Backward movement oriented shark smell optimization-based audio steganography using encryption and compression strategies

被引:12
作者
Manjunath, K. [1 ]
Ramaiah, G. N. Kodanda [2 ]
GiriPrasad, M. N. [3 ]
机构
[1] Jawaharlal Nehru Technol Univ JNTUA, Elect & Commun Engn, Anantapur, Andhra Pradesh, India
[2] Kuppam Engn Coll, Elect & Commun Engn, Kuppam, Andhra Pradesh, India
[3] JNTUA Coll Engn, Elect & Commun Engn, Anantapur, Andhra Pradesh, India
关键词
Audio steganography; Optimized 2D-logistic chaotic map; Modified Huffman encoding; Backward movement oriented shark smell optimization; Attack analysis; ALGORITHM; CAPACITY;
D O I
10.1016/j.dsp.2021.103335
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Audio steganography is the process of hiding secret information such as images, text, or video into the audio file. Data hiding in audio signals has been utilized in diverse applications like secret communication, hiding of data that may affect the safety and security of personnel and governments. Most of the recently introduced audio steganography approaches are content non-adaptive that may suffer low embedding capability and poor security. This paper proposes the audio steganography model for secure audio transmission during communication based on the meta-heuristic concept. In the embedding phase, the optimized instant selection is made for embedding the secret message (image) into the input audio. Further, the secret message to be embedded is encrypted using the optimized 2D-Logistic Chaotic Map. Here, the development of optimal instant selection and the optimized 2D Logistic Chaotic Map are performed by the improved Shark Smell Optimization (SSO) called Backward Movement oriented SSO (BM-SSO). Once the secret message is encrypted, the compression of the message is done by Modified Huffman Encoding (MHE). Finally, the extraction phase uses the optimized 2D Logistic Chaotic Map-based decryption. The proposed audio steganography by optimized instant selection for audio embedding minimizes the distortion error between the stego audio and original audio in terms of Mean Squared Error (MSE), and optimized 2D-Logistic Chaotic Map-based encryption aims to maximize the entropy of cipher image. The performance of the developed model has been estimated extensively against attacks, and simulation results are presented to prove the robustness of the proposed algorithm. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页数:13
相关论文
共 37 条
[1]   A New Metaheuristic Algorithm Based on Shark Smell Optimization [J].
Abedinia, Oveis ;
Amjady, Nima ;
Ghasemi, Ali .
COMPLEXITY, 2016, 21 (05) :97-116
[2]   A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm [J].
Ahmed M.A. ;
Kiah L.M. ;
Zaidan B.B. ;
Zaidan A.A. .
Journal of Applied Sciences, 2010, 10 (01) :59-64
[3]  
Ali A. H., 2016, RES J APPL SCI ENG T, V12, P154, DOI [10.19026/rjaset.12.2316, DOI 10.19026/RJASET.12.2316]
[4]   High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain [J].
Ali, Ahmed Hussain ;
George, Loay Edwar ;
Zaidan, A. A. ;
Mokhtar, Mohd Rosmadi .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) :31487-31516
[5]   The Adaptive Multi-Level Phase Coding Method in Audio Steganography [J].
Alsabhany, Ahmed Abduljabbar ;
Ridzuan, Farida ;
Azni, A. H. .
IEEE ACCESS, 2019, 7 :129291-129306
[6]  
[Anonymous], 2017, ADV SCI LETT, DOI DOI 10.1166/asl.2017.8946
[7]  
[Anonymous], 2010, WORLD APPL SCI J
[8]  
Antony J, 2012, INT J COMPUT APPL, V52, P33
[9]  
Bazyar M, 2015, J TEKNOL, V74, P49
[10]   Shape compression of moving objects using context-based arithmetic encoding [J].
Brady, N ;
Bossen, F .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2000, 15 (7-8) :601-617