skip to main content
research-article

MP3 Steganography Techniques

Published: 29 September 2015 Publication History

Abstract

The MP3 audio encoding format is currently one of the most popular encoding formats in use. On average, it takes significantly less space to store than, for example, a PCM-encoded WAV file, even though it retains most of the original, uncompressed audio information. Most users of MP3 files are unaware that they can be used as carriers of steganographically-hidden information. Although it has not yet been greatly explored, there are various types of steganography techniques that exist which allow for the hiding of information within MP3 files of any type. Two of the techniques the authors studied include those implemented by MP3Stego developed by Fabien Petitcolas and MP3Stegazaurus by former Illinois Institute of Technology student Mikhail Zaturenskiy. The technique implemented by MP3Stego performs the injection of covert information during the encoding process, while the technique implemented by MP3Stegazaurus uses areas of an already-existing MP3 file known to be skipped or ignored by MP3 playing and decoding applications to store covert information. The authors have developed a tool which implements a technique allowing for the hiding of covert information within the audio information-containing portions of an MP3 file in a way that does not yet appear to have been explored. Unlike the technique implemented by MP3Stego, which involves hiding information within the audio information-containing portions of an MP3 file during the encoding process, this new technique involves hiding it after the encoding process has already taken place. This paper details the research carried out by the authors as well as how the tool that makes use of this technique works.

References

[1]
Bosi, Marina, and Richard E. Goldberg. Introduction to Digital Audio Coding and Standards. Boston: Kluwer Academic, 2003. Print.
[2]
Edström., Björn. "Blog.bjrn.se." Blog.bjrn.se. N.p., n.d. Web. 25 Nov. 2014.
[3]
Hacker, Scot. MP3: The Definitive Guide. Sebastopol: O'Reilly Media, 2000. Print.
[4]
ISO/IEC 11172-3 -- Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s, 1993.
[5]
Khodja, Ben. "Probabilistically Detecting Steganography within MP3 files." Illinois Institute of Technology, 2014.
[6]
Maciak, Lukasz G., Michael A. Ponniah, and Renu Sharma. MP3 Steganography: Applying Steganography to Music Captioning.
[7]
Nilsson, Martin, "ID3 tag version 2.3.0", 1999 ID3, http://www.id3.org/id3v2.3.0
[8]
Raissi, Rassol. The Theory Behind MP3.
[9]
Ruckert, Martin. Understanding MP3: Syntax, Semantics, Mathematics, and Algorithms. Wiesbaden: Vieweg, 2005. Print.
[10]
Supurovic, Predrag, "MPEG Audio Frame Header", 1999 DataVoyage, http://www.datavoyage.com/mpgscript/mpeghdr.htm
[11]
Thiagarajan, Jayaraman Jayaraman., and Andreas Spanias. Analysis of the MPEG-1 Layer III (MP3) Algorithm Using MATLAB. San Rafael, CA: Morgan & Claypool, 2012. Print
[12]
Zaturenskiy, Mikhail. "MP3 Files as a Steganography Medium." Illinois Institute of Technology, 2013.

Cited By

View all
  • (2024)From Cryptography to Steganography: Detecting Hidden Data in the Digital WorldInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24SEP937(1908-1914)Online publication date: 3-Oct-2024
  • (2021)A roadmap of steganography tools: conventional to modernSpatial Information Research10.1007/s41324-021-00393-7Online publication date: 16-Mar-2021
  • (2017)Hybrid Audio Steganography and Cryptography Method Based on High Least Significant Bit (LSB) Layers and One-Time Pad—A Novel ApproachIntelligent Systems and Applications10.1007/978-3-319-69266-1_21(431-453)Online publication date: 31-Dec-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
RIIT '15: Proceedings of the 4th Annual ACM Conference on Research in Information Technology
September 2015
72 pages
ISBN:9781450338363
DOI:10.1145/2808062
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 September 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. covert data
  2. hidden information
  3. hide information
  4. mp3
  5. secret writing
  6. steganography

Qualifiers

  • Research-article

Conference

SIGITE/RIIT '15
Sponsor:

Acceptance Rates

RIIT '15 Paper Acceptance Rate 10 of 22 submissions, 45%;
Overall Acceptance Rate 51 of 116 submissions, 44%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 24 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)From Cryptography to Steganography: Detecting Hidden Data in the Digital WorldInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24SEP937(1908-1914)Online publication date: 3-Oct-2024
  • (2021)A roadmap of steganography tools: conventional to modernSpatial Information Research10.1007/s41324-021-00393-7Online publication date: 16-Mar-2021
  • (2017)Hybrid Audio Steganography and Cryptography Method Based on High Least Significant Bit (LSB) Layers and One-Time Pad—A Novel ApproachIntelligent Systems and Applications10.1007/978-3-319-69266-1_21(431-453)Online publication date: 31-Dec-2017

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media