High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal doma
- PDF / 3,092,409 Bytes
- 30 Pages / 439.37 x 666.142 pts Page_size
- 44 Downloads / 172 Views
High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain Ahmed Hussain Ali 1 & Loay Edwar George 2 & A. A. Zaidan 3 & Mohd Rosmadi Mokhtar 1
Received: 7 July 2017 / Revised: 22 April 2018 / Accepted: 24 May 2018 # Springer Science+Business Media, LLC, part of Springer Nature 2018
Abstract Information hiding researchers have been exploring techniques to improve the security of transmitting sensitive data through an unsecured channel. This paper proposes an audio steganography model for secure audio transmission during communication based on fractal coding and a chaotic least significant bit or also known as HASFC. This model contributes to enhancing the hiding capacity and preserving the statistical transparency and security. The HASFC model manages to embed secret audio into a cover audio with the same size. In order to achieve this result, fractal coding is adopted which produces high compression ratio with the acceptable reconstructed signal. The chaotic map is used to randomly select the cover samples for embedding and its initial parameters are utilized as a secret key to enhancing the security of the proposed model. Unlike the existing audio steganography schemes, The HASFC model outperforms related studies by improving the hiding capacity up to 30% and maintaining the transparency of stego audio with average values of SNR at 70.4, PRD at 0.0002 and SDG at 4.7. Moreover, the model also shows resistance against brute-force attack and statistical analysis.
* Ahmed Hussain Ali [email protected] Loay Edwar George [email protected] A. A. Zaidan [email protected] Mohd Rosmadi Mokhtar [email protected]
1
Universiti Kebangsaan Malaysia, Bangi, Malaysia
2
University of Baghdad, Baghdad, Iraq
3
Universiti Pendidikan Sultan Idris, Tanjung Malim, Malaysia
Multimed Tools Appl
Keywords Fractal coding . Least significant bit . Steganography . Information hiding . Logistic map . Statistical steganalysis
1 Introduction Information security is the practice of providing secure transmission of important data that mainly consist of two main techniques, cryptography and information hiding [13]. Cryptography renders the secret data to be meaningless and unreadable to the attackers. Information hiding can be divided into two classes, namely, watermarking and steganography. Watermarking achieves copyright protection or ownership by embedding watermarks inside the media. Meanwhile, steganography hides and transmits confidential data and their existence simultaneously [4, 39]. The most common digital media used in data hiding are image, text, audio, and video files. Audio steganography is an approach that hides secret information inside an audio file. Due to the high sensitivity of human auditory system (HAS), hiding secret data in the audio file is a challenge comparing with other media [15]. The performance of any data hiding technique depends on its hiding capacity, transparency, and robustness [14, 20]. Capacity or hiding c
Data Loading...