skip to main content
10.1145/2905055.2905272acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Audio Steganography using ZDT: Encryption using Indexed Based Chaotic Sequence

Published: 04 March 2016 Publication History

Abstract

Steganography is an art and branch of science of hiding data secretly. Steganography can be applied to various digital mediums such as image, text, audio, video, protocols, radio waves, floppy disk, hard drive, network packet etc. Audio steganography uses audio file as the cover medium. It is more difficult to implement than image steganography as Human Visual System (HVS) is less sensitive then Human audio system. ZDT enables to achieve this task and ensures no distortion in the cover audio file. Along with steganography this approach uses cryptography for security concern. Indexed Based Chaotic Sequence is used as an encryption technique. This technique is applied on several audio files and the obtained results shows efficiency, robustness, better complexity (time and space) in terms of performance analysis matrix.

References

[1]
Westfeld A, J. Camenisch et al., "Steganography for Radio Amateurs--- A DSSS Based Approach for Slow Scan Television", Springer-Verlag Berlin Heidelberg, pp. 201--215.
[2]
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM Systems Journal, vol. 35, Issues 3&4, 1996, pp. 313--336.
[3]
William Stalling, Cryptography and network security: Principles and Practices (4th edition), Prentice 2006, ISBN -- 978-81-775-8774-6.
[4]
Shivani, Yadav. V. K., Batham.S, "An Approach to Image Steganography using Strength of Indexed Based Chaotic Sequence", SSCC-2014 (Springer).
[5]
Shivani, Yadav.V, Batham.S, "Zero Distortion Technique: An approach to image steganography on color images using strength of Chaotic Sequence", accepted in ACM ICTCS 2014.
[6]
Shivani, Yadav.V, Batham.S, "A Novel Approach of Bulk Data Hiding using Text Steganography",accepted in Elsevier ICRTC 2015, in press.
[7]
Aradhana Soni and Anuja Kumar Acharya, "A Novel Image Encryption Approach Using An Index Based Chaos And DNA Encoding and Its Performance Analysis", IJCA (0975-8887) Volume 47-No. 23, June 2012.
[8]
S.Batham, A. Acharya, V.K. Yadav, R.Paul."A New Video Encryption Algorithm Based on Indexed Based Chaotic Sequence".CONFLUENCE-2013, IET digital library.
[9]
Anuja Kumar Acharya, "Image Encryption Using A Chaos Base Encryption Algorithm", International Conference On Commmunication, Computing and Security(ICCCS 2011).
[10]
Ashima Wadhwa, "A survey on audio steganography techniques for digital data security", International journal of advanced research in computer science and software engineering, vol. 4, issue 4, April 2014.
[11]
Jayaram P, Ranganatha HR, Anupama HS, "Information hiding using audio steganography---A survey", The International journal of multimedia and its applications IJMA, vol. 3, No. 3, August 2011.
[12]
Ankit Chadha, Neha Satam, Rakshak Sood, Dattatray Bade, "An efficient method for image and audio steganography using least significant bit substitution", International journal of computer applications, vol. 77, September 2013.
[13]
Fatiha Djebbar, Beghdad Ayad, Karim Abed Meraim, Habib Hamam, "Comparative study of digital audio steganography techniques", springer open journal, January 2012.
[14]
Masoud Nosrati, Ronak Karimi, Mehdi Harari, "Audio steganography: A survey on recent approaches", world applied programming, vol. (2), No. (3), pp. 202--205, March 2012.

Cited By

View all
  • (2023)Metamorphic Cryptography Using Concept of Spiral Transposition and LSBs Approach Using Audio as Carrier MediumProceedings of 7th ASRES International Conference on Intelligent Technologies10.1007/978-981-99-1912-3_20(217-227)Online publication date: 6-Jul-2023
  • (2022)DNA and KAMLA Approaches in Metamorphic Cryptography: An Evaluation2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS)10.1109/ICAIS53314.2022.9742764(1173-1178)Online publication date: 23-Feb-2022
  • (2022)Recent Trends for Practicing Steganography Using Audio as Carrier: A StudyAdvances in Data and Information Sciences10.1007/978-981-19-5292-0_52(549-555)Online publication date: 25-Nov-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
March 2016
843 pages
ISBN:9781450339629
DOI:10.1145/2905055
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ZDT
  2. decay
  3. distortion
  4. echo-hiding
  5. matrix of locations

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICTCS '16

Acceptance Rates

Overall Acceptance Rate 97 of 270 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Metamorphic Cryptography Using Concept of Spiral Transposition and LSBs Approach Using Audio as Carrier MediumProceedings of 7th ASRES International Conference on Intelligent Technologies10.1007/978-981-99-1912-3_20(217-227)Online publication date: 6-Jul-2023
  • (2022)DNA and KAMLA Approaches in Metamorphic Cryptography: An Evaluation2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS)10.1109/ICAIS53314.2022.9742764(1173-1178)Online publication date: 23-Feb-2022
  • (2022)Recent Trends for Practicing Steganography Using Audio as Carrier: A StudyAdvances in Data and Information Sciences10.1007/978-981-19-5292-0_52(549-555)Online publication date: 25-Nov-2022
  • (2022)DDNA: A Modified Concept to DNA CryptographyAdvances in Data and Information Sciences10.1007/978-981-16-5689-7_8(91-97)Online publication date: 1-Jan-2022
  • (2020)Digital audio steganographyComputer Science Review10.1016/j.cosrev.2020.10031638:COnline publication date: 1-Nov-2020
  • (2020)Current Trends in Cryptography, Steganography, and Metamorphic Cryptography: A SurveyAdvances in Computational Intelligence and Communication Technology10.1007/978-981-15-1275-9_20(237-247)Online publication date: 19-Jun-2020
  • (2017)Metamorphic cryptography using strength of chaotic sequence and XORing methodJournal of Intelligent & Fuzzy Systems10.3233/JIFS-16927732:5(3365-3375)Online publication date: 24-Apr-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media