Skip to main content

Chaos-Based Audio Steganography and Cryptography Using LSB Method and One-Time Pad

  • Conference paper
  • First Online:
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016 (IntelliSys 2016)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 16))

Included in the following conference series:

Abstract

This paper presents a chaos-based audio steganography and cryptography method that is based on Least Significant Bit (LSB) and one-time pad, respectively. In the proposed scheme, two chaotic maps were used, Piecewise Linear Chaotic Map (PWLCM) and logistic map for encryption and steganography, respectively. For encryption, a quantized generated chaotic sequence of PWLCM is used as key for one-time pad algorithm. For message hiding, a chaotic sequence is generated by the logistic map and ordered ascendingly or descendingly. Then, the encrypted data are embedded based on the indices for the ordered sequence of the host audio LSB’s samples. An analysis is discussed for the proposed scheme. It overcomes the drawbacks of key generation and distribution for one-time pad by using the chaotic maps. The proposed method satisfies the main requirements of steganography, perceptual transparency, capacity of hidden data and robustness. Experimental results were made, waveform analysis and signal-to-noise ratio, which indicated that the stego audio has high quality. The analysis demonstrates the efficiency of the proposed method, and so it can be applied to secure communications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bassil, Y.: A two intermediates audio steganography technique. J. Emerg. Trends Comput. Inf. Sci. (CIS) 3(11) (2012)

    Google Scholar 

  2. Divya, S., Reddy, M.R.: Hiding text in audio using multiple LSB steganography and provide security using cryptography. Int. J. Sci. Technol. Res. 1(6), 68–70 (2012)

    Google Scholar 

  3. Jayaram, P., Ranganatha, H., Anupama, H.: Information hiding using audio steganography - a survey. Int. J. Multimedia Appl. (IJMA) 3(3) (2011)

    Google Scholar 

  4. Nehru, G., Dhar, P.: A detailed look of audio steganography techniques using LSB and genetic algorithm approach. IJCSI Int. J. Comput. Sci. Issues 9(2), 402–406 (2012)

    Google Scholar 

  5. Adhiya, K.P., Patil, S.A.: Hiding text in audio using LSB based steganography. Inf. Knowl. Manag. IISTE 2(3), 8–14 (2012)

    Google Scholar 

  6. Cvejic, N., Seppanen, T.: Increasing robustness of LSB audio steganography using a novel embedding method. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC04). IEEE (2004)

    Google Scholar 

  7. Zamani, M., Manaf, A.A., Ahmad, R.B., Zeki, A.M., Abdullah, S.: A genetic-algorithm-based approach for audio steganography. World Acad. Sci. Eng. Technol. 30, 355–358 (2009)

    Google Scholar 

  8. Parthasarathy, C., Srivatsa, S.K.: Increased robustness of LSB audio steganography by reduced distortion LSB coding. J. Theoret. Appl. Inf. Technol. 7(1), 80–86 (2009)

    Google Scholar 

  9. Gadicha, A.B.: Audio wave steganography. Int. J. Soft Comput. Eng. (IJSCE) 1(5), 174–176 (2011)

    Google Scholar 

  10. Bandyopadhyay, S., Datta, B.: Higher LSB layer based audio steganography technique. Int. J. Electron. Commun. Technol. 2(4) (2011)

    Google Scholar 

  11. Hmood, D.N., Khudhiar, K.A., Altaei, M.S.: A new steganographic method for embedded image in audio file. Int. J. Comput. Sci. Secur. (IJCSS) 6(2), 135–141 (2012)

    Google Scholar 

  12. Deepak, D., Karthik, M.L., Manjunath, A.E.: Efficient method to increase robustness in audio steganography. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 1(6), 531–536 (2012)

    Google Scholar 

  13. Olanrewaju, R.F., Khalifa, O., Abdul Rahman, H.: Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Appl. Sci. J. (Math. Appl. Eng.) 21, 79–83 (2013)

    Google Scholar 

  14. Priyanka, R.B., Vrushabh, R.K., Komal, K.P., Pingle, S.M., Sanghavi Mahesh, R.: Audio steganography using LSB. In: 1st International Conference on Recent Trends in Engineering and Technology, Special Issue of International Journal of electronics, Communication and Soft Computing Science and Engineering, pp. 90–92, March 2012

    Google Scholar 

  15. Padmashree, G., Venugopala, P.S.: Audio stegnography and cryptography: using LSB algorithm at 4th and 5th LSB layers. Int. J. Eng. Innov. Technol. (IJEIT) 2(4), 177–181 (2012)

    Google Scholar 

  16. Patil, B.A., Chakkarwar, V.A.: Review of an improved audio steganographic technique over LSB through random based approach. IOSR J. Comput. Eng. (IOSR-JCE) 9(1), 30–34 (2013)

    Google Scholar 

  17. Sheikhan, M., Asadollahi, K., Shahnazi, R.: Improvement of embedding capacity and quality of DWT-based audio steganography systems. World Appl. Sci. J. 13(3), 507–516 (2011)

    Google Scholar 

  18. Prabu, A.V., Srinivasarao, S., Apparao, T., Rao, M.J., Rao, K.B.: Audio encryption in handsets. Int. J. Comput. Appl. 40(6), 40–45 (2012)

    Google Scholar 

  19. Zameer, F., Tarun, K.: Audio steganography using DES algorithm. In: Proceedings of the 5th National Conference, New Delhi, India (2011)

    Google Scholar 

  20. Dengre, A.R., Gawande, A.D., Deshmukh, A.B.: Effect of audio steganography based on LSB insertion with image watermarking using AVI video. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2(6), 363–370 (2013)

    Google Scholar 

  21. Sathishkumar, G., Bhoopathy, K., Sriraam, N.: Image encryption based on diffusion and multiple chaotic maps. Int. J. Netw. Secur. Appl. (IJNSA) 3(2) (2011)

    Google Scholar 

  22. Hung, K.: A study on efficient chaotic image encryption schemes, Department of Electronic Engineering, City University of Hong Kong, Master thesis (2007)

    Google Scholar 

  23. Stallings, W.: Cryptography and Network Security Principles and Practice, 5th edn. Prentice Hall, Boca Raton (2011)

    Google Scholar 

  24. Andrade, J., Campos, M., Apolinario, J.: Speech privacy for modern mobile communication systems. In: Proceedings of IEEE Conference on Acoustics, Speech, and Signal Processing, pp. 1777–1780. IEEE Press, Nevada (2008)

    Google Scholar 

  25. Awad, A., Saadane, A.: New chaotic permutation methods for image encryption. IAENG Int. J. Comput. Sci. 37(4), 14–21 (2010)

    Google Scholar 

  26. Zielinska, E., Mazurczyk, W., Szczypiorski, K.: Trends in steganography. Commun. ACM 57(3), 86–95 (2014)

    Google Scholar 

  27. Sinha, N., Bhowmick, A., Kishore, B.: Encrypted information hiding using audio steganography and audio cryptography. Int. J. Comput. Appl. 112(5) (2015)

    Google Scholar 

  28. Krishnan, S., Abdullah, M.S.: Enhanced security audio steganography by using higher least significant bit. J. Adv. Res. Comput. Appl. 2(1), 39–54 (2016)

    Google Scholar 

Download references

Acknowledgment

This research was supported by the University of Khartoum and the Nile Center for Technology Research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samah M. H. Alwahbani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Alwahbani, S.M.H., Elshoush, H.T.I. (2018). Chaos-Based Audio Steganography and Cryptography Using LSB Method and One-Time Pad. In: Bi, Y., Kapoor, S., Bhatia, R. (eds) Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016. IntelliSys 2016. Lecture Notes in Networks and Systems, vol 16. Springer, Cham. https://doi.org/10.1007/978-3-319-56991-8_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56991-8_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56990-1

  • Online ISBN: 978-3-319-56991-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics