Audio Stegging using Evolutionary Algorithms

Author:

kumar aman1,Chaudhary Ankit1

Affiliation:

1. Jawaharlal Nehru University

Abstract

Abstract Three security approaches, namely cryptography, watermarking, and steganography, are required due to the rapidly expanding digital communication over the internet. With cryptography, the message’s content is changed, turning plain text into cipher text, but in watermarking, data is hidden to carry additional information like ownership and copyright. However, these methods allow for the detection of secret messages, which increases the intrusive party’s interest in obtaining the secret message while it is being transmitted. The system’s data should always meet the three criteria of availability, confidentiality, and integrity. Steganography has thus emerged as the most trustworthy security method today for preserving the confidentiality and privacy of data while it is being sent. Steganography is the art and science of hiding secret information within a carrier medium, such as images or audio files, in order to protect the confidentiality and integrity of the information. The goal of steganography is to prevent the attacker from knowing what the actual data is. This is used to stop data from being shared with unauthorized system users. To covertly incorporate vast amounts of hidden information into an image while ensuring that others are unaware of its presence, an image steganography algorithm is needed. Image steganography is the practice of concealing data which could be text, images, or audio files within an image. In recent years, various techniques, including the Least Significant Bit (LSB) approach, Bit Plane, Spiral Embedding, Metadata Manipulation, and others, have been proposed for implementing steganography. However, the security of the hidden information can be enhanced by combining steganography with cryptography. This research proposes a new steganography technique that aims to hide audio files within an image using different metaheuristic algorithms, such as Ant Lion Optimizer (ALO), Harris Hawks Optimization (HHO), Firefly Optimization (FO), Cuckoo Search (CS), and Moth Flame Optimization (MFO). These algorithms are chosen for their ability to find optimal solutions in large search spaces. The proposed method builds on the LSB technique by partitioning the carrier image into blocks and applying the LSB technique to each block to hide the audio data. To increase the security of the hidden data, a metaheuristic algorithm is used to generate a random sequence of locations within the carrier image where the audio bit stream will be embedded. This random sequence generation makes it difficult for an attacker to locate and extract the hidden data. The proposed method aims to address some of the challenges faced by existing image steganography techniques, such as low capacity and weak security. The performance of the proposed method will be evaluated using various metrics, including Capacity, Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), and Mean Square Error (MSE). The experimental results are expected to demonstrate the effectiveness of the proposed method in terms of improved capacity and increased security, contributing to the field of steganography. Overall, this research contributes to the field of steganography by proposing a new and improved technique that combines metaheuristic algorithms with LSB embedding for secure audio steganography in images.

Publisher

Research Square Platform LLC

Reference54 articles.

1. Saxena A, Maheshwari G (2021) ”DigitalImageSteganography”,InternationalConferenceonSimulation,Automation&SmartManufacturing(SASM),pp.1–5

2. MLSB Technique Based 3D Image Steganography Using AES Algorithm;Nandhini E;J Recent Res Eng Technol,2016

3. Ashu RR, Bansal D (2014) "GLCMbasedfeaturesforsteganalysis",5thInternationalConferenceonConfluenceTheNextGenerationInformationTechnologySummit,pp.385–390

4. A new approach to reliable detection of LSB steganography in natural images;Zhang T;Sig Process,2003

5. A review of image steganalysis techniques for digital forensics;Karampidisa K;J Inform Secur Appl,2018

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3