A survey on Rijndael based LSB Audio Steganography techniques

Authors

DOI:

https://doi.org/10.31185/wjps.245

Keywords:

Steganography, Rijndael Algorithm , Audio Steganography, LSB Method, LSB technique in steganography. , LSB (Least Significant Bit), LSB substitution.

Abstract

The need to protect multimedia data security—including audio, video, and text—and the data it contains has persisted, whether in physical or digital form. This is due to the fact that the fabrication and fake of Multimedia data is widespread throughout the world, causing serious costs to people, societies, and the industrial sectors in addition to compromising national security. People are therefore concerned about safeguarding their employment and avoiding these illegal behaviors. To safeguard sensitive data, a variety of strategies including steganography, cryptography, and coding have been used. Steganography is a suitable technique that allows the user to hide a message inside of another message (cover media). The majority of steganography research makes use of cover material, like videos, images, and sounds. Notably, because to the challenges involved in locating embedded bits in an audio recording, audio steganography is typically not prioritized.  By altering the least significant bits (LSBs) of audio samples, a technique known as audio steganography (LSB) can be used to conceal information in an audio stream. The least significant bits (LSBs) in a number's binary representation are the least weighted bits and are typically undetectable to the human ear. The audio signal can have a hidden message inserted in it without significantly affecting its perceptual quality by changing or manipulating the LSBs of the audio samples. To incorporate information into an audio, However, because to the slight audio difference, an assailant or other outsider might be able to hear this. To solve this problem, it is important to alter the audio in a way that it cannot be heard by the human ear but may still be understood by other means. This document is a summary of the available research in the field. We start by outlining the fundamentals of audio steganography and how it works. Then, three categories of audio steganography—statistical and random generation; and linguistics—are described. Each class's tactics are examined, with a focus on how a special method is offered for concealing sensitive information. In addition, we survey the existing works in the advancement of strategies and algorithms relevant to audio steganography; our survey, which covers work published from 2016 to 2023, is not exhaustive. This study gathers the present approaches, difficulties, and future directions in this topic with the goal of assisting other researchers .In addition, we survey the existing works in the advancement of strategies and algorithms relevant to audio steganography.

References

Stallings.W. , ''Cryptography and Network Security'' Principles and Practice (7th ed.). Pearson Education. 2017

Khodher M.A.A., AlabaichiA., AltameemiA.A.

," Steganography Encryption Secret Message in Video Raster Using DNA and Chaotic Map

," Iraqi Journal of Science, 2022, Vol. 63, No. 12, pp: 5534-5548,2022 DOI: 10.24996/ijs.2022.63.12.38

Harba I.S.E. , "Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography," Iraqi Journal of Science, vol. 59, no. 1C, pp. 600-606, 2018.

Simanjuntak H.L., Pramudyo A.S.,Fahrizal R.,"Similarity Analysis of Audio Steganography Combined With Rijndael Cryptography Algorithm", The 4th ICIBA 2015, International Conference on Information Technology and Engineering Application Palembang-Indonesia, 20-21, 2015, DOI:10.13140/RG.2.1.3867.7600.

A. H. M., Mohammed G. S., "Efficient Plain Password Cryptanalysis Techniques," Iraqi Journal of Science, vol. 58, no. A4, pp. 1946-1954, 2021

N. Gupta and N. Sharma, "Dwt and Lsb based Audio Steganography," 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), Faridabad, India, 2014, pp. 428-431, doi: 10.1109/ICROIT.2014.6798368.

Hussein A. M. , Al-Momen S. “ Linear Feedback Shift Registers-Based Randomization for Image Steganography”, Iraqi Journal of Science, Vol. 64, No. 8, pp: 5031-5046,2023 DOI: 10.24996/ijs.2023.64.8.34

Awadh W.A. ,Alasady A.S. , Hamoud A.K.., ''Hybrid information security system via combination of compression, cryptography, and image steganography''. International Journal of Electrical and Computer Engineering (IJECE) ,Vol. 12, No. 6, pp. 6574~6584,2022

ISSN: 2088-8708, DOI: 10.11591/ijece.v12i6.pp6574-6584

George LE, Hassan EK, Mohammed SG and Mohammed FG, '' Selective image encryption based on DCT, hybrid shift coding and randomly generated secret key''. Iraqi J Sci 61(4):920–935.2020

Munuera C. ,''Steganography and error-correcting codes'', (Signal Processing 87 (2007) 1528–1533 ,2007, doi:10.1016/j.sigpro.2006.12.008

A. Kanhe, G. Aghila, C. Y. S. Kiran, C. H. Ramesh, G. Jadav and M. G. Raj, "Robust Audio steganography based on Advanced Encryption standards in temporal domain," 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, India, 2015, pp. 1449-1453, doi: 10.1109/ICACCI.2015.7275816.

Joshi, Amit M., et al. "Combined DWT–DCT-based video watermarking algorithm using Arnold transform technique." Proceedings of the International Conference on Data Engineering and Communication Technology: ICDECT 2016, Volume 1. Springer Singapore, 2017.

Al-Hooti M.H. , Ahmad T. , Djanali S. , ''Developing audio data hiding scheme using random sample bits with logical operators'', Indonesian Journal of Electrical Engineering and Computer Science Vol. 13, No. 1, pp. 147~154 ISSN: 2502-4752,2019, DOI: 10.11591/ijeecs.v13.i1.pp147-154

Bah J. , Ramakishore R. ,''LSB Technique And Its Variations Used In Audio Steganography: A Survey'', International Journal of Engineering Research & Technology (IJERT),Vol. 2 Issue 4, April – 2013, ISSN: 2278-0181

M. Razvi Doomun, K. M. Sunjiv Soyjaudah and D. Bundhoo, "Energy consumption and computational analysis of rijndael-AES," 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, Tashkent, Uzbekistan, 2007, pp. 1-6, doi: 10.1109/CANET.2007.4401683.

Alwahbani S.M.H. , Elshoush H.T.I.,''Hybrid Audio Steganography and Cryptography Method Based on High Least Significant Bit (LSB) Layers and One-Time Pad—A Novel Approach '', Springer International Publishing AG 2018 Y. Bi et al. (eds.), Intelligent Systems and Applications, Studies in Computational Intelligence 751,2018, https://doi.org/10.1007/978-3-319-69266-1_21

F. Granelli, G. Boato, “A novel methodology for analysis of the computational complexity of block ciphers: Rijndael, Camellia and Shacal-2 compared”, In Third Conference on Security and Network Architectures (SAR’04), June 2004.

Daemen, J.; Rijmen, V.. In The Design of Rijndael: The Advanced Encryption Standard (AES);, Eds.; Information Security and Cryptography; Springer: Berlin/Heidelberg, Germany, 2001;. ISBN 978-3-662-60769-5.

Biham, Eli, and Nathan Keller. "Cryptanalysis of reduced variants of Rijndael." 3rd AES Conference. Vol. 230. 2000.

Granelli F. Boato G., “A novel methodology for analysis of the computational complexity of block ciphers: Rijndael,Camellia and Shacal-2 compared,” in Proceedings of 3rd Conference one Security and Network Architectures (SAR ’04), LaLonde, France, June 2004.

Rudra, A., Dubey, P.K., Jutla, C.S., Kumar, V., Rao, J.R., Rohatgi, P. (2001). Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. In: Koç, Ç.K., Naccache, D., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2001. CHES 2001. Lecture Notes in Computer Science, vol 2162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44709-1_16

Abood E. W. , Abdullah A. M. ,'' Audio steganography with enhanced LSB method for securing encrypted text with bit cycling '', Bulletin of Electrical Engineering and Informatics Vol. 11, No. 1, February 2022, pp. 185~194 , DOI: 10.11591/eei.v11i1.3279.

Kadhem M.S.,''Text Steganography Method Based On Modified Run Length Encoding'', Iraqi Journal of Science, Vol. 57, No.3C, pp:2338-2347,2016

Abdulrazzaq S. T. , Siddeq M.M. , Rodrigues M.A. ,''A Novel Steganography Approach for Audio Files'', SN Computer Science (2020) 1:97 https://doi.org/10.1007/s42979-020-0080-2

PL N., V R. , A I., K S. ,''A Modified Enhanced Method of Audio – Video Steganography for High Security Data Transmission''. E3S Web of Conferences 399, 01003 (2023) , ICONNECT-2023, https://doi.org/10.1051/e3sconf/202339901003

kumar M., patil T., Kumari M., Raj A., Pradhan R., Giri M.,''Hiding secret data in a au dio,video,image,text steganography using least significant bit algorithm', GIS SCIENCE JOUR, VOL 9, ISS 12, 2022.

Abdulkadhim H.A., Shehab J.N.,'' Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system '', International Journal of Electrical and Computer Engineering (IJECE) Vol. 12, No. 1, pp. 320~330 , 2022, DOI: 10.11591/ijece.v12i1.

Shanthakumari R. , Devi EM.R.. , Rajadevi R., Bharaneeshwar B.,'' Information Hiding in Audio Steganography using LSB Matching Revisited'', IOP Publishing, Journal of Physics: Conference Series ICITSD 2021 1911 012027 ,2021, doi:10.1088/1742-6596/1911/1/012027

Bansal K., Agrawal, A., Bansal, N.'' A Survey on Steganography using Least Significant bit (LSB) Embedding Approach'', IEEE, 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), pp. 64-69. 2020, doi:10.1109/ICOEI48184.2020.9142896

Yadav M., Yadav S. ,'' Improved Security of data using Cryptography and Audio-Video Steganography '', IJRECE VOL. 6 ISS. 2 APR.-JUNE 2018 .

Huwaida S.M.H. , Elshoush T.I. ''Chaos-based Audio Steganography and Cryptography Using LSB Method and One-Time Pad', SAI Intelligent Systems Conference 2016 September 21-22, London, UK,2016.

Hameed A.S.,''High Capacity Audio Steganography Based on Contourlet Transform'', Tikrit Journal of Engineering Sciences 25 (1) 2018 (1-7), : http://dx.doi.org/10.25130/tjes.25.1.01

Downloads

Published

2023-12-30

Issue

Section

Computer

How to Cite

g.mohammed, sajaa. (2023). A survey on Rijndael based LSB Audio Steganography techniques. Wasit Journal for Pure Sciences , 2(4), 80-87. https://doi.org/10.31185/wjps.245

Most read articles by the same author(s)