt: 8 Sayı: 1, 38 - 45, 23.06.2025

Öz

Bu çalışmada müzik teorisinin ve ses miksi tekniklerinin kullanıldığı yeni bir ses steganografisi algoritması geliştirilmiştir. Steganografi alanında insan duyma sisteminin hassaslığı nedeniyle kapak olarak ses dosyaları daha az tercih edilmektedir. Çünkü steganografide fark edilemezlik ilkesini sağlamak amacıyla genellikle veri gizleme kapasitesinden feragat edilir. Sunulan yöntem müzik teknolojilerinin ses steganografisinde kullanılmasının bir örneğini içerir. Özellikle ses mühendislerinin çoğu zaman kullandığı, sesin orta ve kenar bileşenlerin sinyal işleme araçlarıyla ayrı ayrı düzenlenmesi işlemi, ses steganografisine yeni bir bakış kazandırmaktadır. Kapak dosyasının tamamının kullanılması durumunda bile deneysel sonuçlar fark edilemezlik ilkesinin sağlandığını göstermektedir. Steganografideki diğer anahtar nokta olan sağlamlık konusunda ise geliştirilen yöntemin MP3 sıkıştırma algoritmasına bile dayanıklı olduğu tespit edilmiştir. Çalışmanın MATLAB kodlarına bu linkten ulaşılabilir: http://bit.ly/3R6uwZv

Etik Beyan

Bu makale, yazarların özgün çalışması olup, başka bir yerde yayımlanmamış veya değerlendirilmek üzere sunulmamıştır. Tüm ilgili etik kurallara uyulmuştur ve çalışmanın hiçbir kısmı etik dışı uygulamalar içermemektedir. Bu çalışmada kullanılan veriler, kamuya açık kaynaklardan elde edilmiş olup, gizlilik veya telif hakkı ihlali söz konusu değildir.

Teşekkür

Bu makale, International Conference on Cyber Security and Digital Forensics (ICONSEC’24) konferansında sunulan "Audio Steganography with Stereo Audio by Using Mid/Side Processing" başlıklı bildirinin güncellenmiş ve genişletilmiş bir versiyonudur. Değerli geri bildirimleri için konferans komitesine, makaleyi değerlendirecek hakemlere ve katkılarından dolayı Prof. Dr. Murat Gök’e teşekkür ederiz.

Kaynakça

  • [1] G. Kale, A. Joshi, I. Shukla, and A. Bhosale, “A Video Steganography Approach with Randomization Algorithm Using Image and Audio Steganography,” in 2024 International Conference on Emerging Smart Computing and Informatics, ESCI 2024, Institute of Electrical and Electronics Engineers Inc., 2024. doi: 10.1109/ESCI59607.2024.10497225.
  • [2] Q. Li, B. Ma, X. Wang, C. Wang, and S. Gao, “Image Steganography in Color Conversion,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 71, no. 1, pp. 106–110, Jan. 2024, doi: 10.1109/TCSII.2023.3300330.
  • [3] S. He, D. Xu, L. Yang, H. Dai, and S. Wang, “An anti-steganalysis adaptive steganography for HEVC video based on PU partition modes,” J Vis Commun Image Represent, vol. 98, Feb. 2024, doi: 10.1016/j.jvcir.2023.103995.
  • [4] F. ASLANTAŞ and C. HANİLÇİ, “Comparative Analysis Of Audio Steganography Methods,” Journal of Innovative Science and Engineering (JISE), Jan. 2022, doi: 10.38088/jise.932549.
  • [5] A. E. Altinbaç and Y. Yalman, “Bit Reduction based Audio Steganography Algorithm,” in Proceedings - 6th International Conference on Computer Science and Engineering, UBMK 2021, Institute of Electrical and Electronics Engineers Inc., 2021, pp. 703–706. doi: 10.1109/UBMK52708.2021.9558943.
  • [6] X. Zhang, C. Li, and L. Tian, “Advanced audio coding steganography algorithm with distortion minimization model based on audio beat,” Computers and Electrical Engineering, vol. 106, Mar. 2023, doi: 10.1016/j.compeleceng.2023.108580.
  • [7] R. Bona, D. Fantini, G. Presti, M. Tiraboschi, J. I. Engel Alonso-Martinez, and F. Avanzini, “Automatic Parameters Tuning of Late Reverberation Algorithms for Audio Augmented Reality,” in ACM International Conference Proceeding Series, Association for Computing Machinery, Sep. 2022, pp. 36–43. doi: 10.1145/3561212.3561236.
  • [8] J. Jezdimirovic, N. Pekez, and J. Kovacevic, “Security enhancement of LSB-based audio steganography method,” in 2023 IEEE Zooming Innovation in Consumer Technologies Conference, ZINC 2023, Institute of Electrical and Electronics Engineers Inc., 2023, pp. 77–82. doi: 10.1109/ZINC58345.2023.10174020.
  • [9] H. Rafiee and M. Fakhredanesh, “Presenting a Method for Improving Echo Hiding,” Journal of Computer and Knowledge Engineering, vol. 2, no. 1, 2019, doi: 10.22067/cke.v2i1.74388.
  • [10] M. S. Yadnya, B. Kanata, and M. K. Anwar, “Using Phase Coding Method for Audio Steganography with the Stream Cipher Encrypt Technique,” in Proceedings of the First Mandalika International Multi-Conference on Science and Engineering 2022, MIMSE 2022 (Informatics and Computer Science), Atlantis Press International BV, 2022, pp. 66–75. doi: 10.2991/978-94-6463-084-8_8.
  • [11] A. Kuznetsov, A. Onikiychuk, O. Peshkova, T. Gancarczyk, K. Warwas, and R. Ziubina, “Direct Spread Spectrum Technology for Data Hiding in Audio,” Sensors, vol. 22, no. 9, 2022, doi: 10.3390/s22093115. [12] J. Li, K. Wang, and X. Jia, “A Coverless Audio Steganography Based on Generative Adversarial Networks,” Electronics (Switzerland), vol. 12, no. 5, Mar. 2023, doi: 10.3390/electronics12051253.
  • [13] H. J. Shiu, B. S. Lin, B. S. Lin, W. C. Lai, C. H. Huang, and C. L. Lei, “A Stereo Audio Steganography by Inserting Low-Frequency and Octave Equivalent Pure Tones,” in Advances in Intelligent Systems and Computing, Springer Verlag, 2018, pp. 244–253. doi: 10.1007/978-3-319-68527-4_27.
  • [14] Z. Su, G. Zhang, Z. Shi, D. Hu, and W. Zhang, “Message-Driven Generative Music Steganography Using MIDI-GAN,” IEEE Trans Dependable Secure Comput, 2024, doi: 10.1109/TDSC.2024.3372139.
  • [15] A. S. Master, L. Lu, and N. Swedlow, “Stereo Speech Enhancement Using Custom Mid-Side Signals and Monaural Processing,” AES: Journal of the Audio Engineering Society, vol. 71, no. 7–8, pp. 431–440, 2023, doi: 10.17743/jaes.2022.0070.
  • [16] A. Hines, J. Skoglund, A. Kokaram, and N. Harte, “ViSQOL: The Virtual Speech Quality Objective Listener,” in IWAENC 2012; International Workshop on Acoustic Signal Enhancement, 2012, pp. 1–4.
  • [17] C. H. Taal, R. C. Hendriks, R. Heusdens, and J. Jensen, “A short-time objective intelligibility measure for time-frequency weighted noisy speech,” in 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, 2010, pp. 4214–4217. doi: 10.1109/ICASSP.2010.5495701.
  • [18] A. Hines and N. Harte, “Speech intelligibility prediction using a Neurogram Similarity Index Measure,” Speech Commun, vol. 54, no. 2, pp. 306–320, 2012, doi: https://doi.org/10.1016/j.specom.2011.09.004.
  • [19] ITU, “Mapping function for transforming P.862 raw result scores to MOS-LQO,” Int. Telecomm. Union, Geneva, Switzerland, ITU-T Rec. P.862.1, 2003.
  • [20] A. E. Altinbas, Y. Yalman, “Audio Steganography with Stereo Audio by Using Mid/Side Processing,” in ICONSEC 2024; International Conference on Cyber Security and Digital Forensics, 2024.
Toplam 19 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Veri Mühendisliği ve Veri Bilimi, Veri Yönetimi ve Veri Bilimi (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Ali Erdem Altınbaş 0000-0002-7233-8014

Yıldıray Yalman 0000-0002-2313-4525

Gönderilme Tarihi 10 Ekim 2024
Kabul Tarihi 12 Ocak 2025
Yayımlanma Tarihi 23 Haziran 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 8 Sayı: 1

Kaynak Göster

APA Altınbaş, A. E., & Yalman, Y. (2025). Stereo Audio Steganography based on Mid/Side Processing. Veri Bilimi, 8(1), 38-45.



Dergimizin Tarandığı Dizinler (İndeksler)


Academic Resource Index

logo.png

journalseeker.researchbib.com

Google Scholar

scholar_logo_64dp.png

ASOS Index

asos-index.png

Rooting Index

logo.png

www.rootindexing.com

The JournalTOCs Index

journal-tocs-logo.jpg?w=584

www.journaltocs.ac.uk

General Impact Factor (GIF) Index

images?q=tbn%3AANd9GcQ0CrEQm4bHBnwh4XJv9I3ZCdHgQarj_qLyPTkGpeoRRmNh10eC

generalif.com

Directory of Research Journals Indexing

DRJI_Logo.jpg

olddrji.lbp.world/indexedJournals.aspx

I2OR Index

8c492a0a466f9b2cd59ec89595639a5c?AccessKeyId=245B99561176BAE11FEB&disposition=0&alloworigin=1

http://www.i2or.com/8.html



logo.png