An Adaptive High Capacity Model for Secure Audio Communication Based on Fractal Coding and Uniform Coefficient Modulatio
- PDF / 1,915,158 Bytes
- 28 Pages / 439.37 x 666.142 pts Page_size
- 83 Downloads / 210 Views
An Adaptive High Capacity Model for Secure Audio Communication Based on Fractal Coding and Uniform Coefficient Modulation Ahmed Hussain Ali1,3
· Loay Edwar George2
· Mohd Rosmadi Mokhtar3
Received: 18 March 2019 / Revised: 26 March 2020 / Accepted: 28 March 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Securing confidential information over an unsecured communication channel and environment has become an essential aspect. This paper proposes high-capacity audio steganography model based on fractal coding and uniform coefficient modulation, which will be called as HASFC, that simultaneously adjusts the data hiding requirements by increasing the hiding capacity while maintaining the transparency and robustness. HASFC model is based on cover-secret mapping, uniform coefficients modulation and hybrid chaotic map techniques in the transform domain using lifting wavelet. The efficiency of the proposed model is evaluated using a set of experiments, and the audio files are selected from the GTZAN dataset. The empirical findings show improvement in hiding capacity by 30% in comparison with similar techniques in the wavelet domain. Moreover, the transparency is preserved with 50 dB SNR and 4.8 SDG, on average. Furthermore, the proposed model is robust to some signal processing attacks and steganalysis using statistical methods such as the fourth first moment and histogram error ratio. The results signify that the proposed model has notably enhanced the performance of the audio steganography comparing with the related works.
B
Ahmed Hussain Ali [email protected] Loay Edwar George [email protected] Mohd Rosmadi Mokhtar [email protected]
1
Ministry of Higher Education and Scientific Research, Studies Planning and Follow-up Directorate, Baghdad, Iraq
2
University of Information Technology and Communication UoITC, Baghdad, Iraq
3
Centre for Cyber Security, Universiti Kebangsaan Malaysia UKM, Bangi, Malaysia
Circuits, Systems, and Signal Processing
Keywords Audio steganography · Lifting wavelet transform · Fractal coding · Hybrid chaotic map · Uniform coefficient modulation
1 Introduction Many approaches have been investigated and developed to protect personal confidentiality. Information security is the practice of providing secure transmission of important data that consists of two main techniques, cryptography and information hiding. Cryptography renders the secret data meaningless and unreadable to the attackers, whereas information hiding conceals the existence of them [15]. Information hiding can be divided into two classes, namely, watermarking and steganography [21, 28]. Hiding capacity, transparency, and robustness are the main requirements of the steganography techniques, and their performance depends directly on these requirements [1, 32]. More specifically, the key goal of steganography techniques is to generate a stego file with high embedding capacity, transparency and statistically undetectable [11, 21, 28]. The main issue in steganography techni
Data Loading...