A Secure Audio Steganography Scheme using Genetic Algorithm

被引:0
|
作者
Sobin, C. C. [1 ]
Manikandan, V. M. [1 ]
机构
[1] SRM Univ AP Amaravati, Dept Comp Sci & Engn, Amaravati, Andhra Pradesh, India
来源
2019 FIFTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP 2019) | 2019年
关键词
Audio steganography; Encryption; Least significant bit data hiding; Secure data transmission;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Steganography is an active research area in the field of information security. Audio steganography refers to the process of embedding a secret message into an audio signal for secure message transmission. In this paper, we propose a novel secure and robust audio steganography scheme with good embedding rate. The key idea behind the proposed scheme is that a secure encryption scheme is used in the steganography scheme to encrypt the secret message. Further, a random least significant bit plane will be selected by using the genetic algorithm. The encrypted secret message bits will be embedded into the selected bit-plane. The genetic algorithm helps to reduce the distortions on the stego audio after the data hiding process. The selection of higher bit-planes for data hiding process will help to achieve better robustness against noises. The experimental study of the proposed scheme on a variety of audio signals shows that the proposed scheme performs better than the well-known least significant bit steganography scheme.
引用
收藏
页码:403 / 407
页数:5
相关论文
共 50 条
  • [31] A SECURE CRYPTOGRAPHIC SCHEME FOR AUDIO SIGNALS
    Asok, Sruthi B.
    Karthigaikumar, P.
    Sandhya, R.
    Jarold, Naveen K.
    Mangai, N. M. Siva
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2013, : 748 - 752
  • [32] A Secure Steganography Algorithm Using Compressive Sensing based on HVS Feature
    Shafee, Samaneh
    Rajaei, Boshra
    2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 73 - 77
  • [33] Optimized Video Steganography using Genetic Algorithm (GA)
    Dasgupta, Kousik
    Mondal, Jyotsna Kumar
    Dutta, Paramartha
    FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 131 - 137
  • [34] Performance Analysis of DES Algorithm and RSA Algorithm with Audio Steganography
    Gambhir, A.
    Arya, R.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING 2016 (ICCASP 2016), 2017, 137 : 333 - 340
  • [35] Key distribution scheme based on genetic algorithm in secure multicast
    Xu, Q.
    Zhao, H.
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (03):
  • [36] A secure controlled quantum image steganography algorithm
    Zhiguo Qu
    Siyi Chen
    Xiaojun Wang
    Quantum Information Processing, 2020, 19
  • [37] A secure steganography scheme based on (N, t) threshold
    Fan, K
    Kou, WD
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 536 - 539
  • [38] Dual Layered Secure Algorithm for Image Steganography
    Gowda, Shreyank N.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 22 - 24
  • [39] A secure controlled quantum image steganography algorithm
    Qu, Zhiguo
    Chen, Siyi
    Wang, Xiaojun
    QUANTUM INFORMATION PROCESSING, 2020, 19 (10)
  • [40] Audio Steganography Using Spectrum Manipulation
    Nathan, Mark
    Parab, Nikhil
    Talele, K. T.
    TECHNOLOGY SYSTEMS AND MANAGEMENT, 2011, 145 : 152 - 159