International Journal of Computer Applications (0975 8887) Volume 95No. 14, June 2014 7 A Survey on Audio Steganography Approaches Kamred Udham Singh Department of Computer Science, Faculty of Science Banaras Hindu University, Varanasi, (U.P.), India ABSTRACT Today’s internet community the secure data transfer is bounded due to its attack on data communication. Security of data can be achieved by implementing steganography techniques. All of the existing steganographic techniques use the digital multimedia files as a cover mediums to conceal secret data. Audio file use as a cover medium in steganography because of its larger size compare to other carrier’s file such as text, image. So there are more possibilities to hide large amount of data inside digital audio file. Signals and digital audio files make suitable mediums for steganography because of its high level of redundancy and high data transmission rate. This is not easy to hide data in real time communication audio signals. In this paper we will survey the overall principles of hiding secret data in audio file using audio data hiding techniques, and deliver an overview of present techniques and functions and also discuss the advantages and disadvantages of different types of audio steganographic methods. General Terms Robust, Security, Information, Signal, stego. Keywords Digital data security, stego signal, audio steganography, H.A.S, information hiding, embeds. 1. INTRODUCTION Steganography technique is the art and science to hide information in any digital object like image, audio, video only recipient knows of the existence of the information [1]. Literally meaning of steganography is covered message and includes transmitting secret information through the seemingly innocuous files. Steganography is gaining popularity due to growing necessity for security of data [2]. The main objective of steganography is to transfer information from sender to receiver securely in a completely untraceable way and to evade depiction suspicion to the transmission of concealed information [3] [4]. The idea of message hiding in any object is not a novelty; this has been used form centuries all over world under different regimes. It is a technique for hiding information so that it does not even seem to exist. . Fig 1: Information security disciplines. Hiding information in any object has a long history. Greek historian Herodotus writes, Histaeus, who wanted to communicate with his son-in-law in Greece. First Histaeus shaved the head of one of his most faith slaves and tattooed the information on the slave’s scalp. After some days slave’s hair grew up again the slave was dispatched with the hidden