CFP last date
20 May 2024
Reseach Article

Data Hiding in Audio Signals using Elliptic Curve Cryptography, Huffman Code Algorithm and Low-Bit Encoding

by Richard Apau, Samuel Adu Gyamfi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 39
Year of Publication: 2018
Authors: Richard Apau, Samuel Adu Gyamfi
10.5120/ijca2018917038

Richard Apau, Samuel Adu Gyamfi . Data Hiding in Audio Signals using Elliptic Curve Cryptography, Huffman Code Algorithm and Low-Bit Encoding. International Journal of Computer Applications. 180, 39 ( May 2018), 24-34. DOI=10.5120/ijca2018917038

@article{ 10.5120/ijca2018917038,
author = { Richard Apau, Samuel Adu Gyamfi },
title = { Data Hiding in Audio Signals using Elliptic Curve Cryptography, Huffman Code Algorithm and Low-Bit Encoding },
journal = { International Journal of Computer Applications },
issue_date = { May 2018 },
volume = { 180 },
number = { 39 },
month = { May },
year = { 2018 },
issn = { 0975-8887 },
pages = { 24-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number39/29388-2018917038/ },
doi = { 10.5120/ijca2018917038 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:03:07.869296+05:30
%A Richard Apau
%A Samuel Adu Gyamfi
%T Data Hiding in Audio Signals using Elliptic Curve Cryptography, Huffman Code Algorithm and Low-Bit Encoding
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 39
%P 24-34
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security in this era has become very necessary for many aspects of life. The importance of security and privacy of data in the field of data communication has been discussed for many years. The discussion is as a result of the vulnerabilities associated with the use of the Internet and the significant strive computer technology has made in data communication. In this study, a method of audio file protection is proposed using audio steganography, elliptic curve cryptography (ECC), Huffman Code Algorithm and low-bit encoding. The novelty and the uniqueness of this proposed mechanism aims to improve the security and secrecy of audio data file transmitted over the untrusted internet medium. Audio files to be transmitted are first compressed to achieve reduced file size using Huffman code algorithm. The compressed audio files are then encrypted using elliptic curve cryptography. The compressed encrypted audio file is therefore embedded in the appropriate frame of the converted audio signal based on the histogram values using low-bit encoding scheme. The proposed system recorded low values of Bit Error Rate (BER) and Mean Square Error (MSE), high values of segmented signal-to-noise ratio (SNRseg), high values of payload capacity which far exceed the recommended threshold for audio steganography techniques. From the results obtained it can be concluded that, the study achieved higher level of security, payload capacity and robustness. The study experienced negligible level of distortion with high recorded values of SNRseg and low values of BER and MSE.

References
  1. Apau, R., and Adomako, C. (2017). Design of Image Steganography based on RSA Algorithm and LSB Insertion for Android Smartphones. International Journal of Computer Applications (IJCA), 164(1), 13-22.
  2. John, C. (2004). VIII Steganography - Hiding Data in Wave Audio Files. The Code Project.[Online] http://www.codeproject.com/Articles/6960/Steganography VIII-Hiding- Data-in- Wave-Audio-Files . Accessed on: March 1, 2018.
  3. Wajgade, V. M., & Kumar, D. S. (2013). Enhancing Data Security Using Video Steganography. International Journal of Emerging Technology and Advanced Engineering, 3(4), 549-552.
  4. Dengre , A. R., Gawande, A. D. Deshmukh, , A. B. (June, 2013). Effect of Audio Steganography based on LSB insertion with Image Watermarking using AVI video . International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2(6), 2319 – 4847.
  5. Wilson, C. (2003). The Canonical WAVE file format. Wave PCM soundfile format. [Online] 2003. Available at https://ccrma.stanford.edu/courses/422/projects/ , Accessed on April 25, 2017.
  6. Djebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. (2012). Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech, and Music Processing, 2012(1),1-16.
  7. Apau, R., Hayfron-Acquah, J.B., & Twum, F. (2016). Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion. International Journal of Computer Applications (IJCA), 143(4), 28-36.
  8. Arnold, M. (2000) “Audio watermarking: feature, applications and algorithms,” Proc. of IEEE ICME, 2, 1013-1016.
  9. Prabakaran, G., & Bhavani, R. A.(2012). High Capacity Video Steganography Based on Integer WaveletTransform. http://scholar.google.com/scholar?hl=en&q=A+High+Capacity+Video+Steganogr Based+on+Integer+Wavelet+Transform.&btnG=&as_sdt=1%2C5&as_sdtp=(accessed 2017 May 8).
  10. Das, S., Das, S., Bandyopadhyay, B., & Sanyal, S. (2011). Steganography and Steganalysis: different approaches. arXiv preprint arXiv:1111.3758.
  11. Ramalingam, M. (2011). Stego Machine–Video Steganography using Modified LSB Algorithm. World Academy of Science, Engineering and Technology, 74, 502-505.
  12. Kessler, G. C. (2015). An overview of cryptography. http://www.garykessler.net/library/crypto.html#purpose (accessed 2017 May 11)
  13. Kumar, A. and Pooja, K.M. (2010) Steganography- A Data Hiding Technique International Journal of Computer Applications. 9(7)
  14. Cvejic, N., and T. Seppanen. 2002. Increasing the capacity of LSB-based audio steganography. In 2002 IEEE workshop on multimedia signal processing. IEEE.
  15. Shirali-Shahreza, S and Manzuri-Shalmani, M.T (2008) “High capacity error free wavelet domain speech steganography” ICASSP .
  16. Johnson, N. F., Duric, Z. and Jajodia, S (2001). Information Hiding Steganography and Watermarking-Attacks and Countermeasures”,Kluwer Academic Publishers, 2001.
  17. Taraghi-Delgarm, N ( 2006). “Speech Watermarking”, M.Sc. Thesis, Comptuer Engineering Department, Sharif University of Technology, Tehran, IRAN.
  18. Pooyan, M and Delforouzi, A (2007) “LSB-based Audio Steganography Method Based on Lifting Wavelet Transform”, in Proc. 7th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT'07), Egypt.
  19. Ahmed, M. A., Kiah, M. L. M., Zaidan, B. B., & Zaidan, A. A. (2010). A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. Journal of Applied Sciences, 10(1), 59-64.
  20. Parthasarathi, M., & Shreekala, T. (2017) Secured Data Hiding in Audio Files Using Audio Steganography Algorithm. International Journal of Pure and Applied Mathematics. 114(7), 743-753
  21. Padmashree, G., & Venugopala, P. S. (2012). Audio Stegnography and Cryptography: Using LSB algorithm at 4th and 5th LSB layers. International Journal of Engineering and Innovative Technology, 2(4).
  22. Malviya, S., Saxena, M., & Khare, D. A. (2012). Audio steganography by different methods. International Journal of Emerging Technology and Advanced Engineering Website: www. ijetae. com (ISSN 2250-2459, Volume 2, Issue 7.
  23. Asad, M., Gilani, J., & Khalid, A. (2011, July). An enhanced least significant bit modification technique for audio steganography. In Computer Networks and Information Technology (ICCNIT), 2011 International Conference on (pp. 143-147). IEEE.
  24. Al-Othmani, A. Z., Manaf, A. A., & Zeki, A. M. (2012). A survey on steganography techniques in real time audio signals and evaluation. International Journal of Computer Science Issues (IJCSI), 9(1).
  25. Ahmad, A. (2012). Encryption and compression of Data. Available at https://security.stackexchange.com/questions/19969/encryption-and-compression- accessed: 3rd May, 2017.
  26. Vidakovic, D., & Parezanovic, D. (2013). Generating keys in elliptic curve cryptosystems. International Journal of Computer Science and Business Informatics. 4(1), 1-9.
  27. López, J., & Dahab, R. (1999). Fast multiplication on elliptic curves over GF (2 m) without precomputation. In Cryptographic Hardware and Embedded Systems (pp. 724-724). Springer Berlin/Heidelberg.
  28. Kaur, R., & Singh, T. (2015). Hiding Data in Video Sequences using LSB with Elliptic Curve Cryptography. International Journal of Computer Applications, 117(18).
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography Low-Bit Encoding ECC PSNR SNRseg MSE BER.