High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain

被引:0
|
作者
Ahmed Hussain Ali
Loay Edwar George
A. A. Zaidan
Mohd Rosmadi Mokhtar
机构
[1] Universiti Kebangsaan Malaysia,
[2] University of Baghdad,undefined
[3] Universiti Pendidikan Sultan Idris,undefined
来源
关键词
Fractal coding; Least significant bit; Steganography; Information hiding; Logistic map; Statistical steganalysis;
D O I
暂无
中图分类号
学科分类号
摘要
Information hiding researchers have been exploring techniques to improve the security of transmitting sensitive data through an unsecured channel. This paper proposes an audio steganography model for secure audio transmission during communication based on fractal coding and a chaotic least significant bit or also known as HASFC. This model contributes to enhancing the hiding capacity and preserving the statistical transparency and security. The HASFC model manages to embed secret audio into a cover audio with the same size. In order to achieve this result, fractal coding is adopted which produces high compression ratio with the acceptable reconstructed signal. The chaotic map is used to randomly select the cover samples for embedding and its initial parameters are utilized as a secret key to enhancing the security of the proposed model. Unlike the existing audio steganography schemes, The HASFC model outperforms related studies by improving the hiding capacity up to 30% and maintaining the transparency of stego audio with average values of SNR at 70.4, PRD at 0.0002 and SDG at 4.7. Moreover, the model also shows resistance against brute-force attack and statistical analysis.
引用
收藏
页码:31487 / 31516
页数:29
相关论文
共 50 条
  • [31] 10 Gb/s classical secure key distribution based on temporal steganography and private chaotic phase scrambling
    ZHENSEN GAO
    ZHITAO DENG
    LIHONG ZHANG
    XULIN GAO
    YUEHUA AN
    ANBANG WANG
    SONGNIAN FU
    ZHAOHUI LI
    YUNCAI WANG
    YUWEN QIN
    Photonics Research, 2024, (02) : 321 - 330
  • [32] A new high capacity and secure image realization steganography based on ASCII code matching
    Elshoush, Huwaida T.
    Mahmoud, Mahmoud M.
    Altigani, Abdelrahman
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (04) : 5191 - 5237
  • [33] A new high capacity and secure image realization steganography based on ASCII code matching
    Huwaida T. Elshoush
    Mahmoud M. Mahmoud
    Abdelrahman Altigani
    Multimedia Tools and Applications, 2022, 81 : 5191 - 5237
  • [34] A Polar Coding Scheme for Secure Data Transmission Based on 1D Chaotic-Map
    Soliman, T. H. M.
    Yang, F. F.
    Ejaz, S.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 414 - 417
  • [35] A New High Capacity and EMD-based Image Steganography Scheme in Spatial Domain
    Hajizadeh, Hamzeh
    Ayatollahi, Ahmad
    Mirzakuchaki, Sattar
    2013 21ST IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2013,
  • [36] A High Capacity Geometrical Domain Based 3D Image Steganography Scheme
    Farrag, Sara
    Alexan, Wassim
    2019 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGIES AND NETWORKING (COMMNET), 2019, : 31 - 37
  • [37] High capacity reversible steganography in encrypted images based on feature mining in plaintext domain
    Yin, Zhaoxia
    Hong, Wien
    Tang, Jin
    Luo, Bin
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2016, 8 (2-3) : 249 - 257
  • [38] Chaotic system-based secure data hiding scheme with high embedding capacity
    Yadav, Gyan Singh
    Ojha, Aparajita
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 447 - 460
  • [39] A High-Capacity and High-Security Image Steganography Network Based on Chaotic Mapping and Generative Adversarial Networks
    Huo, Lin
    Chen, Ruipei
    Wei, Jie
    Huang, Lang
    APPLIED SCIENCES-BASEL, 2024, 14 (03):
  • [40] An audio information hiding algorithm with high-capacity which based on chaotic and wavelet transform
    Tan, Liang
    Wu, Bo
    Liu, Zhen
    Zhou, Ming-Tian
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (08): : 1812 - 1818