skip to main content
10.1145/2512209.2512215acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

MP3 files as a steganography medium

Published:01 October 2013Publication History

ABSTRACT

There is a lot of work done on hiding information inside picture files in formats such as JPEG, however not much has been done to date on hiding information inside MP3 audio files. This paper looks at ways to hide information inside MP3 files and proposes four largely unexplored techniques: unused header bit stuffing, unused side information bit stuffing, empty frame stuffing, and ancillary bit stuffing.

References

  1. Steganography. (2009). In Merriam-Webster Online Dictionary. Retrieved October 24, 2009, from http://www.merriam-webster.com/dictionary/steganographyGoogle ScholarGoogle Scholar
  2. Hacker, Scot, "MP3, The Definitive Guide", 1st Edition, March 2000, O'Reilly Publishing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Ruckert, Understanding MP3, Vieweg, 2005, ISBN 3-528-05905-2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Petitcolas, Fabien A. P., "MP3stego", 1997-2005, http://www.petitcolas.net/fabien/steganography/mp3stego/Google ScholarGoogle Scholar
  5. Maciak, L. G., Ponniah, M. A., & Sharma, R., "MP3 STEGONOGRAPHY: Applying Stenography to Music Captioning", 2005.Google ScholarGoogle Scholar
  6. Zaenuri, A., "Hide any file inside mp3 file - MP3 steganography", 2008 Achmad Z's Archives, http://achmadz.blogspot.com/2008/05/hide-any-file-inside-mp3-file.htmlGoogle ScholarGoogle Scholar
  7. Bender, W., Gruhl, D., Morimoto, N., & Lu, A., "Techniques for data hiding", 1996 Ibm.com, http://www.research.ibm.com/journal/sj/353/sectiona/bender.txt Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Zaenuri, A., "Mp3stegz algorithm", 2008 Achmad Z's Archives, http://achmadz.blogspot.com/2008/06/mp3stegz-algorithm.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. MP3 files as a steganography medium

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              RIIT '13: Proceedings of the 2nd annual conference on Research in information technology
              October 2013
              102 pages
              ISBN:9781450324946
              DOI:10.1145/2512209

              Copyright © 2013 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 October 2013

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Author Tags

              Qualifiers

              • research-article

              Acceptance Rates

              RIIT '13 Paper Acceptance Rate12of24submissions,50%Overall Acceptance Rate51of116submissions,44%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader