An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer

Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. Steganography is categorized into different types based on the carrier file being used for embedding data. The audio file is focused on hiding data in this paper. Human has associated an acute degree of sensitivity to additive random noise. An individual is able to detect noise in an audio file as low as one part in 10 million. Given this limitation, it seems that concealing information within audio files would be a pointless exercise. Human auditory system (HAS) experiences an interesting behavior known as masking effect, which says that the threshold of hearing of one type of sound is affected by the presence of another type of sound. Because of this property, it is possible to hide some data inside an audio file without being noticed. In this paper, the research problem for optimizing the audio steganography technique is laid down. In the end, a methodology is proposed that effectively resolves the stated research problem and finally the implementation results are analyzed to ensure the effectiveness of the given solution.

[1]  Akram M. Zeki,et al.  PSW statistical LSB image steganalysis , 2016, Multimedia Tools and Applications.

[2]  Akram M. Zeki,et al.  Robust audio steganography via genetic algorithm , 2009, 2009 International Conference on Information and Communication Technologies.

[3]  Mazdak Zamani,et al.  Pixel Correlation Behavior in Different Themes , 2013, GRMSE.

[4]  Hossein Rouhani Zeidanloo,et al.  Genetic Audio Watermarking , 2010, BAIP.

[5]  Farnaz Arab,et al.  A robust video watermarking using simulated block based spatial domain technique , 2014 .

[6]  Akram M. Zeki,et al.  A secure audio steganography approach , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[7]  Shuo-Tsung Chen,et al.  Optimization-based audio watermarking with integrated quantization embedding , 2015, Multimedia Tools and Applications.

[8]  M. Zamani,et al.  An Introduction to Image Steganography Techniques , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[9]  Rob Nadolski,et al.  Field assessment of serious games for entrepreneurship in higher education , 2013 .

[10]  Azizah Bt Abdul Manaf,et al.  Azizah technique for efficiency measurement in steganography , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).

[11]  Mazdak Zamani,et al.  Determining the threshold of pixel correlativity analysis , 2013 .

[12]  Shraddha Bhise,et al.  Review of Digital Watermarking Techniques , 2015 .

[13]  Subariah Ibrahim,et al.  A New Method for Audio Steganography Using Message Integrity , 2013 .

[14]  Akram M. Zeki,et al.  Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography , 2009, IEEE Games Entertainment Media Conference.

[15]  Hossein Rouhani Zeidanloo,et al.  Genetic substitution-based audio steganography for high capacity applications , 2011 .

[16]  Siti Zaiton Mohd Hashim,et al.  A robust video watermarking technique for the tamper detection of surveillance systems , 2015, Multimedia Tools and Applications.

[17]  Mazdak Zamani,et al.  Capacity and quality improvement in reversible image watermarking approach , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[18]  Mazdak Zamani,et al.  Statistical Steganalysis of Four Photo Themes before Embedding , 2013, 2013 International Conference on Advanced Computer Science Applications and Technologies.

[19]  Mazdak Zamani,et al.  Correlation Analysis of the Four Photo Themes in Five Layers , 2013, GRMSE.

[20]  Ying Liu,et al.  Building Lightweight Network-based Capabilities in Network with Locator/Identifier Separation , 2013 .

[21]  Akram M. Zeki,et al.  A Genetic-Algorithm-Based Approach for Audio Steganography , 2009 .

[22]  Akram M. Zeki,et al.  An approach to improve the robustness of substitution techniques of audio steganography , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[23]  Mazdak Zamani,et al.  Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques , 2010 .

[24]  Mazdak Zamani,et al.  VW16E: A Robust Video Watermarking Technique Using Simulated Blocks , 2017 .

[25]  Abid Yahya,et al.  Introduction to Steganography , 2018, Steganography Techniques for Digital Images.

[26]  Akram M. Zeki,et al.  A Novel Approach for Audio Watermarking , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[27]  Akram M. Zeki,et al.  A robust watermark embedding in smooth areas , 2011 .

[28]  Daiyuan Peng,et al.  A Formal Analysis Method for Optimistic Fair Exchange Protocol , 2013 .

[29]  Wang Yuhong,et al.  A Suitable Adaptive Illumination Compensation Method for Face Detection , 2013 .

[30]  Mazdak Zamani,et al.  Current problems of substitution techniques of audio steganography , 2009 .

[31]  Ee-Leng Tan,et al.  Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform , 2015, Signal Process..

[32]  Xin Yao,et al.  SNR-Constrained Heuristics for Optimizing the Scaling Parameter of Robust Audio Watermarking , 2018, IEEE Transactions on Multimedia.

[33]  Hossein Rouhani Zeidanloo,et al.  Genetic Audio Steganography Azizah , 2010 .

[34]  Yang Xiaofeng,et al.  Human Capital Distribution Structure, Inequality and Growth Momentum , 2013 .

[35]  Mazdak Zamani,et al.  An overview on audio steganography techniques , 2012 .

[36]  Mazdak Zamani,et al.  Knots of substitution techniques of audio steganography , 2009 .

[37]  Hossein Rouhani Zeidanloo,et al.  A Novel Approach for Genetic Audio Watermarking , 2010 .

[38]  Shahidan M. Abdullah,et al.  Mazdak Technique for PSNR Estimation in Audio Steganography , 2012 .

[39]  Mazdak Zamani,et al.  Genetic algorithm for fragile audio watermarking , 2014, Telecommunication Systems.

[40]  Mazdak Zamani,et al.  Correlation between PSNR and size ratio in audio steganography , 2012 .

[41]  Akram M. Zeki,et al.  An artificial-intelligence-based approach for audio steganography , 2009 .

[42]  Mazdak Zamani,et al.  A Survey on Digital Image Watermarking Techniques in Spatial and Transform Domains , 2015 .

[43]  ALAA A. JABBAR AL-TAAY,et al.  Multimedia Data Hiding Evaluation Metrics , 2012 .