Skip to main content
Log in

Securing encrypted image information in audio data

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Advances in communication technologies have fueled growth in digital data transfer. Images are one of the most often conveyed types of digital information. Crytographic techniques help create cipher but also lure attackers as it indicates secret communication. To overcome, a method for encrypting a secret image and hiding it in audio data is proposed. The Ikeda map is used to create the encrypted image, which is then hidden in the audio’s lifting wavelet transform. Various statistical experiments show that the proposed approach conceals the encrypted image while causing minimal changes to the audio. The proposed algorithm shows robustness towards noise addition or random audio crop attack by retrieving a visually perceivable image after the attack. The suggested approach outperforms the current algorithms in terms of imperceptibility and embedding capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Abd EL-Latif A A, Abd-El-Atty B, Venegas-Andraca S E (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92–102

    Article  MATH  Google Scholar 

  2. Bansal R, Badal N (2022) A novel approach for dual layer security of message using steganography and cryptography. Multimed Tools Appl 81:20669–20684

  3. Basu S, Debnath A, Basu A, et al. (2022) An image data hiding technique using differential evolution. Multimed Tools Appl 1–18

  4. Bbc sound effects. http://bbcsfx.acropolis.org.uk. Accessed 29 June 2020

  5. Chattopadhyay C, Sarkar B, Mukherjee D (2015) Encoding by dna relations and randomization through chaotic sequences for image encryption. arXiv preprint arXiv:1505.01795

  6. Ditta A, Azeem M, Naseem S et al (2022) A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode. Journal of King Saud University - Computer and Information Sciences 34 (5):2180–2191

    Article  Google Scholar 

  7. Djebbar F, Ayad B, Meraim K A, et al. (2012) Comparative study of digital audio steganography techniques. EURASIP J Audio Speech Music Process 2012(1):1–16

    Article  Google Scholar 

  8. El-Khamy S E, Korany N, El-sherif MH (2017a) Robust image hiding in audio based on integer wavelet transform and chaotic maps hopping. In: 2017 34Th national radio science conference (NRSC), IEEE, pp 205–212

  9. El-Khamy SE, Korany NO, El-Sherif MH (2017b) A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and rsa encryption. Multimedia Tools Appl 76 (22):24091–24106

    Article  Google Scholar 

  10. El-Rahman SA (2018) A comparative analysis of image steganography based on dct algorithm and steganography tool to hide nuclear reactors confidential information. Comput Electr Eng 70:380–399

    Article  MathSciNet  Google Scholar 

  11. Gupta Banik B, Bandyopadhyay S K (2018) Blind key based attack resistant audio steganography using cocktail party effect. Secur Commun Netw. 2018:1781384:1–1781384:21

  12. Hongjun Liu A K, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifurcation Chaos 30 (12):2050173(1)–2050173(14)

    MathSciNet  MATH  Google Scholar 

  13. Hussain M, Wahab A W A, Idris Y I B, et al. (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66

    Article  Google Scholar 

  14. Ikeda K, Daido H, Akimoto O (1980) Optical turbulence: Chaotic behavior of transmitted light from a ring cavity. Phys Rev Lett 45:709–712. https://doi.org/10.1103/PhysRevLett.45.709

    Article  Google Scholar 

  15. Karakus S, Avci E (2020) A new image steganography method with optimum pixel similarity for data hiding in medical images. Med Hypotheses 139:109691

    Article  Google Scholar 

  16. Lochter M, Merkle J (2010) Elliptic curve cryptography (ecc) brainpool standard curves and curve generation. https://doi.org/10.17487/RFC5639. https://www.rfc-editor.org/info/rfc5639

  17. Paul G, Saha S K, et al. (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl 77(14):18,451–18,481

    Article  Google Scholar 

  18. Qi B, Yang C, Tan L, et al. (2020) A novel haze image steganography method via cover-source switching. J Vis Commun Image Represent 70:102814

    Article  Google Scholar 

  19. Ren Y, Cai S, Wang L (2021) Secure aac steganography scheme based on multi-view statistical distortion (sofmvd). J Inf Secur Appl 59:102863

    Google Scholar 

  20. Rukhin A, Soto J, Nechvatal J, et al. (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Booz-allen and hamilton inc mclean va, Tech. rep.

    Google Scholar 

  21. Sahasrabuddhe A, Laiphrakpam D S (2021) Multiple images encryption based on 3d scrambling and hyper-chaotic system. Inf Sci 550:252–267

    Article  MathSciNet  MATH  Google Scholar 

  22. Shafi K, Sankaranarayanan A, Prashanth G et al (2010) A novel audio steganography scheme using amplitude differencing. In: Trendz in Information Sciences & Computing (TISC2010), IEEE, pp 163–167

  23. Thanki R, Borra S (2018) A color image steganography in hybrid FRT–DWT domain. J Inf Secur Appl 40:92–102. https://doi.org/10.1016/j.jisa.2018.03.004

    Article  Google Scholar 

  24. The usc-sipi image database. http://sipi.usc.edu/database. Accessed 01 July 2020

  25. Valandar M Y, Ayubi P, Barani M J (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inf Secur Appl 34:142–151

    Google Scholar 

  26. Wahab O F A, Khalaf A A, Hussein A I, et al. (2021) Hiding data using efficient combination of rsa cryptography, and compression steganography techniques. IEEE Access 9:31805–31815

    Article  Google Scholar 

  27. Wu Y, Noonan J P, Agaian S, et al. (2011) Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Sel Areas Telecommun (JSAT) 1(2):31–38

    Google Scholar 

  28. Xiang S, Li Z (2017) Reversible audio data hiding algorithm using noncausal prediction of alterable orders. EURASIP J Audio Speech Music Process 2017(1):1–16

    Article  Google Scholar 

  29. Younis A O (2022) A novel approach of steganography by using strong edge detection and chaos theory. Multimed Tools Appl 81(13):17875–17888

    Article  Google Scholar 

  30. Younus ZS, Hussain MK (2019) Image steganography using exploiting modification direction for compressed encrypted data

  31. Yu H, Wang R, Dong L, et al. (2020) A high-capacity reversible data hiding scheme using dual-channel audio. IEEE Access 8:162271–162278

    Article  Google Scholar 

  32. Zhang H, Hu L (2019) A data hiding scheme based on multidirectional line encoding and integer wavelet transform. Signal Process Image Commun 78:331–344

    Article  Google Scholar 

Download references

Funding

We confirm that there are no funding Sources.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dolendro Singh Laiphrakpam.

Ethics declarations

Competing interests

We wish to confirm that there are no known conflicts of interest associated with this publication. We confirm that the manuscript has been read and approved by all named authors and that there are no other persons who satisfied the criteria for authorship but are not listed. We further confirm that the order of authors listed in the manuscript has been approved by all of us.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Dolendro Singh Laiphrakpam contributed equally to this work.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shamsi, Z., Laiphrakpam, D.S. Securing encrypted image information in audio data. Multimed Tools Appl 82, 33063–33085 (2023). https://doi.org/10.1007/s11042-023-14735-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14735-0

Keywords

Navigation