Efficient Audio Steganography Using Bit Comparison and Substitution Algorithms for Improved Embedding Capacity

K Revathi, S. Kaja Mohideen, Latha Tamilselvan

Abstract


Steganography conceals information, with audio files increasingly used in this practice. The Least Significant Bit algorithm in audio steganography requires numerous samples to embed text files effectively. This study proposes an efficient methodology for embedding text files into a digital audio file. The approach also involves embedding the index value of an audio file, which contains hidden text files in another digital audio file. The proposed algorithms are the Bit Comparison and Substitution Algorithm for embedding text files in audio files and the Bit Comparison and Retrieval Algorithm for extracting text files from audio files. Additionally, a Least Significant Bit Algorithm with a secret key (Ks) embeds the index value of the audio file. The proposed algorithm achieves an average mean squared error of 0.0513, a peak signal-to-noise ratio of 41.13732041dB, and a bit error rate of 0.000114 for embedding 2400 bytes of text files in audio files. These performance metrics demonstrate that the proposed algorithm quantitatively outperforms the traditional least significant bit algorithm by requiring fewer audio samples to embed text files. The proposed algorithm embeds 2400 bytes of text into 2400 audio samples, with each byte corresponding to a single audio sample. Each byte of the text file is embedded by modifying one bit per audio sample, resulting in 2400 difference bits between audio and stego audio files.


Full Text:

PDF PDF

References


M. M. Mahmoud and H. T. Elshoush, “Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography-An Innovative Approach,” IEEE Access, vol. 10, pp. 29954–29971, 2022, doi: 10.1109/ACCESS.2022.3155146.

S. A. S. Almola, N. H. Qasim, H. Ali, and A. Alasadi, “Robust Method for Embedding an Image Inside Cover Image Based on Least Significant Bit Steganography Image steganography,” Informatica, vol. 46, pp. 53–60, 2022, doi: https://doi.org/10.31449/inf.v46i9.4362.

F. R. Shareef, “A novel crypto technique based ciphertext shifting,” Egypt. Informatics J., vol. 21, no. 2, pp. 83–90, 2020, doi: 10.1016/j.eij.2019.11.002.

S. A. S. Almola, “Hiding Images in the Spatial Domain 2 Hiding information,” Informatica, vol. 46, pp. 165–174, 2022, doi: https://doi.org/10.31449/inf.v46i8.4252.

K. N. and J. L. Yingnan Zhang, Minqing Zhang, Xu An Wang, “A Novel Video Steganography Algorithm Based on Trailing Coefficients for Proposed scheme Trailing coefficients ’ application in Trailing coefficients,” Informatica, vol. 40, pp. 63–70, 2016.

M. Bazyar and R. Sudirman, “A new method to increase the capacity of audio steganography based on the LSB algorithm,” J. Teknol., vol. 74, no. 6, pp. 49–53, 2015, doi: 10.11113/jt.v74.4667.

W. Fraczek, W. Mazurczyk, and K. Szczypiorski, “Multilevel steganography: Improving hidden communication in networks,” J. Univers. Comput. Sci., vol. 18, no. 14, pp. 1967–1986, 2012.

A. A. Alsabhany, A. H. Ali, F. Ridzuan, A. H. Azni, and M. R. Mokhtar, “Digital audio steganography: Systematic review, classification, and analysis of the current state of the art,” Comput. Sci. Rev., vol. 38, p. 100316, 2020, doi: 10.1016/j.cosrev.2020.100316.

A. Tahseen Suhail and H. Ghanim Ayoub, “A new method for hiding a secret file in several WAV files depends on circular secret key,” Egypt. Informatics J., vol. 23, no. 4, pp. 33–43, 2022, doi: 10.1016/j.eij.2022.06.003.

A. Olawale, A. Adebayo, and G. Arome, “Embedding Text in Audio Steganography System using Advanced Encryption Standard, Text Compression and Spread Spectrum Techniques in Mp3 and Mp4 File Formats,” Int. J. Comput. Appl., vol. 177, no. 41, pp. 46–51, 2020, doi: 10.5120/ijca2020919914.

L. Chen, R. Wang, D. Yan, and J. Wang, “Learning to Generate Steganographic Cover for Audio Steganography Using GAN,” IEEE Access, vol. 9, pp. 88098–88107, 2021, doi: 10.1109/ACCESS.2021.3090445.

W. Al-chaab, Z. A. Abduljabbar, E. W. Abood, V. O. Nyangaresi, and M. Hussein, “Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography,” Informatica, vol. 47, pp. 65–74, 2023, doi: https://doi.org/10.31449/inf.v47i6.4628.

Y. Yang, H. Yu, X. Zhao, and X. Yi, “An adaptive double-layered embedding scheme for mp3 steganography,” IEEE Signal Process. Lett., vol. 27, no. c, pp. 1984–1988, 2020, doi: 10.1109/LSP.2020.3032875.

I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, “Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research,” Neurocomputing, vol. 335, pp. 299–326, 2019, doi: 10.1016/j.neucom.2018.06.075.

A. A. Alsabhany, F. Ridzuan, and A. H. Azni, “The Adaptive Multi-Level Phase Coding Method in Audio Steganography,” IEEE Access, vol. 7, pp. 129291–129306, 2019, doi: 10.1109/ACCESS.2019.2940640.

Z. N. Sultani and B. N. Dhannoon, “Image and audio steganography based on indirect LSB Zainab N. Sultani *, Ban N. Dhannoon,” Kuwait J.Sci, vol. 48, no. 4, pp. 1–12, 2021.

K. Chen, H. Zhou, W. Li, K. Yang, W. Zhang, and N. Yu, “Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio,” IEEE Trans. Circuits Syst. Video Technol., vol. 30, no. 7, pp. 2027–2032, 2020, doi: 10.1109/TCSVT.2019.2918511.

Y. Yang, X. Yi, X. Zhao, and J. Zhang, “A fast and secure MP3 steganographic scheme with multi-domain,” Signal Processing, vol. 190, p. 108332, 2022, doi: 10.1016/j.sigpro.2021.108332.

Y. Ren, S. Cai, and L. Wang, “Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD),” J. Inf. Secur. Appl., vol. 59, no. May, p. 102863, 2021, doi: 10.1016/j.jisa.2021.102863.

Y. Xue, K. Mu, Y. Wang, Y. Chen, P. Zhong, and J. Wen, “Robust speech steganography using differential SVD,” IEEE Access, vol. 7, pp. 153724–153733, 2019, doi: 10.1109/ACCESS.2019.2948946.

K. Ying, R. Wang, Y. Lin, and D. Yan, “Adaptive Audio Steganography Based on Improved Syndrome-Trellis Codes,” IEEE Access, vol. 9, pp. 11705–11715, 2021, doi: 10.1109/ACCESS.2021.3050004.

D. Tan, Y. Lu, X. Yan, and X. Wang, “A simple review of audio steganography,” Proc. 2019 IEEE 3rd Inf. Technol. Networking, Electron. Autom. Control Conf. ITNEC 2019, no. Itnec, pp. 1409–1413, 2019, doi: 10.1109/ITNEC.2019.8729476.

F. Djebbar, B. Ayad, K. A. Meraim, and H. Hamam, “Comparative study of digital audio steganography techniques,” Eurasip J. Audio, Speech, Music Process., vol. 2012, no. 1, pp. 1–16, 2012, doi: 10.1186/1687-4722-2012-25.

P. Marszałek and P. Bilski, “Steganography in Audio Files – COTS Software Analysis,” no. February, 2023, doi: 10.24425/ijet.2023.144340.

S. Stanev and K. Szczypiorski, “Steganography Training : a Case Study from University of Shumen in Bulgaria,” vol. 62, no. 3, pp. 315–318, 2016, doi: 10.1515/eletel-2016-0043.

W. A. Awadh, A. S. Alasady, and A. K. Hamoud, “Efficiently Secure Data Communications Based on CBC-RC6 and the Overflow Field of Timestamp Option in an IPv4 Packet,” Informatica,, vol. 46, pp. 125–133, 2022, doi: https://doi.org/10.31449/inf.v46i6.4005.

M. R. Rahman, P. Chakraborty, M. Z. Rahman, and M. G. Moazzam, “Hiding Confidential File using Audio Steganography,” Int. J. Comput. Appl., vol. 178, no. 50, pp. 30–35, 2019.

X. Zhang, S. Wang, and W. Zhang, “Steganography Combining Data Decomposition Mechanism and Stego-coding Method,” Informatica, vol. 33, pp. 41–48, 2009.

M. H. Mohammed, “A new approach to hide texts into images and audio files using steganography and cryptography techniques,” Int. J. Adv. Appl. Sci., vol. 11, no. 4, pp. 312–323, 2022, doi: 10.11591/ijaas.v11.i4.pp312-323.

M. R. Orora Tasnim Nisha1, Md. Selim Hossain1,*, “Audio Steganography with Intensified Security and Hiding Capacity,” Eur. Chem. Bull, vol. 12, no. 10, pp. 162–173, 2023.

K. Bhowal, D. Sarkar, S. Biswas, and P. P. Sarkar, “A steganographic approach to hide secret data in digital audio based on XOR operands triplet property with high embedding rate and good quality audio,” Turkish J. Electr. Eng. Comput. Sci., vol. 25, no. 3, pp. 2136–2148, 2017, doi: 10.3906/elk-162-267.

A. H. Ali, L. E. George, A. A. Zaidan, and M. R. Mokhtar, “High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain,” Multimed. Tools Appl., vol. 77, no. 23, pp. 31487–31516, 2018, doi: 10.1007/s11042-018-6213-0.

H. T. Elshoush and M. M. Mahmoud, “Ameliorating LSB Using Piecewise Linear Chaotic Map and One-Time Pad for Superlative Capacity, imperceptibility and Secure Audio Steganography,” IEEE Access, vol. 11, no. April, pp. 33354–33380, 2023, doi: 10.1109/ACCESS.2023.3259902.

M. Liu, L. Liu, J. Cao, and Q. Du, “Co-attention network with label embedding for text classification,” Neurocomputing, vol. 471, pp. 61–69, 2022, doi: 10.1016/j.neucom.2021.10.099.

R. Chowdhury and D. Bhattacharyya, “A View on LSB Based Audio Steganography ( International Journal of Security and Its Applications ) A View on LSB Based Audio Steganography,” no. October, 2018, doi: http://dx.doi.org/10.14257/ijsia.2016.10.2.05.

B. Harjito, B. Sulistyarso, and E. Suryani, “Audio steganography using two LSB modification and RSA for security data transmission,” J. Telecommun. Electron. Comput. Eng., vol. 10, no. 2–4, pp. 107–111, 2018.

M. Parthasarathi, T. Shreekala, T. Nadu, and T. Nadu, “Secured Data Hiding in Audio Files Using Audio Steganography Algorithm,” Int. J. Pure Appl. Math., vol. 116, no. 21, pp. 619–627, 2017.

Vipul Sharmal and R. Thakur, “LSB Modification based Audio Steganography using Trusted Third Party Key Indexing Method,” IEEE 2015 Third Int. Conf. Image Infonnation Process., pp. 403–406, 2015.

A. H. Ali, M. R. Mokhtar, and L. E. George, “Enhancing the hiding capacity of audio steganography based on block mapping,” J. Theor. Appl. Inf. Technol., vol. 95, no. 7, pp. 1441–1448, 2017.

H. I. Shahadi, R. Jidin, and W. H. Way, “Lossless audio steganography based on lifting wavelet transform and dynamic stego key,” Indian J. Sci. Technol., vol. 7, no. 3, pp. 323–334, 2014, doi: 10.17485/ijst/2014/v7i3.14.




DOI: https://doi.org/10.31449/inf.v49i21.6957

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.