Skip to main content

Advertisement

Log in

Genetic algorithm for fragile audio watermarking

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

A novel genetic-concept-based algorithm is proposed for fragile audio watermarking to reduce the distortion of least significant bits substitution and consequently improve the peak signal-to-noise ratio (PSNR) and increase the payload of results. The result of testing shows that in comparison with ordinary substitution techniques and other presented techniques, the payload is considerably increased and PSNR (as an indicator of imperceptibility) is noticeably raised.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Srivastava, M., & Rafiq, M. Q. (2011). A novel approach to secure communication using audio steganography. Advanced Materials Research, 403–408(2012), 963–969.

    Article  Google Scholar 

  2. Zamani, M., Taherdoost, H., Manaf, A. A., Ahmad, R. B., & Zeki, A. M. (2009). An artificial-intelligence-based approach for audio steganography. MASAUM Journal of Open Probelms in Science and Engineering (MJOPSE), 1(1), 64–68.

    Google Scholar 

  3. Zamani, M., Taherdoost, H., Manaf, A.A., Ahmad, R., & Zeki, A. (2009). Robust Audio Steganography via Genetic Algorithm. In Third International Conference on Information & Communication Technologies ICICT2009 (pp. 149–153), 15–16, Karachi, Pakistan.

  4. Abdullah, S.M., Manaf, A.A., & Zamani, M. (2010). Capacity and quality improvement in reversible image watermarking approach. in 6th International Conference on Networked Computing and Advanced Information Management (pp. 16–18), Seoul, Korea.

  5. Abdullah, S. M., Manaf, A. A., & Zamani, M. (2010). Recursive reversible image watermarking using enhancement of difference expansion techniques. Journal of Information Security Research, 1(2), 64–70.

    Google Scholar 

  6. Zamani, M., Manaf, A.A., Ahmad, R., & Zeki, A. (2009). An approach to improve the robustness of substitution techniques of audio steganography. in 2nd IEEE International Conference on Computer Science and Information Technology 2009, Volume 2 (pp. 5–9), 8–11, Beijing, China.

  7. Zamani, M., Manaf, A. A., Ahmad, R., Jaryani, F., Taherdoost, H., Chaeikar, S. S., et al. (2010). A novel approach for genetic audio watermarking. Journal of Information Assurance and Security, 5, 102–111.

    Google Scholar 

  8. Zamani, M., Manaf, A. A., Ahmad, R., Jaryani, F., Taherdoost, Hamed, Chaeikar, S. S., et al. (2010). Genetic audio steganography. International Journal on Recent Trends in Engineering & Technology [IJRTET], 3(2), 89–91.

    Google Scholar 

  9. Zamani, M., Manaf, A.A., Ahmad, R., Jaryani, F., Taherdoost, H., & Zeki, A. (2009). A secure audio steganography approach. In The 4th International Conference for Internet Technology and Secured Transactions (pp. 501–506), 9–12, London, UK.

  10. Zamani, M., Manaf, A.Bt.A., & Abdullah, S.M. (2012). Efficient embedding for audio steganography. In 2nd International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics (EDSCM ’13), France, April 2–4.

  11. Zamani, M., Manaf, A.Bt.A., Abdullah, S.M., & Chaeikar, S.S. (2012). Correlation between PSNR and bit per sample rate in audio steganography. in 11th International Conference on Signal Processing (SIP ’12), Saint Malo & Mont Saint-Michel, France, April 2–4.

  12. Zamani, M., Manaf, A.Bt.A., & Abdullah, S.M. (2012). Correlation between PSNR and size ratio in audio steganography. In: 11th International Conference on Telecommunications and Informatics (TELE-INFO ’12). Saint Malo & Mont Saint-Michel, France, April 2–4.

  13. Zamani, M., Manaf, A Bt A, & Abdullah, S. M. (2012). An overview on audio steganography techniques. International Journal of Digital Content Technology and its Applications (JDCTA), 6, 107–122.

    Google Scholar 

  14. Zamani, M., Manaf, A.A., & Daruis, R. (2012). Azizah technique for efficiency measurement in steganography. In 8th International Conference on Digital Content, Multimedia Technology and its Applications, June 26–28, Jeju, Korea.

  15. Zamani, M., Manaf, A Bt A, Abdullah, S. M., & Chaeikar, S. S. (2012). Mazdak technique for PSNR estimation in audio steganography. Applied Mechanics and Materials, 229—-231, 2798–2803.

    Google Scholar 

  16. Oludele, A. (2010). Artificial intelligence and security. International Journal of Computational Intelligence and Information Security 1(3).

  17. Zeki, A. M. (2011). A robust watermark embedding in smooth areas. Research Journal of Information Technology, 3(2), 123–131. doi:10.3923/rjit.2011.123.131.

    Article  Google Scholar 

  18. Zamani, M., Manaf, A.A., & Ahmad, R. (2009) Current problems of substitution techniques of audio steganography. In The 2009 International Conference on Artificial Intelligence and Pattern Recognition (pp. 154–160), 13-16, Orlando, Florida, USA.

  19. Cvejic, N. (2004). Algorithms for audio watermarking and steganography. Oulu: University of Oulu.

    Google Scholar 

  20. Wang, R.-Z., Lin, C.-F., & Lin, J.-C. (2001). Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3), 671–683.

    Article  Google Scholar 

  21. Wu, M.-N., Lin, M.-H., & Chang, C.-C. (2004). A LSB substitution oriented image hiding strategy using genetic algorithms. Lecture Notes in Computer Science, 3309, 219–229.

    Google Scholar 

  22. Luo, W., Huang, F., & Huang, J. (2010). Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 5(2), 201–214.

    Article  Google Scholar 

  23. Ji, R., Yao, H., Liu, S., & Wang, L. (2006). Genetic algorithm based optimal block mapping method for LSB substitution. In International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 215–218).

  24. Wang, R., Lin, C., & Lin, J. (2001). Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3), 671–683.

    Article  Google Scholar 

  25. Liu, S., Chen, T., Yao, H., & Gao, W. (2004). A variable depth LSB data hiding technique in images. International Conference on Machine Learning and Cybernetics, 7, 3990–3994.

    Google Scholar 

  26. Kalker, T., & Haitsma, J. (2000). Efficient detection of a spatial spread-spectrum watermark in mpeg video streams. In Proceedings of IEEE International Conference on Image Processing Vancouver, BC (pp. 407–410).

  27. Pickholtz, R. L., Schilling, D. L., & Milstein, L. B. (1982). Theory of spread-spectrum communications: A tutorial. IEEE Transactions on Communications, 30(5), 855–884.

    Article  Google Scholar 

  28. Zamani, M., Manaf, A.A., & Ahmad, R. (2009). Knots of substitution techniques of audio steganography. In The 2009 International Conference on Telecom Technology and Applications (pp. 415-419), June 6–8, Manila, Philippines.

  29. Zamani, M., Manaf, A. A., Zeidanloo, H. R., & Chaeikar, S. S. (2011). Genetic subtitution-based audio steganography for high-capacity applications. International Journal for Internet Technology and Secured Transactions (IJITST), 3(1), 97–110. doi:10.1504/IJITST.2011.039681.

    Article  Google Scholar 

  30. Zamani, M., Manaf, A.A., Ahmad, R., Zeki, A., & Abdullah, S. (2009) Genetic algorithm as an approach to resolve the problems of substitution techniques of audio steganography. In The 2009 International Conference on Genetic and Evolutionary Methods (pp. 170-175), 13–16 Las Vegas, Nevada, USA.

  31. Zamani, M., Manaf, A.A., Ahmad, R., Zeki, A., & Abdullah, S. (2009) A genetic-algorithm-based approach for audio steganography. In International Conference on Communities and Communications. World Academy of Science, Engineering and Technology 54 (pp. 359–363), 24–26 June 2009, Paris, France.

  32. Zamani, M., Manaf, A.A., Ahmad, R., Zeki, A., & Magalingam, P. (2009). A novel approach for audio watermarking. In: 5th International Conference on Information Assurance and Security (pp. 83-86), 18–20 Xi’an, China.

  33. Zeki, A.M., Manaf, A.A., & Zamani, M. (2010). Bit-plane model: Theory and implementation. In Engineering Conference 2010 (EnCon2010), April 14–16. Kuching, Sarawak, Malaysia.

  34. Zamani, M., & Manaf, A.A. (2010). Azizah’s formula to measure the efficiency of steganography techniques. In 2nd International Conference on Information and Multimedia Technology (ICIMT 2010). 28–30 December, Hong Kong, China.

  35. Zamani, M., & Manaf, A.A. (2010). Mazdak’s method to estimate the PSNR of audio steganography techniques. In International Conference on Computer and Computational Intelligence (ICCCI 2010). 25–26 December, Nanning, China.

  36. Darsana, R., & Vijayan, A. (2011). Audio steganography using modified LSB and PVD. Trends in network and communications. Communications in Computer and Information Science, 197(1), 11–20.

    Google Scholar 

  37. Wang, S., Song, X., & Niu, X. (2012). An affine transformation based image steganography approach. International Journal of Digital Content Technology and its Applications, 6(1), 14–85.

    Google Scholar 

  38. Qin, J. (2011). An improved method to secret message length estimation in \(\pm \)k embedding steganography. Journal of Convergence Information Technology, 6(5), 339–346.

    Article  Google Scholar 

  39. Xiang, L., Sun, X., Luo, G., & Xia, B. (2011). Steganalysis of syntactic transformation based steganography. International Journal of Digital Content Technology and its Applications, 5(5), 320–330.

    Article  Google Scholar 

  40. Verma, H., Kaur, R., & Kumar, R. (2009) Random sample audio watermarking algorithm for compressed wave files. IJCSNS International Journal of Computer Science and Network Security, 9(11).

  41. Agaian, S.S., Akopia, D., & D’Souza, S.A. (2005) Two Algorithms in digital audio steganography using quantized frequency domain embedding and reversible integer transforms. Non-linear Signal Processing Lab, University of Texas at San Antonio, 6900 North Loop 1604 West, San Antonio, Texas 78249, USA.

  42. Foo, S.W., & Dong, Q. (2009). Robustness of one bit per sample audio watermarking. In: Source: Proceedings of IEEE International Symposium on Circuits and Systems ISCAS (pp. 932–935) 2009.

  43. Liu, S., Yao, H., Gao, W., & Yang, D. (2007). Minimizing the distortion spatial data hiding based on equivalence class. Source: Lecture Notes in Computer Science, v 4681 LNCS, pp. 667–678, 2007. In Advanced Intelligent Computing Theories and Applications: With Aspects of Theoretical and Methodological Issues Proceedings of 3rd International Conference on Intelligent Computing, ICIC.

  44. Cvejic, N., & Seppanen, T. (2002). Increasing the capacity of LSB-based audio steganography. In IEEE Workshop on Multimedia Signal Processing (pp. 336–338).

  45. Cvejic, N., & Seppäne., T. (2005). Increasing robustness of LSB audio steganography by reduced distortion LSB coding. Journal of Universal Computer Science, 11(1), 56–65.

    Google Scholar 

  46. Delforouzi, A., & Pooyan, M. (2008). Adaptive digital audio steganography based on integer wavelet transform. Circuits, Systems, and Signal Processing, 27(2), 247–259.

    Article  Google Scholar 

  47. Zhang, X., & Wang, S. (2012). Efficient data hiding with histogram-preserving property. Telecommunication Systems, 49(2), 179–185. doi:10.1007/s11235-010-9364-5.

    Article  Google Scholar 

  48. Mazurczyk, W., & Szczypiorski, K. (2012). Evaluation of steganographic methods for oversized IP packets. Telecommunication Systems, 49(2), 207–217. doi:10.1007/s11235-010-9362-7.

    Article  Google Scholar 

  49. Szczypiorski, K. (2012). A performance analysis of HICCUPS-a steganographic system for WLAN. Telecommunication Systems, 49(2), 255–259. doi:10.1007/s11235-010-9363-6.

    Article  Google Scholar 

  50. Mazurczyk, W., & Lubacz, J. (2010). LACK-a VoIP steganographic method. Telecommunication Systems, 45(2–3), 153–163. doi:10.1007/s11235-009-9245-y. Special Issue: SI.

    Article  Google Scholar 

  51. Huang, H.-C., & Fang, W.-C. (2010). Techniques and applications of intelligent multimedia data hiding. Telecommunication Systems, 44(3–4), 241–251. doi:10.1007/s11235-009-9262-x. Special Issue: SI.

    Article  Google Scholar 

  52. Maity, S. P., Maity, S., & Sil, J. (2012). Multicarrier spread spectrum watermarking for secure error concealment in fading channel. Telecommunication Systems, 49(2), 219–229. doi:10.1007/s11235-010-9369-0.

    Article  Google Scholar 

  53. He, H., & Zhang, J. (2012). Cryptanalysis on majority-voting based self-recovery watermarking scheme. Telecommunication Systems, 49(2), 231–238. doi:10.1007/s11235-010-9380-5.

    Article  Google Scholar 

  54. Zhang, L., & Zhou, P.-P. (2010). Localized affine transform resistant watermarking in region-of-interest. Telecommunication Systems, 44(3–4), 205–220. doi:10.1007/s11235-009-9260-z. Special Issue: SI.

    Article  Google Scholar 

  55. Singh, R., Vatsa, M., Singh, S. K., & Upadhyay, S. (2009). Integrating SVM classification with SVD watermarking for intelligent video authentication. Telecommunication Systems, 40(1–2), 5–15. doi:10.1007/s11235-008-9141-x.

  56. Jabbar, Alaa A., Sahib, Shahrin Bin., & Zamani, Mazdak. (2013). Multimedia Data Hiding Evaluation Metrics. In 7th WSEAS International Conference on Computer Engineering and Applications (CEA ’13). 9–11 January, Milan, Italy.

  57. Jabbar, A.A., Sahib, S.B., & Zamani, M. (2013) An introduction to watermarking techniques. In 12th WSEAS International Conference on Applications of Computer Engineering (ACE ’13). January 30 to February 1, Cambridge, MA, USA.

  58. Zamani, M., Manaf, A.Bt.A., Abdullah, S.M., & Chaeikar, S.S. (2012). Correlation between PSNR and bit per sample rate in audio steganography. In 11th International Conference on Signal Processing (SIP ’12) (pp. 163–168). April 2–4, Saint Malo & Mont Saint-Michel, France.

  59. Zamani, M., Manaf, A.Bt.A., & Abdullah, S.M. (2012) Correlation between PSNR and size ratio in audio steganography. In 11th International Conference on Telecommunications and Informatics (TELE-INFO ’12) (pp. 82–87). April 2–4, Saint Malo & Mont Saint-Michel. France.

  60. Zamani, M., Manaf, A.Bt.A., & Abdullah, S.M. (2012) Efficient embedding for audio steganography. In 2nd International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics (EDSCM ’13) (pp. 195–199). April 2–4, Saint Malo & Mont Saint-Michel, France.

Download references

Acknowledgments

This work is a part of a research that has been done and supported by Universiti Teknologi Malaysia, Malaysia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mazdak Zamani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zamani, M., Manaf, A.B.A. Genetic algorithm for fragile audio watermarking. Telecommun Syst 59, 291–304 (2015). https://doi.org/10.1007/s11235-014-9936-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-014-9936-x

Keywords

Navigation