Audio Steganography for Healthcare Data Using 24x8 Compression and Bit Comparison Substitution Algorithm
Abstract
Audio steganography embeds multimedia files within audio files. Traditional audio steganography used the Least Significant Bit algorithm, which required eight samples to embed one byte of a text file. This study reduces the utilization of audio samples by compressing healthcare data from three characters to one using the proposed 24×8 compression algorithm. Three audio files were used to transmit the probability distributions, encoded values, and index values. The encoded values are embedded using the Bit Comparison and Substitution-3 algorithm, with a three-bit difference from audio samples. It is retrieved using the Bit Comparison and Retrieval-3 algorithm and decompressed with the 8×24 decompression algorithm. For enhanced security, healthcare data was encrypted using the Incremental Order Value Algorithm and decrypted with the Decremental Reverse Order Value Algorithm. The least significant bit algorithm embeds the probability distributions and index values with a secret key. Audio files from Mixkit and healthcare data from the COVID Dialogue Dataset were used for evaluation. The proposed algorithms achieved an average throughput of 8592.74 KB/s, surpassing the 3-DES algorithm due to the incremental shift in ASCII values within healthcare data. A compression ratio of 3:1 was achieved by compressing 3 bytes of data to 1, outperforming Huffman and LZW. The embedding algorithm achieved a PSNR of 42.1480 dB and a BER of 7.0165 × 10⁻⁵, demonstrating improved efficiency with reduced audio samples in embedding compared to the traditional LSB algorithm. 15000 bytes of healthcare data were embedded into 5000 audio samples, resulting in 15000-bit differences between the cover and stego audio files.References
Rumi Chunara, Yuan Zhao, Ji Chen, Katharine Lawrence, Paul A.Testa, Oded Nov, and Devin M,Mann.Telemedicine and healthcare disparities: a cohort study in a large healthcare system in New York City during COVID-19.Journal of the American Medical Informatics Association. 28(1):33–41,2021.https://doi.org/10.1093/jamia/ocaa217
Abid Haleem, Mohd Javaid, Ravi Pratap Singh, and Rajiv Suman. Telemedicine for healthcare: Capabilities, features, barriers, and applications. Sensors International,2(100117):1-12,2021. https://doi.org/10.1016/j.sintl.2021.100117
A. S. Albahri, Jwan K. Alwan, Zahraa K. Taha, Sura F. Ismail, Rula A.Hamid, A. A. Zaidan, O. S. Albahri , B. B. Zaidan, A. H. Alamoodi, and M. A. Alsalem .IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art.Journal of Network and Computer Applications.173(102873),2020.
https://doi.org/10.1016/j.jnca.2020.102873
Malak Alkhudaydi, and Adnan Gutub. Securing Data via Cryptography and Arabic Text Steganography.SN Computer Science .2(46):1-18, 2021.
https://doi.org/10.1007/s42979-020-00438-y
Hamouda B.E.H.H. Comparative Study of Different Cryptographic Algorithms. Journal of Information Security.11(3):138-148,2020.
https://doi.org/10.4236/jis.2020.113009
Abdalbasit Mohammed Qadir, and NurhayatVarol. A Review Paper on Cryptography .2019 7th International Symposium on Digital Forensics and Security (ISDFS).IEEE, 2019.
https://doi.org/10.1109/ISDFS.2019.8757514
Sazeen T. Abdulrazzaq,Mohammed M. Siddeq, and Marcos A. Rodrigues.A Novel Steganography Approach for Audio Files.SN Computer Science .2020; 1(97):1-13.
https://doi.org/10.1007/s42979-020-0080-2
HrishikeshDutta, Rohan Kumar Das, Sukumar Nandi, and S. R. MahadevaPrasanna. An Overview of Digital Audio Steganography. IETE Technical Review.37(6):632-650,2019.https://doi.org/10.1080/02564602.2019.1699454
Dingwei Tan, Yuliang Lu, Xuehu Yan and Xiaoping Wang.A Simple Review of Audio Steganography. 2019 IEEE 3rd Information Technology,Networking,Electronic and Automation Control Conference (ITNEC).1409-1413,2019.
https://doi.org/10.1109/ITNEC.2019.8729476
UjalaRazaq, XuLizhong, Changli Li, and Muhammad Usman.Evolution and Advancement of Arithmetic Coding Over Four Decades. Open Journal of Science and Technology. 3(3):194-236, 2020.
https://doi.org/10.31580/ojst.v3i3.1664
UthayakumarJayasankar, VengattaramanThirumal, and DhavachelvanPonnurangam.A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. Journal of King Saud
University-Computer and Information Sciences.33(2):119-40,2021.
https://doi.org/10.1016/j.jksuci.2018.05.006
TonnyHidayat, Mohd Hafiz Zakaria, and Ahmad NaimChe Pee .Comparison of Lossless Compression Schemes for WAV Audio Data 16-Bit between Huffman and Coding Arithmetic.International Journal of Simulation: Systems, Science & Technology .19(6):36.1-36.7,2019.
https://ijssst.info/Vol-19/No-6/paper36.pdf
A. A. Alsabhany, A. H. Ali, F. Ridzuan, A. H. Azni, and M. R. Mokhtar.Digital audio steganography: Systematic review, classification, and analysis of the current state of the art.Computer Science Review.(38).100316:1-27,2020.https://doi.org/10.1016/j.cosrev.2020.100316
Indy Haverkamp, and Dipti K. Sarmah, Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis.International Journal of Information Security.23:2607-2635,2024;
https://doi.org/10.1007/s10207-024-00853-9
EnasWahabAbood, Abdulhssein M. Abdullah , Mustafa A. Al Sibahee , ZaidAmeenAbduljabbar, Vincent OmolloNyangaresi , Saad Ahmad Ali Kalafy, and MudhafarJalilJassimGhrabta. Audio steganography with enhanced LSB method for securing encrypted text with bit cycling.Bulletin of Electrical Engineering and Informatics.11(1):185-194,2022. https://doi.org/10.11591/eei.v11i1.3279
Dilip Kumar Sharma, NingthoujamChidananda Singh, Daneshwari A Noola, AmalaNirmal Doss ,JanakiSivakumar .A review on various cryptographic techniques & algorithms. Materials Today:Proceedings.51(1):104-109,2022.
https://doi.org/10.1016/j.matpr.2021.04.583
Mohanad Sameer Jabbar,and SamerSaeedIssa. A crypto-steganography healthcare management: towards a secure communication channel for data COVID-19 updating. Indonesian Journal of Electrical Engineering and Computer Science.29(2):1102-1112,2023. https://doi.org/10.11591/ijeecs.v29.i2.pp1102-1112
ReihaneSaniei,and KarimFaez. The Security of Arithmetic Compression Based Text Steganography Method. International Journal of Electrical and Computer Engineering (IJECE).3(6):797-804,2013.
https://ijece.iaescore.com/index.php/IJECE/article
/view/5425/4932
Wafaa Al-Chaab1, ZaidAmeenAbduljabbar, EnasWahabAbood, Vincent OmolloNyangaresi, Hussein M. Mohammed, and Junchao Ma.
Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography.
Informatica, 47(6):65–74, 2023.
https://doi.org/10.31449/inf.v47i6.4628
Nathaniel Fout and Kwan-Liu Ma.An Adaptive Prediction-Based Approach to Lossless Compression of Floating-Point Volume Data. IEEE Transactions on Visualization and Computer Graphics,18(12):2295-2304,2012.
https://doi.org/10.1109/TVCG.2012.194
Mostafa A. Ahmad, MouradElloumi , Ahmed H. Samak , Ali M. Al-Sharafi, Ali Alqazzaz , Monir Abdullah Kaid ,and Costas Iliopoulos. Hiding patients’ medical reports using an enhanced wavelet steganography algorithm in DICOM images. Alexandria Engineering Journal.61(12): 10577–10592,2022.
Anne Y. Ning, Claudia I. Cabrera, and Brian D Anza.Telemedicine in Otolaryngology: A Systematic Review of Image Quality, Diagnostic Concordance, and Patient and Provider Satisfaction.Annals of Otology, Rhinology &Laryngology.130(2):195–204,2021.
https://doi.org/10.1177/0003489420939590
M. V. M. N. Sravan, and K VenkataRao.5G-Optimized Deep Learning Framework for Real-Time Multilingual Speech-to-Speech Translation in Telemedicine Systems.Informatica, 49 (2):279–298, 2025.
https://doi.org/10.31449/inf.v49i2.7826
Mahmoud Magdy, Khalid M. Hosny, Neveen I. Ghali, and Said Ghoniemy. Security of medical images for telemedicine: a systematic review. Multimedia Tools and Applications.81:25101–25145, 2022.
https://doi.org/10.1007/s11042-022-11956-7
K Revathi, S. Kaja Mohideen, and Latha Tamilselvan.Efficient Audio Steganography Using Bit Comparison and Substitution Algorithms for Improved Embedding Capacity. Informatica, 49 (21): 179–198, 2025.
https://doi.org/10.31449/inf.v49i21.6957
B. Harjito, B. Sulistyarso, and E. Suryani.Audio steganography using two LSB modification and RSA for security data transmission.Journal of Telecommunication, Electronic and Computer Engineering(JTEC),10(2–4):107–111,2018.https://jtec.utem.edu.my/jtec/article/view/4326/3173
M. Parthasarathi, and T. Shreekala.Secured Data Hiding in Audio Files Using Audio Steganography Algorithm.International Journal of Pure and Applied Mathematics, 116(21):619–628, 2017.
https://acadpubl.eu/jsi/2017-116-13-22/articles/21/79.pdf
R. Chowdhury, D. Bhattacharyya, Samir Kumar Bandyopadhyay, and Tai-hoon Kim .A View on LSB Based Audio Steganography.International Journal of Security and Its Applications ,10(2),51-62,2016. https://doi.org/10.14257/ijsia.2016.10.2.05
Hemalatha S, U Dinesh Acharya, Renuka A, Deepthi S, and Jyothi Upadhya K.Audio steganography in discrete wavelet transform domain. International Journal of Applied Engineering Research. 10(16):36639–36644,2015.https://www.ripublication.com/ijaer10/ijaerv10n16_85.pdf
Vipul Sharma, and Ravinder Thakur.LSB Modification based Audio Steganography using Trusted Third Party Key Indexing Method.IEEE 2015 Third International Conference on Image Information Processing(ICIIP), 403–406, 2015.
https://doi.org/10.1109/ICIIP.2015.7414805
A. H. Ali, M. R. Mokhtar, and L. E. George .Enhancing the hiding capacity of audio steganography based on block mapping. Journal of Theoretical and Applied Information Technology.95(7):1441–1448,2017.https://www.jatit.org/volumes/Vol95No7/13Vol95No7.pdf
A. H. Ali, L. E. George, A. A. Zaidan, and M. R. Mokhtar.High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain.Multimedia Tools and Applications, 77(23):31487-31516,2018. https://doi.org/10.1007/s11042-018-6213-0
H. I. Shahadi, R. Jidin, and W. H. Way.Lossless audio steganography based on lifting wavelet transform and dynamic stego key.Indian Journal of Science and Technology,7(3):323–334, 2014.
https://doi.org/10.17485/ijst/2014/v7i3.14
Zhang, X. Designs, experiments, and applications of multichannel structures for hearing aids. European Journal of Electrical Engineering and Computer Science.5(4): 46–55,2021. https://doi.org/10.24018/ejece.2021.5.4.347
H. T. Elshoush,and M. M. Mahmoud. Ameliorating LSB Using Piecewise Linear Chaotic Map and One-Time Pad for Superlative Capacity, imperceptibility and Secure Audio Steganography, IEEE Access.11:33354–33380, 2023.
https://doi.org/10.1109/ACCESS.2023.3259902
Chakravorty, Subrato and He, Xuehai and Yang, Xingyi and Xie, Pengtao. 2020. Chakravorty2020COVIDDialogueDatasetEnglish.COVID-Dialogue-Dataset-English: an English medical dialogue dataset about COVID-19 and other types of, pneumonia. https://github.com/UCSD-AI4H/COVID-Dialogue.2020.
https://www.kaggle.com/datasets/xuehaihe/covid-dialogue-dataset?select=COVID-Dialogue-Dataset-English.txt
Thoyazan Sultan Algaradi,and B. Rama. A New Encryption Scheme For Performance Improvement In Big Data Environment Using Mapreduce. Journal of Engineering Science and Technology.16(5):3772 – 3791,2021.https://jestec.taylors.edu.my/Vol%2016%20Issue%205%20October%202021/16_5_11.pdf
R. RamyaDevi,and V. VijayaChamundeeswari. Triple DES: Privacy Preserving in Big Data Healthcare. International Journal of Parallel Programming.48:515-533, 2018.
https://doi.org/10.1007/s10766-018-0592-8
MuhammaYunus, IntanSulistyaningrumSakkinah, Ulfa Emi Rahmawati, AtmaDeharja , Maya WekaSanti. File Security Design in Electronic Health Record (EHR) System with Triple DES Algorithm (3DES) at Jember Family Health Home Clinic.1(1):1-8,2023. https://doi.org/10.47134/ijhis.v1i1.2
M. M. Mahmoud, and H. T. Elshoush.Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography-An Innovative Approach.IEEE Access.10,29954-29971,2022.
https://doi.org/10.1109/ACCESS.2022.3155146
DOI:
https://doi.org/10.31449/inf.v50i6.9998Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







