{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T03:00:47Z","timestamp":1763348447163,"version":"build-2065373602"},"reference-count":58,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T00:00:00Z","timestamp":1650326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Direct spread spectrum technology is traditionally used in radio communication systems with multiple access, for example, in CDMA standards, in global satellite navigation systems, in Wi-Fi network wireless protocols, etc. It ensures high security and reliability of information transfer. In addition, spread spectrum technology provides the transmitted signals with a noise-like appearance, thus hiding the semantic content of the messages. We researched this technology for other implementations. The purpose of our study was to investigate new technologies for hiding data in multimedia files. In particular, we investigated the direct spread spectrum in the context of the development of methods for hiding data in audio containers. We considered various spreading sequences (chip codes) and also explored their use for hiding information in audio files. We conducted experimental studies and estimated the bit error rate (BER) in the recovered data. The article also evaluates the distortion of an audio container by the peak signal-to-noise ratio (PSNR). The results of our research enable us to find out which method of forming chip codes gives a lower BER with equal PSNR. We provide recommendations on the formation of spreading sequences to reliably and safely hide informational messages in audio files.<\/jats:p>","DOI":"10.3390\/s22093115","type":"journal-article","created":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:22:43Z","timestamp":1650414163000},"page":"3115","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Direct Spread Spectrum Technology for Data Hiding in Audio"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2331-6326","authenticated-orcid":false,"given":"Alexandr","family":"Kuznetsov","sequence":"first","affiliation":[{"name":"Department of Information Systems and Technologies Security, V.N. Karazin Kharkiv National University, Svobody Sq. 4, 61022 Kharkiv, Ukraine"},{"name":"JSC \u201cInstitute of Information Technologies\u201d, Bakulin St. 12, 61022 Kharkiv, Ukraine"}]},{"given":"Alexander","family":"Onikiychuk","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Technologies Security, V.N. Karazin Kharkiv National University, Svobody Sq. 4, 61022 Kharkiv, Ukraine"}]},{"given":"Olga","family":"Peshkova","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Technologies Security, V.N. Karazin Kharkiv National University, Svobody Sq. 4, 61022 Kharkiv, Ukraine"}]},{"given":"Tomasz","family":"Gancarczyk","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Automatics, University of Bielsko-Biala, Willowa St. 2, 43309 Bielsko-Biala, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2577-550X","authenticated-orcid":false,"given":"Kornel","family":"Warwas","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Automatics, University of Bielsko-Biala, Willowa St. 2, 43309 Bielsko-Biala, Poland"}]},{"given":"Ruslana","family":"Ziubina","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Automatics, University of Bielsko-Biala, Willowa St. 2, 43309 Bielsko-Biala, Poland"}]}],"member":"1968","published-online":{"date-parts":[[2022,4,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"4691","DOI":"10.1002\/sec.1673","article-title":"Host Cancelation-Based Spread Spectrum Watermarking for Audio Anti-Piracy over Internet","volume":"9","author":"Li","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_2","first-page":"63","article-title":"Cryptography and Steganography","volume":"1","author":"Manoj","year":"2010","journal-title":"Int. J. Comput. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/TIT.2002.808134","article-title":"Information-Theoretic Analysis of Information Hiding","volume":"49","author":"Moulin","year":"2003","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Aroua, S., Champagnat, R., Coustaty, M., Falquet, G., Ghadfi, S., Ghamri-Doudane, Y., Gomez-Kramer, P., Howells, G., McDonald-Maier, K.D., and Murphy, J. (2019, January 6\u20139). Security and PrIvacy foR the Internet of Things: An Overview of the Project. Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy.","DOI":"10.1109\/SMC.2019.8914221"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Fazzat, A., Khatoun, R., Labiod, H., and Dubois, R. (2020, January 21\u201323). A Comparative Performance Study of Cryptographic Algorithms for Connected Vehicles. Proceedings of the 2020 4th Cyber Security in Networking Conference (CSNet), Lausanne, Switzerland.","DOI":"10.1109\/CSNet50428.2020.9265529"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Levi, I., Rudin, Y., Fish, A., and Keren, O. (2018, January 19\u201323). Embedded Randomness and Data Dependencies Design Paradigm: Advantages and Challenges. Proceedings of the 2018 Design, Automation Test in Europe Conference Exhibition (DATE), Dresden, Germany.","DOI":"10.23919\/DATE.2018.8342042"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A., van Oorschot, P.C., and Vanstone, S.A. (2018). Handbook of Applied Cryptography, CRC Press.","DOI":"10.1201\/9781439821916"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yahya, A. (2019). Steganography Techniques. Steganography Techniques for Digital Images, Springer International Publishing.","DOI":"10.1007\/978-3-319-78597-4"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Fridrich, J. (2009). Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press. Illustrated Edition.","DOI":"10.1017\/CBO9781139192903"},{"key":"ref_10","unstructured":"(2021, April 25). WAV File Extension-What Is It? How to Open a WAV File?. Available online: https:\/\/filext.com\/file-extension\/WAV."},{"key":"ref_11","unstructured":"Fleischman, E. (2021, April 25). WAVE and AVI Codec Registries. Available online: https:\/\/tools.ietf.org\/html\/rfc2361."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2487","DOI":"10.1109\/TIFS.2016.2585089","article-title":"CDMA System Design and Capacity Analysis Under Disguised Jamming","volume":"11","author":"Song","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"11515","DOI":"10.1109\/TVT.2020.3013155","article-title":"Complementary Coded CDMA Systems With CP-Free OFDM","volume":"69","author":"Wang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"6635","DOI":"10.1109\/TIT.2015.2482483","article-title":"On Optimum Asymptotic Multiuser Efficiency of Randomly Spread CDMA","volume":"61","author":"Sedaghat","year":"2015","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2204","DOI":"10.1109\/TSP.2018.2799166","article-title":"Navigation with Cellular CDMA Signals\u2014Part II: Performance Analysis and Experimental Results","volume":"66","author":"Khalife","year":"2018","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"St\u00fcber, G.L. (2017). Spread Spectrum Techniques. Principles of Mobile Communication, Springer International Publishing.","DOI":"10.1007\/978-3-319-55615-4_9"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Torrieri, D. (2015). Chapter 2 Direct-Sequence Systems. Principles of Spread-Spectrum Communication Systems, Springer International Publishing.","DOI":"10.1007\/978-3-319-14096-4_2"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ipatov, V.P. (2005). Spread Spectrum and CDMA: Principles and Applications, John Wiley & Sons, Ltd.","DOI":"10.1002\/0470091800"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Torrieri, D. (2018). Principles of Spread-Spectrum Communication Systems, Springer International Publishing.","DOI":"10.1007\/978-3-319-70569-9"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Anderson, R. (1996). Modulation and Information Hiding in Images. International Workshop on Information Hiding, Springer.","DOI":"10.1007\/3-540-61996-8"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Marvel, L.M., Boncelet, C.G., and Retter, C.T. (1998). Methodology of Spread-Spectrum Image Steganography, Army Research Lab Aberdeen Proving.","DOI":"10.21236\/ADA349102"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2307","DOI":"10.1109\/TCYB.2017.2735989","article-title":"A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework","volume":"48","author":"Wang","year":"2018","journal-title":"IEEE Trans. Cybern."},{"key":"ref_23","first-page":"122","article-title":"Pseudorandom Sequences for Spread Spectrum Image Steganography","volume":"Volume 2654","author":"Kuznetsov","year":"2020","journal-title":"Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) Co-Located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019)"},{"key":"ref_24","first-page":"646","article-title":"Hiding Data in Cover Images Using a Pseudo-Random Sequences","volume":"Volume 2608","author":"Subbotin","year":"2020","journal-title":"Proceedings of the Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020)"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Avci, D., Tuncer, T., and Avci, E. (2018, January 22\u201325). A New Information Hiding Method for Audio Signals. Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey.","DOI":"10.1109\/ISDFS.2018.8355361"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Rajput, S.P., Adhiya, K.P., and Patnaik, G.K. (2017, January 17\u201318). An Efficient Audio Steganography Technique to Hide Text in Audio. Proceedings of the 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India.","DOI":"10.1109\/ICCUBEA.2017.8463948"},{"key":"ref_27","first-page":"126","article-title":"Enhancement of LSB Audio Steganography Based on Carrier and Message Characteristics","volume":"11","author":"Nassrullah","year":"2020","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ramya, G., Janarthanan, P.P., and Mohanapriya, D. (2018, January 14\u201315). Steganography Based Data Hiding for Security Applications. Proceedings of the 2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW), Erode, India.","DOI":"10.1109\/I2C2SW45816.2018.8997153"},{"key":"ref_29","first-page":"959","article-title":"Three Orders Mixture Algorithm of Audio Steganography Combining Cryptography","volume":"9","author":"Lee","year":"2018","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Akbay, K., Konyar, M.Z., \u0130lk\u0131n, S., and Sonda\u015f, A. (2018, January 2\u20135). Data Hiding Using Shuffle Algorithm and LSB Method. Proceedings of the 2018 26th Signal Processing and Communications Applications Conference (SIU), Izmir, Turkey.","DOI":"10.1109\/SIU.2018.8404172"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Gopalan, K. (2018, January 3\u20135). Audio Steganography for Information Hiding and Covert Communication\u2013a Tutorial. Proceedings of the 2018 IEEE International Conference on Electro\/Information Technology (EIT), Rochester, MI, USA.","DOI":"10.1109\/EIT.2018.8500167"},{"key":"ref_32","first-page":"1","article-title":"Embedding Limitations with Digital-Audio Watermarking Method Based on Cochlear Delay Characteristics","volume":"2","author":"Unoki","year":"2011","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Altinba\u015f, A.E., and Yalman, Y. (2021, January 15\u201317). Bit Reduction Based Audio Steganography Algorithm. Proceedings of the 2021 6th International Conference on Computer Science and Engineering (UBMK), Ankara, Turkey.","DOI":"10.1109\/UBMK52708.2021.9558943"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Tabara, B., Wojtu\u0144, J., and Piotrowski, Z. (2017, January 12\u201314). Data Hiding Method in Speech Using Echo Embedding and Voicing Correction. Proceedings of the 2017 Signal Processing Symposium (SPSympo), Debe, Poland.","DOI":"10.1109\/SPS.2017.8053697"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1109\/TASLP.2020.3013785","article-title":"Multi-Subspace Echo Hiding Based on Time-Frequency Similarities of Audio Signals","volume":"28","author":"Wang","year":"2020","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Latypov, R.K., and Stolov, E.L. (2020, January 24\u201325). Ternary Echo Hiding in Audio Files. Proceedings of the 2020 28th Telecommunications Forum (\u2121FOR), Belgrade, Serbia.","DOI":"10.1109\/TELFOR51502.2020.9306575"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Cho, K., Bae, S.H., Choi, I.K., Kim, N.S., and Unoki, M. (2013, January 16\u201318). Robust Audio Data Hiding Method Based on Phase of Modulated Complex Lapped Transform. Proceedings of the 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Beijing, China.","DOI":"10.1109\/IIH-MSP.2013.74"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Manunggal, T.T., and Arifianto, D. (2016, January 22\u201325). Data Protection Using Interaural Quantified-Phase Steganography on Stereo Audio Signals. Proceedings of the 2016 IEEE Region 10 Conference (TENCON), Singapore.","DOI":"10.1109\/TENCON.2016.7848778"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Ginanjar, R.R., Bhardwaj, S., Kim, D.-S., and Lee, J.-M. (2019, January 11\u201313). Rounding Modulation for Transparent Data-Hiding Scheme in High-Quality Audio File. Proceedings of the 2019 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2019.8662015"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/83.777088","article-title":"Spread Spectrum Image Steganography","volume":"8","author":"Marvel","year":"1999","journal-title":"IEEE Trans. Image Process."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Marvel, L.M. (2000). Image Steganography for Hidden Communication, Army Research Lab Aberdeen Proving.","DOI":"10.21236\/ADA377277"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Youail, R.S., Samawi, V.W., and Kadhim, A.-K.A.-R. (2008, January 20\u201323). Combining a Spread Spectrum Technique with Error-Correction Code to Design an Immune Stegosystem. Proceedings of the Security and Identification 2008 2nd International Conference on Anti-counterfeiting, Guiyang, China.","DOI":"10.1109\/IWASID.2008.4688395"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Agrawal, N., and Gupta, A. (2009, January 16\u201318). DCT Domain Message Embedding in Spread-Spectrum Steganography System. Proceedings of the 2009 Data Compression Conference, Washington, DC, USA.","DOI":"10.1109\/DCC.2009.86"},{"key":"ref_44","unstructured":"Lu, L., Sun, X., and Cai, L. (2010, January 20\u201322). A Robust Image Watermarking Based on DCT by Arnold Transform and Spread Spectrum. Proceedings of the 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, China."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/TCE.2004.1309431","article-title":"Chaos Based Spread Spectrum Image Steganography","volume":"50","author":"Satish","year":"2004","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_46","unstructured":"Kumar, A., Albagul, A., Ghose, M., and Negrat, K. (2008, January 8\u201310). Improved Chaos Based Spread Spectrum Image Steganography. Proceedings of the 10th IASTED International Conference, Beijing China."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Weihua, X., Yongbing, W., and Shuiyuan, Y.H. (2015, January 12\u201316). 264 Video Watermark Algorithm Using DCT Spread Spectrum. Proceedings of the 2015 3rd International Conference on Applied Computing and Information Technology\/2nd International Conference on Computational Science and Intelligence, Okayama, Japan.","DOI":"10.1109\/ACIT-CSI.2015.84"},{"key":"ref_48","unstructured":"Zarmehi, N., and Akhaee, M.A. (2014, January 1\u20135). Video Steganalysis of Multiplicative Spread Spectrum Steganography. Proceedings of the 2014 22nd European Signal Processing Conference (EUSIPCO), Lisbon, Portugal."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Nugraha, R.M. (2011, January 17\u201319). Implementation of Direct Sequence Spread Spectrum Steganography on Audio Data. Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, Bandung, Indonesia.","DOI":"10.1109\/ICEEI.2011.6021662"},{"key":"ref_50","unstructured":"Li, X., and Yu, H.H. (2000, January 27\u201329). Transparent and Robust Audio Data Hiding in Subband Domain. Proceedings of the International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), Las Vegas, NV, USA."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Hernandez-Garay, S., Vazquez-Medina, R., Nino de Rivera, L., and Ponomaryov, V. (July, January 29). Steganographic Communication Channel Using Audio Signals. Proceedings of the 2008 12th International Conference on Mathematical Methods in Electromagnetic Theory, Odessa, Ukraine.","DOI":"10.1109\/MMET.2008.4581017"},{"key":"ref_52","unstructured":"Sklar, B. (2017). Digital Communications: Fundamentals and Applications, Prentice Hall. [2nd ed.]."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Brundick, F.S., and Marvel, L.M. (2001). Implementation of Spread Spectrum Image Steganography.","DOI":"10.21236\/ADA392155"},{"key":"ref_54","unstructured":"Boncelet, J.C.G., Marvel, L.M., and Retter, C.T. (2003). Spread Spectrum Image Steganography\/Unified Patents. (Patents US6557103B1)."},{"key":"ref_55","first-page":"1","article-title":"New Technique for Data Hiding in Cover Images Using Adaptively Generated Pseudorandom Sequences","volume":"Volume 2654","author":"Kuznetsov","year":"2020","journal-title":"Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019)"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Kuznetsov, A., Smirnov, O., Onikiychuk, A., Makushenko, T., Anisimova, O., and Arischenko, A. (2020, January 14\u201318). Adaptive Pseudo-Random Sequence Generation for Spread Spectrum Image Steganography. Proceedings of the 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine.","DOI":"10.1109\/DESSERT50317.2020.9125032"},{"key":"ref_57","unstructured":"(2021, May 07). Gaudeamus Igitur. Available online: http:\/\/graecolatini.bsu.by\/texts\/gaudeamus\/gaudeamus-data\/gaudeamus03.mp3."},{"key":"ref_58","unstructured":"Kuznetsov, A., Kiian, A., Kuznetsova, K., and Smirnov, A. (2020, January 15\u201316). Data Hiding Scheme Based on Spread Sequence Addressing. Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020) co-located with XX International scientific and technical conference on Information Technologies in Education and Management (ITEM 2020), Kherson, Ukraine."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/9\/3115\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:56:39Z","timestamp":1760136999000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/9\/3115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,19]]},"references-count":58,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["s22093115"],"URL":"https:\/\/doi.org\/10.3390\/s22093115","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,4,19]]}}}