2022
DOI: 10.11591/ijece.v12i1.pp320-330
|View full text |Cite
|
Sign up to set email alerts
|

Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system

Abstract: Although variety in hiding methods used to protect data and information transmitted via channels but still need more robustness and difficulty to improve protection level of the secret messages from hacking or attacking. Moreover, hiding several medias in one media to reduce the transmission time and band of channel is the important task and define as a gain channel. This calls to find other ways to be more complexity in detecting the secret message. Therefore, this paper proposes cryptography/steganography me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 23 publications
(32 reference statements)
0
10
0
Order By: Relevance
“…Concerning security, table 8 depicted that the proposed LSB PW LCM method can withstand brute force attacks as its key space has considerable size of ≥ 10 64 ×MsgSize. Ergo, as can be seen from the comparisons with researches [13], [4] and [50], it is dominating prevailing schemes. Moreover, its key space depends on the size of the message, MsgSize.…”
Section: ) Key Space Comparisonsmentioning
confidence: 80%
See 1 more Smart Citation
“…Concerning security, table 8 depicted that the proposed LSB PW LCM method can withstand brute force attacks as its key space has considerable size of ≥ 10 64 ×MsgSize. Ergo, as can be seen from the comparisons with researches [13], [4] and [50], it is dominating prevailing schemes. Moreover, its key space depends on the size of the message, MsgSize.…”
Section: ) Key Space Comparisonsmentioning
confidence: 80%
“…Their method has some limitations including the prolonged encoding time besides robustness. On the other hand, researchers [50] came up with a different idea to shuffle an audio using 4D grid multi-wing hyper-chaotic key generated before embedding using LSB to provide more security. Albeit their method has a large key space providing more security, it has a lengthy transmission time in addition to low hiding capacity and low resolution.…”
Section: Related Workmentioning
confidence: 99%
“…Where n is equal to 8 and its meaning is the number of bits per pixel of the image and MSE is the Mean Squared Error (MSE) between the stego image and the cover image that is defined in (2) [14].…”
Section: Resultsmentioning
confidence: 99%
“…A fundamental LSB substitution procedure involves converting m samples of a secret message from integer numbers to binary. In the end, the secret message bits will replace every single bit pixel of the cover image [14]. Instead of dots, spaces, dashes, and slashes, a binary format is used in this work such as in Table 2 which the ciphertext change to binary format using to decrease the number of pixels that use in the process of a substitute.…”
Section: Least Significant Bits (Lsb) Techniquementioning
confidence: 99%
“…Audio Steganography is a method of transmitting concealed information by altering an audio stream in an undetectable way [17]. This method can conceal a hidden text or audio message inside a host [18]. Host message characteristics, before and during steganography, are identical to those of the stego message itself.…”
Section: Introductionmentioning
confidence: 99%