High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain

Information hiding researchers have been exploring techniques to improve the security of transmitting sensitive data through an unsecured channel. This paper proposes an audio steganography model for secure audio transmission during communication based on fractal coding and a chaotic least significa...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2018-12, Vol.77 (23), p.31487-31516
Hauptverfasser: Ali, Ahmed Hussain, George, Loay Edwar, Zaidan, A. A., Mokhtar, Mohd Rosmadi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 31516
container_issue 23
container_start_page 31487
container_title Multimedia tools and applications
container_volume 77
creator Ali, Ahmed Hussain
George, Loay Edwar
Zaidan, A. A.
Mokhtar, Mohd Rosmadi
description Information hiding researchers have been exploring techniques to improve the security of transmitting sensitive data through an unsecured channel. This paper proposes an audio steganography model for secure audio transmission during communication based on fractal coding and a chaotic least significant bit or also known as HASFC. This model contributes to enhancing the hiding capacity and preserving the statistical transparency and security. The HASFC model manages to embed secret audio into a cover audio with the same size. In order to achieve this result, fractal coding is adopted which produces high compression ratio with the acceptable reconstructed signal. The chaotic map is used to randomly select the cover samples for embedding and its initial parameters are utilized as a secret key to enhancing the security of the proposed model. Unlike the existing audio steganography schemes, The HASFC model outperforms related studies by improving the hiding capacity up to 30% and maintaining the transparency of stego audio with average values of SNR at 70.4, PRD at 0.0002 and SDG at 4.7. Moreover, the model also shows resistance against brute-force attack and statistical analysis.
doi_str_mv 10.1007/s11042-018-6213-0
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2051403454</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2051403454</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-3583bb7d283ae2fdd24a4354e447a45b629995991d6ef993c155fd80c4f9dca33</originalsourceid><addsrcrecordid>eNp1kD1PwzAQQC0EEqXwA9gssRLwZxKPqAKKVIkFZutqO2mqxg62M5RfTyBITEx3w3t30kPompI7Skh1nyglghWE1kXJKC_ICVpQWfGiqhg9nXZek6KShJ6ji5T2hNBSMrFAn-uu3WEDA5guH29xjuDTANH5jMFbnJwZo8Mw2i7glF0LPrQRht0R98G6A95CchYHj5sIJsMBm2A73_7IZgchdwb3MODO4-z6IcQJsaGHzl-iswYOyV39ziV6f3p8W62Lzevzy-phUxhOy1xwWfPttrKs5uBYYy0TILgUTogKhNyWTCkllaK2dI1S3FApG1sTIxplDXC-RDfz3SGGj9GlrPdhjH56qRmRVBAupJgoOlMmhpSia_QQux7iUVOivxPrObGeEuvvxJpMDpudNLG-dfHv8v_SF86ef30</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2051403454</pqid></control><display><type>article</type><title>High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain</title><source>SpringerLink Journals - AutoHoldings</source><creator>Ali, Ahmed Hussain ; George, Loay Edwar ; Zaidan, A. A. ; Mokhtar, Mohd Rosmadi</creator><creatorcontrib>Ali, Ahmed Hussain ; George, Loay Edwar ; Zaidan, A. A. ; Mokhtar, Mohd Rosmadi</creatorcontrib><description>Information hiding researchers have been exploring techniques to improve the security of transmitting sensitive data through an unsecured channel. This paper proposes an audio steganography model for secure audio transmission during communication based on fractal coding and a chaotic least significant bit or also known as HASFC. This model contributes to enhancing the hiding capacity and preserving the statistical transparency and security. The HASFC model manages to embed secret audio into a cover audio with the same size. In order to achieve this result, fractal coding is adopted which produces high compression ratio with the acceptable reconstructed signal. The chaotic map is used to randomly select the cover samples for embedding and its initial parameters are utilized as a secret key to enhancing the security of the proposed model. Unlike the existing audio steganography schemes, The HASFC model outperforms related studies by improving the hiding capacity up to 30% and maintaining the transparency of stego audio with average values of SNR at 70.4, PRD at 0.0002 and SDG at 4.7. Moreover, the model also shows resistance against brute-force attack and statistical analysis.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-018-6213-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Audio data ; Coding ; Compression ratio ; Computer Communication Networks ; Computer Science ; Cybersecurity ; Data Structures and Information Theory ; Fractal models ; Fractals ; Multimedia Information Systems ; Special Purpose and Application-Based Systems ; Statistical analysis ; Statistical methods ; Steganography</subject><ispartof>Multimedia tools and applications, 2018-12, Vol.77 (23), p.31487-31516</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2018</rights><rights>Multimedia Tools and Applications is a copyright of Springer, (2018). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-3583bb7d283ae2fdd24a4354e447a45b629995991d6ef993c155fd80c4f9dca33</citedby><cites>FETCH-LOGICAL-c316t-3583bb7d283ae2fdd24a4354e447a45b629995991d6ef993c155fd80c4f9dca33</cites><orcidid>0000-0001-8561-1991</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-018-6213-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-018-6213-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,41487,42556,51318</link.rule.ids></links><search><creatorcontrib>Ali, Ahmed Hussain</creatorcontrib><creatorcontrib>George, Loay Edwar</creatorcontrib><creatorcontrib>Zaidan, A. A.</creatorcontrib><creatorcontrib>Mokhtar, Mohd Rosmadi</creatorcontrib><title>High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Information hiding researchers have been exploring techniques to improve the security of transmitting sensitive data through an unsecured channel. This paper proposes an audio steganography model for secure audio transmission during communication based on fractal coding and a chaotic least significant bit or also known as HASFC. This model contributes to enhancing the hiding capacity and preserving the statistical transparency and security. The HASFC model manages to embed secret audio into a cover audio with the same size. In order to achieve this result, fractal coding is adopted which produces high compression ratio with the acceptable reconstructed signal. The chaotic map is used to randomly select the cover samples for embedding and its initial parameters are utilized as a secret key to enhancing the security of the proposed model. Unlike the existing audio steganography schemes, The HASFC model outperforms related studies by improving the hiding capacity up to 30% and maintaining the transparency of stego audio with average values of SNR at 70.4, PRD at 0.0002 and SDG at 4.7. Moreover, the model also shows resistance against brute-force attack and statistical analysis.</description><subject>Audio data</subject><subject>Coding</subject><subject>Compression ratio</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cybersecurity</subject><subject>Data Structures and Information Theory</subject><subject>Fractal models</subject><subject>Fractals</subject><subject>Multimedia Information Systems</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Statistical analysis</subject><subject>Statistical methods</subject><subject>Steganography</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kD1PwzAQQC0EEqXwA9gssRLwZxKPqAKKVIkFZutqO2mqxg62M5RfTyBITEx3w3t30kPompI7Skh1nyglghWE1kXJKC_ICVpQWfGiqhg9nXZek6KShJ6ji5T2hNBSMrFAn-uu3WEDA5guH29xjuDTANH5jMFbnJwZo8Mw2i7glF0LPrQRht0R98G6A95CchYHj5sIJsMBm2A73_7IZgchdwb3MODO4-z6IcQJsaGHzl-iswYOyV39ziV6f3p8W62Lzevzy-phUxhOy1xwWfPttrKs5uBYYy0TILgUTogKhNyWTCkllaK2dI1S3FApG1sTIxplDXC-RDfz3SGGj9GlrPdhjH56qRmRVBAupJgoOlMmhpSia_QQux7iUVOivxPrObGeEuvvxJpMDpudNLG-dfHv8v_SF86ef30</recordid><startdate>20181201</startdate><enddate>20181201</enddate><creator>Ali, Ahmed Hussain</creator><creator>George, Loay Edwar</creator><creator>Zaidan, A. A.</creator><creator>Mokhtar, Mohd Rosmadi</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-8561-1991</orcidid></search><sort><creationdate>20181201</creationdate><title>High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain</title><author>Ali, Ahmed Hussain ; George, Loay Edwar ; Zaidan, A. A. ; Mokhtar, Mohd Rosmadi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-3583bb7d283ae2fdd24a4354e447a45b629995991d6ef993c155fd80c4f9dca33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Audio data</topic><topic>Coding</topic><topic>Compression ratio</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cybersecurity</topic><topic>Data Structures and Information Theory</topic><topic>Fractal models</topic><topic>Fractals</topic><topic>Multimedia Information Systems</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Statistical analysis</topic><topic>Statistical methods</topic><topic>Steganography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ali, Ahmed Hussain</creatorcontrib><creatorcontrib>George, Loay Edwar</creatorcontrib><creatorcontrib>Zaidan, A. A.</creatorcontrib><creatorcontrib>Mokhtar, Mohd Rosmadi</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ali, Ahmed Hussain</au><au>George, Loay Edwar</au><au>Zaidan, A. A.</au><au>Mokhtar, Mohd Rosmadi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2018-12-01</date><risdate>2018</risdate><volume>77</volume><issue>23</issue><spage>31487</spage><epage>31516</epage><pages>31487-31516</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Information hiding researchers have been exploring techniques to improve the security of transmitting sensitive data through an unsecured channel. This paper proposes an audio steganography model for secure audio transmission during communication based on fractal coding and a chaotic least significant bit or also known as HASFC. This model contributes to enhancing the hiding capacity and preserving the statistical transparency and security. The HASFC model manages to embed secret audio into a cover audio with the same size. In order to achieve this result, fractal coding is adopted which produces high compression ratio with the acceptable reconstructed signal. The chaotic map is used to randomly select the cover samples for embedding and its initial parameters are utilized as a secret key to enhancing the security of the proposed model. Unlike the existing audio steganography schemes, The HASFC model outperforms related studies by improving the hiding capacity up to 30% and maintaining the transparency of stego audio with average values of SNR at 70.4, PRD at 0.0002 and SDG at 4.7. Moreover, the model also shows resistance against brute-force attack and statistical analysis.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-018-6213-0</doi><tpages>30</tpages><orcidid>https://orcid.org/0000-0001-8561-1991</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2018-12, Vol.77 (23), p.31487-31516
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2051403454
source SpringerLink Journals - AutoHoldings
subjects Audio data
Coding
Compression ratio
Computer Communication Networks
Computer Science
Cybersecurity
Data Structures and Information Theory
Fractal models
Fractals
Multimedia Information Systems
Special Purpose and Application-Based Systems
Statistical analysis
Statistical methods
Steganography
title High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T09%3A06%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=High%20capacity,%20transparent%20and%20secure%20audio%20steganography%20model%20based%20on%20fractal%20coding%20and%20chaotic%20map%20in%20temporal%20domain&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Ali,%20Ahmed%20Hussain&rft.date=2018-12-01&rft.volume=77&rft.issue=23&rft.spage=31487&rft.epage=31516&rft.pages=31487-31516&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-018-6213-0&rft_dat=%3Cproquest_cross%3E2051403454%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2051403454&rft_id=info:pmid/&rfr_iscdi=true