Friday 26th of April 2024
 

MP3 Steganography: Review


Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong and Ali M-Ahmad

Steganography has existed as the science and art for hiding information in a way that the secret message cannot be deciphered by others, except the sender and receiver. All digital files such as audio, image and text files can be utilized for hiding secret information. Audio file can provide a good hiding medium because of its high data transmission rate and high degree of redundancy. Many formats such as MP3 have been utilized in audio information hiding, however to date there are limited review on the use of MP3 file as an audio file information hiding format. In this paper, we present a thorough analysis on the techniques used in audio files technologies, with more emphasis on MP3 steganography technique. This is to make available comprehensive information on the strengths and weaknesses of the MP3 file steganography techniques and detail comparison information for the research community on information protection.

Keywords: Steganography, MP3, Information Hiding, Secret message, LSB.

Download Full-Text


ABOUT THE AUTHORS

Mohammed Salem Atoum
Mohammed Salem Atoum is a Ph.D. student in Computer Science at Universiti Teknologi Malaysia (UTM). He received his Bachelor in Computer Science in 2002 from Irbid National University- Jordan and a Master of Computer Science in 2009 from Al-albayt University - Jordan. In 2011, he started his Ph.D. in Computer Science at the Faculty of Computer Science and Information Systems, UTM. His research interests include Steganography,Watermarking, datahiding, cryptography,Information Security and Image Processing. he is a member of Information Assurance and Security Research Group (IASRG) at Universiti Teknologi Malaysia

Subariah Ibrahim
Subariah Ibrahim received her B.Sc (Mathematic with Computer Science Minor), 1980 from University of Nevada, Reno, Nevada, USA., Masters Degree in M.Sc (Computer Science) in 1983 from Washington State University, Pullman, Washington, USA and Ph.D. (Computer Science) from Universiti Teknologi Malaysia (2008). She has authored/co-authored more than 50 papers for journals, conference proceedings and book chapters. She is a member of Information Assurance and Security Research Group (IASRG) at Universiti Teknologi Malaysia focusing on cryptography, watermarking and steganography research areas.

Ghazali Sulong
Prof. Dr. Ghazali Sulong was born in 1958. He graduated with M.Sc. and Ph.D. in computing from University of Wales, United Kingdom in 1982 and 1989 respectively. His academic career began since 1982 at Universiti Teknologi Malaysia (UTM). Later in 1999, he was promoted as a full Professor of Image Processing and Pattern Recognition. He has authored/co-authored of more than 50 technical papers for journals, conference proceedings and book chapters. His research area includes Image and Video Processing, Pattern Recognition, Watermarking and Steganography.

Ali M-Ahmad
Ali M-Ahmad is a master student in Computer Science at Universiti Teknologi Malaysia (UTM). He received his Bachelor in Computer Science in 2003 from Mousl University- IraqHis research interests include Steganography,Watermarking, data hiding, and Image Processing.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »