Figure 1 - uploaded by Fikri Adhanadi
Content may be subject to copyright.
The proposed of steganography system

The proposed of steganography system

Source publication
Article
Full-text available
Problems related to confidentiality in information exchange are very important in the digital computer era. Audio steganography is a form of a solution that infuses information into digital audio, and utilizes the limitations of the human hearing system in understanding and detecting sound waves. The steganography system applies compressive samplin...

Contexts in source publication

Context 1
... general, the confidential information go through two main processes, namely the embedding process and extraction process. The system model scheme proposed in this study is illustrated in Figure 1. First, the binary image goes through the compressive sampling acquisition process, and then encrypted by using the RSA encryption algorithm. ...
Context 2
... means that the embedding and extraction process is 30% faster when compared to without using CS. Moving on to the average value of BER analysis that obtained from nine types of audio attacks by using non-optimized parameters as shown in Figure 10. Based on the data contained in Figure 8 the average value of BER obtained by each type of audio attack can be categorized as bad value because the average value result touches the number 0.5. ...
Context 3
... it converted in percentage form, the error in the binary image compiler bit reaches 50%. Figure 10. BER result by using non-optimized parameters ...
Context 4
... are two things that are analyzed, such as a change in capacity value after using the optimized parameters and audio robustness against the nine types of attacks that have been mentioned earlier. Figure 11 contains a capacity comparison data between using non-optimized and optimized parameters. Based on Figure 11, It can be seen that there was a decreasing value in capacity. ...
Context 5
... 11 contains a capacity comparison data between using non-optimized and optimized parameters. Based on Figure 11, It can be seen that there was a decreasing value in capacity. This is because to pursue the steganography criteria with good imperceptibility and have relatively good robustness against audio attack than in terms of capacity must be sacrificed. ...
Context 6
... is because to pursue the steganography criteria with good imperceptibility and have relatively good robustness against audio attack than in terms of capacity must be sacrificed. Figure 12 shows the average value of BER analysis that obtained from nine types of audio attacks by using optimized parameters and non-optimized parameters. Five out of nine types of attacks decreased in the average BER value, while for the noise type attack there was a slight increase. ...
Context 7
... general, the confidential information go through two main processes, namely the embedding process and extraction process. The system model scheme proposed in this study is illustrated in Figure 1. First, the binary image goes through the compressive sampling acquisition process, and then encrypted by using the RSA encryption algorithm. ...
Context 8
... means that the embedding and extraction process is 30% faster when compared to without using CS. Moving on to the average value of BER analysis that obtained from nine types of audio attacks by using non-optimized parameters as shown in Figure 10. Based on the data contained in Figure 8 the average value of BER obtained by each type of audio attack can be categorized as bad value because the average value result touches the number 0.5. ...
Context 9
... it converted in percentage form, the error in the binary image compiler bit reaches 50%. Figure 10. BER result by using non-optimized parameters ...
Context 10
... are two things that are analyzed, such as a change in capacity value after using the optimized parameters and audio robustness against the nine types of attacks that have been mentioned earlier. Figure 11 contains a capacity comparison data between using non-optimized and optimized parameters. Based on Figure 11, It can be seen that there was a decreasing value in capacity. ...
Context 11
... 11 contains a capacity comparison data between using non-optimized and optimized parameters. Based on Figure 11, It can be seen that there was a decreasing value in capacity. This is because to pursue the steganography criteria with good imperceptibility and have relatively good robustness against audio attack than in terms of capacity must be sacrificed. ...
Context 12
... is because to pursue the steganography criteria with good imperceptibility and have relatively good robustness against audio attack than in terms of capacity must be sacrificed. Figure 12 shows the average value of BER analysis that obtained from nine types of audio attacks by using optimized parameters and non-optimized parameters. Five out of nine types of attacks decreased in the average BER value, while for the noise type attack there was a slight increase. ...

Similar publications

Article
Full-text available
Data security pressing issue, particularly in terms of ensuring secure and reliable data transfer over a network. Encryption and seganography play a fundamental role in the task of securing data exchanging. In this article, both steganography and cryptography were combined to produce a powerful hybrid securing stego-system. Firstly, a text message...
Article
Full-text available
To improve the imperceptibility without decreasing the steganographic capacity when steganography by a modification to an audio is carried out, this paper proposes an optimal matching path algorithm to reduce the modification to achieve it. A steganography operation unit is defined, which is composed of every N consecutive audio frames and each fra...
Article
Full-text available
The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by hackers. In the following work, the publicly available software dedicated to audio steganograph...
Article
Full-text available
Recently, deep learning based audio steganalysis methods have demonstrated superior performance in detecting the conventional audio steganography, which poses great chanllegnes to the conveiontional audio steganography. In this work, observed that the neural network can easily be deceived by specially perturbed inputs, i.e., adversarial examples, w...

Citations

... The authors of [16] offer a multifaceted encryption approach that combines DWT, SMM, RSA encryption, and compressive sampling to secure audio files. This complex scheme based on DWT is used to split the signals of audio into frequency sub-bands, further implementing SMM to embed the encrypted data into the lowfrequency sub-bands, and RSA encrypts the data before embedding to enhance overall security. ...
... 16: Audio histogram and encrypted versions of 3.9 samples . ...
Thesis
Full-text available
The following thesis will explore a novel approach to using a single neuron model with S-box transformations and Fibonacci Q-matrix layers for audio encryption. The main problem at this juncture, which exists, is the strength and efficiency of the encryption technique to secure audio data from unwanted entries, tampering, and other attacks. In general, traditional encryption methods tend to compromise speed, computational complexity, and security, so there has to be a counterbalance between these issues.The proposed solution makes use of the chaotic properties of single neuron models to generate pseudo-random sequences, thereby increasing the unpredictability of the encryption process. S-box transformations further scramble the audio data, which has been internationally acclaimed to work well in the design of block ciphers. The approach is validated for robustness by the analysis of metrics through correlation coefficient analysis, the sensitivity of keys, and computational efficiency. The calculated correlation coefficients for adjacent samples of audio were close to zero in the encrypted data, making a great decrement in linear relationships and thus improving the security of the encryption. It also shows high sensitivity to variations in the key, meaning that small changes in the encryption key yield a considerably different output. And the proposed technique is computationally efficient enough to make it applicable for real-time audio encryption.
... All senders receive the public key, while the owner of the private key is only that one person (the recipient). The fundamental drawback of this key coding, however, it is slower than symmetric algorithms [17]. ...
Article
Full-text available
Steganography is the practice of hiding data, such as images, videos, or text, within a cover image without it being detectable by the human eye. Several factors, such as the capacity, security, and robustness of the technique, are essential when transferring information using this method. In this study, we propose a new approach to image steganography that improves the Least Significant Bit (LSB) technique by utilizing images of 24 bits in each pixel. Improving the capacity and security of LSB-based steganography requires a combination of techniques, such as indirect embedding, embedding in multiple channels, and applying cryptographic and compression techniques. This approach conducts by encrypting each compressed secret message bit with the most significant bit of the red channel and then saving the output bit (hidden bit) in the least significant bit of the (green/blue) channel according to the row value (odd/ even). To further security, the suggested approach uses multi-level encryption; employs RSA to encrypt the secret message before applying the Huffman compression and encrypting the hidden bit by (XOR/XNOR) in the embedding method based on the row value of the pixel. Meanwhile, it is planned to use the Huffman coding technique to shorten the length of the encrypted message that will be inserted in the cover image. For the color photos in this work, the standard images were acquired from a standard dataset (USC-SIPI). The suggested approach performs better when measured in terms of mean square error (MSE), peak signal-to-noise ratio (PSNR), and comparison to findings from related prior efforts.
... While the transform domain method usually has relatively high robustness [2]. In the domain transform, the techniques that are used primarily are Discrete Cosine Transform (DCT) [3][4][5]; Discrete Wavelet Transform (DWT) [4][5][6][7]; Lifting Wavelet Transform (LWT) [8]; Singular Value Decomposition (SVD) [9][10], and QR Decomposition [8][9]. ...
... This test parameter was performed to measure system transparency. Mathematically, SNR is calculated as follows [7], [18] with is original audio signal and is audio watermarked signal. ...
Conference Paper
The development of internet technology can make it easier for us to communicate with each other. However, this ease also has negative impacts such as illegal and piracy dissemination of digital data. This paper proposes a watermarking scheme based on Discrete Wavelet Transform (DWT), which can protect the ownership and originality of audio data. The R coefficient on QR Decomposition (QRD) is used as a place for watermark data. Afterward, the watermark image is embedded using Quantization Index Modulation (QIM). After all watermarking processes are complete, optimization is carried out for each audio type with the poor BER using Particle Swarm Optimization (PSO). The host tests are guitar, drum, piano, bass, and vocal with .wav format. The experimental result indicates that the performance increases at 67.64 % after applied PSO. Audio watermarking schemes became resistant to various attacks, i.e., compression, filtering, addition noise, and resampling.
... The more character the message will be, the reduced quality value of SNR, MSE and the increasing computing time. The addition of the compressive sampling method or other compression techniques is highly recommended for future research to obtain many message character capacities [14]. ...
... The public key is distributed to all senders, and the private key is known only to a specific user (the recipient). But the main disadvantage of this key coding is slower compared to symmetric algorithms [8]. ...
... 3. Spread spectrum: This method embeds the secret message in the noise of the cover media created in the image acquisition process. This method is a blind scheme and there is a payload capacity in this type [8]. 4. Modelbased: This method divides the cover media into two parts. ...
... In DWT there are several filters that can be implemented to process the signal and Haar is the simplest filter that mostly used. The implementation of DWT in the 2D image is by dividing the image into four subbands, such as LL-LH-HL-HH [7,8], which can be seen in Fig. 3. ...
Article
Full-text available
Data compression is an important part of information security because compressed data is more secure and easy to handle. Effective data compression technology creates efficient, secure, and easy-to-connect data. There are two types of compression algorithm techniques, lossy and lossless. These technologies can be used in any data format such as text, audio, video, or image file. The main objective of this study was to reduce the physical space on the various storage media and reduce the time of sending data over the Internet with a complete guarantee of encrypting this data and hiding it from intruders. Two techniques are implemented, with data loss (Lossy) and without data loss (Lossless). In the proposed paper a hybrid data compression algorithm increases the input data to be encrypted by RSA (Rivest–Shamir–Adleman) cryptography method to enhance the security level and it can be used in executing lossy and lossless compacting Steganography methods. This technique can be used to decrease the amount of every transmitted data aiding fast transmission while using slow internet or take a small space on different storage media. The plain text is compressed by the Huffman coding algorithm, and also the cover image is compressed by Discrete wavelet transform DWT based that compacts the cover image through lossy compression in order to reduce the cover image’s dimensions. The least significant bit LSB will then be used to implant the encrypted data in the compacted cover image. We evaluated that system on criteria such as percentage Savings percentage, Compression Time, Compression Ratio, Bits per pixel, Mean Squared Error, Peak Signal to Noise Ratio, Structural Similarity Index, and Compression Speed. This system shows a high-level performance and system methodology compared to other systems that use the same methodology.
... Furthermore, CS reduces the computational load required for compression to almost none by taking just enough samples to observe the needed information without redundancy. As a compression method CS can be implemented on devices with limited power and computation resources, such as wireless sensor nodes [1] or wearable electronics [2,3].CS is also naturally encrypting, as there is no way to reconstruct the original signal without detailed knowledge of the sampling process [4]. The reason why CS is not yet widely implemented is that it is not versatile. ...
... None of these methods is truly versatile, some are more advantageous in a certain application than others. Research in this area continues, general approaches [6,14,35] as well as specific use cases [4,12] are being proposed. ...
Article
Full-text available
This work presents a novel unconventional method of signal reconstruction after compressive sensing. Instead of usual matrices, continuous models are used to describe both the sampling process and acquired signal. Reconstruction is performed by finding suitable values of model parameters in order to obtain the most probable fit. A continuous approach allows more precise modelling of physical sampling circuitry and signal reconstruction at arbitrary sampling rate. Application of this method is demonstrated using a wireless sensor network used for freshwater quality monitoring. Results show that the proposed method is more robust and offers stable performance when the samples are noisy or otherwise distorted.
... Beside these application oriented schemes, there exists a number of approaches which can be applied for securing real-world systems after analyzing their implementation feasibility [1,3,6,[9][10][15][16][17][18][21][22]24,[26][27][31][32][33][34][35][36][38][39][41][42][43][46][47][48]50,[52][53][54][55][56][59][60][62][63][64][65][66]69]. ...
Article
Full-text available
Secret message passing through an open channel needs an extreme level of privacy to protect it from theft or misuse. To achieve this objective, two parallel approaches are frequently used in digital media namely – Cryptography and Steganography. Cryptography encrypts the secret data into some unreadable format before sending through shared channel whereas Steganography conceals the secret message within an ordinary, non-secret file in such a way that an eavesdropper cannot suspect its existence. One layer of security, however, may be vulnerable from various security attacks. Hence, both the methods can be combined to achieve more secure as well as powerful model termed as Crypto-stego model. In this paper, an extensive survey is presented on Stegano-encryption techniques that are applied to various real-world systems which need high security. The survey also provides a thematic approach to classify available state-of-the-arts with regards to different application domains where it could be used. The rigorous survey follows the security threats along with various security-analysis that can establish a system as robust and safe from attacks.
... In recent years, with the rapid development of the internet, digital images security is attracting attention by more and more researchers [1][2][3]. One side, the Internet brings lots of benefits to humans. ...
Article
Full-text available
span lang="EN-US">The information in the e-health system involves the patient’s privacy which is extremely sensitive. For instance, these information record social security numbers and detailed medical history. When the breach happens, there are illegal, or disclosure behaviors taken to privacy that should be compromised security. In this paper, the medical digital images are protected by the proposed chaos-based encryption method in the process of transmission and utilization. Then the authentication is granted to patients and telemedicine staffs by the decryption method proposed. The Qi 3-D four wing chaotic system is employed in this method. The proposed method promises the keys with higher complexity and unpredictability than traditional cryptography methods by introducing the chaotic dynamics in the new cryptography. Digital medical images are used to validate the proposed method under the brute and the differential attacks. The pixels of the image are scrambled completely based on cat map and the sub-blocks of the image are diffused in the way that the original image is changed into a chaotic image robust to all kinds of attacks. The experiments show that the proposed method has higher performance and higher computation for decryption.</span