Speech Steganography in Wavelet Domain Using Continuous Genetic Algorithm
-
2432
Downloads
-
3635
Views
Authors
Hojat Allah Moghaddasi
- Department of Information Communication Technology, Malek Ashtar University of Technology, Iran.
Mohammad Fakhredanesh
- Department of Information Communication Technology, Malek Ashtar University of Technology, Iran.
Abstract
In this paper, we present a new adaptive steganography method using Lifting Wavelet Transform
(LWT). In this method, we first calculate the LWT of the sample of host and secret speech signal. Then
wavelet coefficients of secret speech signal will be fitted effectively and efficiently in host signal wavelet
coefficients using continuous genetic algorithm. We used indirect replacement technique in 5 bits host
using a proposed formula. Due to the quantization error, there are some differences between the secret
signal before steganography and the extracted signal after steganography. However, these differences
have an appropriate Gaussian noise model. We compress these differences using Huffman lossless
compression method. The compression rate of such differences approach to the entropy, which is derived
from Shannon's first theorem. Huffman lossless compression method, cause to small noise. We these
compressed differences sent along the stego signal. The experimental results show that the proposed
model has a statistical transparency higher than Least Significant Bit (LSB), Frequency Masking (FM)
and Efficient Wavelet Masking (EWM) algorithms in time domain and frequency domain.
Share and Cite
ISRP Style
Hojat Allah Moghaddasi, Mohammad Fakhredanesh, Speech Steganography in Wavelet Domain Using Continuous Genetic Algorithm, Journal of Mathematics and Computer Science, 11 (2014), no. 3, 218 - 230
AMA Style
Moghaddasi Hojat Allah, Fakhredanesh Mohammad, Speech Steganography in Wavelet Domain Using Continuous Genetic Algorithm. J Math Comput SCI-JM. (2014); 11(3):218 - 230
Chicago/Turabian Style
Moghaddasi, Hojat Allah, Fakhredanesh, Mohammad. "Speech Steganography in Wavelet Domain Using Continuous Genetic Algorithm." Journal of Mathematics and Computer Science, 11, no. 3 (2014): 218 - 230
Keywords
- Lifting Wavelet Transform (LWT)
- Elitism
- Incest prevention
- Premature convergence
- Cycle crossover
- Crowding Factor (CF)
MSC
References
-
[1]
D. M. Ballesteros, J. M. Moreno, Highly transparent steganography model of speech signals using Efficient Wavelet Masking, Expert Systems with Applications, 39 (2012), 9141-9149
-
[2]
F. Djebbar et al., A view on latest audio steganography techniques, in Innovations in Information Technology (IIT), 2011 International Conference on, (2011), 409-414.
-
[3]
N. Cvejic, T. Seppanen, A wavelet domain LSB insertion algorithm for high capacity audio steganography, in Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop. Proceedings of 2002 IEEE 10th, (2002), 53-55.
-
[4]
A. Delforouzi, Mohammad Pooyan, Adaptive digital audio steganography based on integer wavelet transform, Circuits, Systems & Signal Processing , 27 (2008), 247-259.
-
[5]
T. Manzuri et al., High capacity error free wavelet domain speech steganography, In Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, (2008), 1729-1732
-
[6]
F. Djebbar, H. Hamam, K. Abed-Meraim, D. Guerchi, Controlled distortion for high capacity data-in-speech spectrum steganography, in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on, (2010), 212-215.
-
[7]
D. E. Skopin et al., Advanced algorithms in audio steganography for hiding human speech signal, in Advanced Computer Control (ICACC), 2010 2nd International Conference on, (2010), 29-32.
-
[8]
J. H. Holland, Adaptation in natural and artificial systems: An introductory analysis with applications to biology, control, and artificial intelligence, U Michigan Press, (1975)
-
[9]
R. L. Haupt, Optimum population size and mutation rate for a simple real genetic algorithm that optimizes array factors, in Antennas and Propagation Society International Symposium, 2000. IEEE, (2000), 1034-1037.
-
[10]
D. Whitley, T. Starkweather, D. Shaner, The traveling salesman and sequence scheduling: Quality solutions using genetic edge recombination, Colorado State University, Department of Computer Science (1991)
-
[11]
L. J. Eshelman, R. A. Caruana, J. D. Schaffer, Biases in the crossover landscape, in Proceedings of the third international conference on Genetic algorithms, (1989), 10-19.
-
[12]
Q. Liu, A. H. Sung, M. Qiao, Temporal derivative-based spectrum and mel-cepstrum audio steganalysis, Information Forensics and Security, IEEE Transactions on, 4 (2009), 359-368
-
[13]
Y.-C. Qi, L. Ye, C. Liu, Wavelet domain audio steganalysis for multiplicative embedding model, in Wavelet Analysis and Pattern Recognition, ICWAPR 2009. International Conference on, (2009), 429-432.