Abstract
Wireless systems enable people in last decades to communicate and access applications and information without wires, which provided better image, audio and video transmitting with progressive needing for information security research. In a digital world, Cryptography and steganography are both intended to protect information from unwanted hackers. Both are excellent suggestion which are applied within different multiple layers of data security. Steganography is the type of security which used to hide the user data into a cover medium while observing the least possible statistical detectability. Cryptography is a schedule in which the data is decoded into encrypted form and distributes them, so both are used to assure security and privacy. But each of them needs to satisfy added properties such as robustness, un-detectability and capacity etc.
The proposed approach depends on multi-audios, multi-encryption algorithms, and only one steganography algorithm, where users can access encrypted audios with an encryption key and decrypts them with a decryption key, while in steganography, secret messages are hidden in cover media with no change of audios structure. It is very beneficial for sending the information secretly from one point to another without letting anyone understand that the other or critical audio document has been sent.
In this paper, a novel hybrid audio crypto-steganography algorithm is based on the merging cryptography with steganography to have crypto-steganography algorithm which used to overcome each other’s drawbacks and work hard to resist attacks or stealers. Also the system may gain more security of crypto-steganography when it applied over many layers of audio data and many layers of encryption algorithms to be transmitted after that over Orthogonal Frequency Division Multiplexing (OFDM) system which is considered in this paper as a Worldwide Interoperability for Microwave Access (WIMAX) system based on Fast Fourier Transform OFDM (FFT-OFDM), Discrete Cosine Transform OFDM (DCT-OFDM), and Discrete Wavelet Transform OFDM (DWT-OFDM), which recorded perfect extraction of audio signals at the receiver side with good performance for hybrid crypto-steganography algorithm.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig12a_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig12b_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig12c_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig12d_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-17921-2/MediaObjects/11042_2023_17921_Fig12e_HTML.png)
Data availability
The datasets generated during the current study are not publicly available.
Code availability
Software application.
References
Caruccio L, Desiato D, Polese G, Tortora G (2020) GDPR compliant information confidentiality preservation in big data processing. IEEE Access 8:205034–205050
Desiato D, Tortora G (2018) A methodology for GDPR compliant data processing. In: 26th Italian Symposium on Advanced Database Systems, vol 2161
Agu EO, Anthony O (2019) Formation of an improved RC6 (IRC6) cryptographic algorithm. Int J Adv Res 10(4):34–38
Li C, Luo G, Li C (2019) An image encryption scheme based on the three-dimensional chaotic logistic map. Int J Netw Secur 21(1):22–29
Helmy M, El-Rabaie E, Eldokany I, El-Samie F (2017) 3-D image encryption based on Rubik’s cube and RC6 algorithm. 3D Research - Springer
Liu L, Miao S (2018) A new simple one-dimensional chaotic map and its application for image encryption. Multimed Tools Appl-Springer
Noura H, Guyeux C, Chehab A, Mansour MM, Couturier R (2018) Efficient chaotic encryption scheme with OFB mode. Int J Bifurc Chaos Appl Sci Eng
Sallam A, Faragallah OS, El-Rabaie E-SM (2017) HEVC selective encryption using rc6 block cipher technique. IEEE Trans Multimed, IEEE, pp 99
Varshney S, Gupta LM, Gupta A (2019) Performance analysis of cryptography algorithms: blowfish, DES, 3DES, AES, MARS& RC6 with data hiding in audios using steganography technique. Int J Innov Res Sci Eng Technol 8(5)
Ali AH, George LE, Zaidan AA, Mokhtar MR (2018) High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed Tools Appl-Springer
Helmy M, El-Rabaie E-SM, Eldokany IM, Abd El-Samie FE (2022) A novel cancelable biometrics by Rubik’s algorithm. Int J Light Electron Optics-Elsevier
Helmy M, El-Rabaie E, Eldokany I, El-Samie F (2018) Chaotic encryption with different modes of operation based on Rubik’s cube for efficient wireless communication. Multimed Tools Appl-Springer 1–25
Rahmani MKI, Arora K, Pal N (2014) A crypto-steganography: a survey. Int J Adv Comput Sci Appl 5(7)
Kamila NK, Rout H, Dash N (2014) Stego- cryptography using chaotic neural network. Am J Signal Process 24–33
Aggarwal K (2015) Comparison of RC6, modified RC6 & enhancement of RC6. In: International Conference on Advances in Computer Engineering and Applications (ICACEA)
Mardiana F, Lestari YD, Khair U (2017) Modification of RC6 block cipher algorithm on digital image. In: International Conference on Information and Communication Technology (IconICT). IOP Conf. Series: Journal of Physics
Varshney N, Raghuwanshi K (2016) RC6 based data security and attack detection. In: First International Conference on Information and Communication Technology for Intelligent Systems, vol 1, pp 3–10
Alsisi RH, Rao RK (2017) BER comparison of constant envelope DCT and FFT based OFDM with phase modulation. In: International Conference on Network-Based Information Systems, vol 959–968. Springer
Adhikari S, Karforma S (2021) A novel audio encryption method using Henon–Tent chaotic pseudo random number sequence. Int J Inf Technol-Springer
Duta C-L, Gheorghe L, Tapus N (2017) Real-time DSP implementations of voice encryption algorithms. In: 3rd International Conference on Information Systems Security and Privacy (ICISSP), pp 439–446
Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio, Speech, and Music Process-Springer
Stoyanov B, Ivanova T (2021) Novel implementation of audio encryption using pseudorandom byte generator. In: Twenty second National Radio Science Conference (NRSC)
Eldokany I, El-Rabaie E-SM, Elhalafawy SM, Zein Eldin MA, Shahieen MH, Soliman NF, El-Bendary MAM, El-Naby MA, Al-kamali FS, Elashry IF, Abd El-Samie FE (2015) Efficient transmission of encrypted audios with OFDM in the presence of carrier frequency offset. Wireless Personal Communications-Springer
Bafna BS, Mutha BH, Gawali AD, Govind AJ (2015) A survey on cryptosteganography: a multilayer security data hiding. International Journal of Advance Research and Innovative Ideas in Education (IJARIIE) 1(4)
Hilmey M, Elhalafwy S, Eldin M (2009) Efficient transmission of chaotic and AES encrypted audios with OFDM over an AWGN channel. In: IEEE International Conference of Computer Engineering & Systems, pp 353–358
Andrews JG, Ghosh A, Muhamed R (2007) Fundamentals of WiMAX understanding broadband wireless networking. In: Hall communications engineering and emerging technologies series, pp 113–145
Acar Y, Aldirmaz S, Basar E (2019) Channel estimation for OFDM-IM systems. Turk J Elec Eng Comput Sci
Elkamchouchi H, Makar MA (2005) Measuring encryption quality of Bitmap audios encrypted with Rijndael and KAMKAR block ciphers. In: Twenty second National Radio Science Conference
Hutchings M (2022) The mathematics of Rubik’s cube. BAMC Colloquium UC Berkeley
Fugkeaw S, Chinvorarat N, Charnwutiwong N, Chaisuwan K, Pru W (2023) A dynamic and efficient crypto-steganography system for securing multiple files in cloud. In: International Conference on Knowledge and Smart Technology (KST)
Abraham L, Daniel N (2013) An improved color audio encryption algorithm with pixel permutation and bit substitution. Int J Res Eng Technol 02(11)
Helmy M, El-Shafai W, El-Rabaie E-SM, El-Dokany IM, Abd El-Samie FE (2022) A hybrid encryption framework based on Rubik's cube for cancelable biometric cyber security applications. Int J Light Electron Optics- Elsevier
Helmy M, El-Rabaie E-SM, El-Dokany IM, Abd El-Samie FE (2022) Proposed hybrid encryption algorithm for robust 3D image communication over wireless channels. Int J Light Electron Optics- Elsevier
Faragallah O, El-Samie F, Ahmed H, Elashry I, Helmy M, El-Rabaie E, Alshebeili S (2013) Image encryption: a communication perspective. CRC Press, 418 pp
Funding
There is no Funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
There is no Conflicts of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Helmy, M. Audio Transmission Based on Hybrid Crypto-steganography Framework for Efficient Cyber Security in Wireless Communication System. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-023-17921-2
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-023-17921-2