Log in

Audio Transmission Based on Hybrid Crypto-steganography Framework for Efficient Cyber Security in Wireless Communication System

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Wireless systems enable people in last decades to communicate and access applications and information without wires, which provided better image, audio and video transmitting with progressive needing for information security research. In a digital world, Cryptography and steganography are both intended to protect information from unwanted hackers. Both are excellent suggestion which are applied within different multiple layers of data security. Steganography is the type of security which used to hide the user data into a cover medium while observing the least possible statistical detectability. Cryptography is a schedule in which the data is decoded into encrypted form and distributes them, so both are used to assure security and privacy. But each of them needs to satisfy added properties such as robustness, un-detectability and capacity etc.

The proposed approach depends on multi-audios, multi-encryption algorithms, and only one steganography algorithm, where users can access encrypted audios with an encryption key and decrypts them with a decryption key, while in steganography, secret messages are hidden in cover media with no change of audios structure. It is very beneficial for sending the information secretly from one point to another without letting anyone understand that the other or critical audio document has been sent.

In this paper, a novel hybrid audio crypto-steganography algorithm is based on the merging cryptography with steganography to have crypto-steganography algorithm which used to overcome each other’s drawbacks and work hard to resist attacks or stealers. Also the system may gain more security of crypto-steganography when it applied over many layers of audio data and many layers of encryption algorithms to be transmitted after that over Orthogonal Frequency Division Multiplexing (OFDM) system which is considered in this paper as a Worldwide Interoperability for Microwave Access (WIMAX) system based on Fast Fourier Transform OFDM (FFT-OFDM), Discrete Cosine Transform OFDM (DCT-OFDM), and Discrete Wavelet Transform OFDM (DWT-OFDM), which recorded perfect extraction of audio signals at the receiver side with good performance for hybrid crypto-steganography algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig.3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Data availability

The datasets generated during the current study are not publicly available.

Code availability

Software application.

References

  1. Caruccio L, Desiato D, Polese G, Tortora G (2020) GDPR compliant information confidentiality preservation in big data processing. IEEE Access 8:205034–205050

    Article  Google Scholar 

  2. Desiato D, Tortora G (2018) A methodology for GDPR compliant data processing. In: 26th Italian Symposium on Advanced Database Systems, vol 2161

    Google Scholar 

  3. Agu EO, Anthony O (2019) Formation of an improved RC6 (IRC6) cryptographic algorithm. Int J Adv Res 10(4):34–38

    Google Scholar 

  4. Li C, Luo G, Li C (2019) An image encryption scheme based on the three-dimensional chaotic logistic map. Int J Netw Secur 21(1):22–29

    Google Scholar 

  5. Helmy M, El-Rabaie E, Eldokany I, El-Samie F (2017) 3-D image encryption based on Rubik’s cube and RC6 algorithm. 3D Research - Springer

    Book  Google Scholar 

  6. Liu L, Miao S (2018) A new simple one-dimensional chaotic map and its application for image encryption. Multimed Tools Appl-Springer

  7. Noura H, Guyeux C, Chehab A, Mansour MM, Couturier R (2018) Efficient chaotic encryption scheme with OFB mode. Int J Bifurc Chaos Appl Sci Eng

  8. Sallam A, Faragallah OS, El-Rabaie E-SM (2017) HEVC selective encryption using rc6 block cipher technique. IEEE Trans Multimed, IEEE, pp 99

  9. Varshney S, Gupta LM, Gupta A (2019) Performance analysis of cryptography algorithms: blowfish, DES, 3DES, AES, MARS& RC6 with data hiding in audios using steganography technique. Int J Innov Res Sci Eng Technol 8(5)

  10. Ali AH, George LE, Zaidan AA, Mokhtar MR (2018) High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed Tools Appl-Springer

  11. Helmy M, El-Rabaie E-SM, Eldokany IM, Abd El-Samie FE (2022) A novel cancelable biometrics by Rubik’s algorithm. Int J Light Electron Optics-Elsevier

  12. Helmy M, El-Rabaie E, Eldokany I, El-Samie F (2018) Chaotic encryption with different modes of operation based on Rubik’s cube for efficient wireless communication. Multimed Tools Appl-Springer 1–25

  13. Rahmani MKI, Arora K, Pal N (2014) A crypto-steganography: a survey. Int J Adv Comput Sci Appl 5(7)

  14. Kamila NK, Rout H, Dash N (2014) Stego- cryptography using chaotic neural network. Am J Signal Process 24–33

  15. Aggarwal K (2015) Comparison of RC6, modified RC6 & enhancement of RC6. In: International Conference on Advances in Computer Engineering and Applications (ICACEA)

  16. Mardiana F, Lestari YD, Khair U (2017) Modification of RC6 block cipher algorithm on digital image. In: International Conference on Information and Communication Technology (IconICT). IOP Conf. Series: Journal of Physics

  17. Varshney N, Raghuwanshi K (2016) RC6 based data security and attack detection. In: First International Conference on Information and Communication Technology for Intelligent Systems, vol 1, pp 3–10

    Google Scholar 

  18. Alsisi RH, Rao RK (2017) BER comparison of constant envelope DCT and FFT based OFDM with phase modulation. In: International Conference on Network-Based Information Systems, vol 959–968. Springer

  19. Adhikari S, Karforma S (2021) A novel audio encryption method using Henon–Tent chaotic pseudo random number sequence. Int J Inf Technol-Springer

  20. Duta C-L, Gheorghe L, Tapus N (2017) Real-time DSP implementations of voice encryption algorithms. In: 3rd International Conference on Information Systems Security and Privacy (ICISSP), pp 439–446

    Google Scholar 

  21. Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio, Speech, and Music Process-Springer

  22. Stoyanov B, Ivanova T (2021) Novel implementation of audio encryption using pseudorandom byte generator. In: Twenty second National Radio Science Conference (NRSC)

  23. Eldokany I, El-Rabaie E-SM, Elhalafawy SM, Zein Eldin MA, Shahieen MH, Soliman NF, El-Bendary MAM, El-Naby MA, Al-kamali FS, Elashry IF, Abd El-Samie FE (2015) Efficient transmission of encrypted audios with OFDM in the presence of carrier frequency offset. Wireless Personal Communications-Springer

    Google Scholar 

  24. Bafna BS, Mutha BH, Gawali AD, Govind AJ (2015) A survey on cryptosteganography: a multilayer security data hiding. International Journal of Advance Research and Innovative Ideas in Education (IJARIIE) 1(4)

  25. Hilmey M, Elhalafwy S, Eldin M (2009) Efficient transmission of chaotic and AES encrypted audios with OFDM over an AWGN channel. In: IEEE International Conference of Computer Engineering & Systems, pp 353–358

  26. Andrews JG, Ghosh A, Muhamed R (2007) Fundamentals of WiMAX understanding broadband wireless networking. In: Hall communications engineering and emerging technologies series, pp 113–145

    Google Scholar 

  27. Acar Y, Aldirmaz S, Basar E (2019) Channel estimation for OFDM-IM systems. Turk J Elec Eng Comput Sci

  28. Elkamchouchi H, Makar MA (2005) Measuring encryption quality of Bitmap audios encrypted with Rijndael and KAMKAR block ciphers. In: Twenty second National Radio Science Conference

  29. Hutchings M (2022) The mathematics of Rubik’s cube. BAMC Colloquium UC Berkeley

  30. Fugkeaw S, Chinvorarat N, Charnwutiwong N, Chaisuwan K, Pru W (2023) A dynamic and efficient crypto-steganography system for securing multiple files in cloud. In: International Conference on Knowledge and Smart Technology (KST)

    Google Scholar 

  31. Abraham L, Daniel N (2013) An improved color audio encryption algorithm with pixel permutation and bit substitution. Int J Res Eng Technol 02(11)

  32. Helmy M, El-Shafai W, El-Rabaie E-SM, El-Dokany IM, Abd El-Samie FE (2022) A hybrid encryption framework based on Rubik's cube for cancelable biometric cyber security applications. Int J Light Electron Optics- Elsevier

  33. Helmy M, El-Rabaie E-SM, El-Dokany IM, Abd El-Samie FE (2022) Proposed hybrid encryption algorithm for robust 3D image communication over wireless channels. Int J Light Electron Optics- Elsevier

  34. Faragallah O, El-Samie F, Ahmed H, Elashry I, Helmy M, El-Rabaie E, Alshebeili S (2013) Image encryption: a communication perspective. CRC Press, 418 pp

Download references

Funding

There is no Funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mai Helmy.

Ethics declarations

Conflicts of interest

There is no Conflicts of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Helmy, M. Audio Transmission Based on Hybrid Crypto-steganography Framework for Efficient Cyber Security in Wireless Communication System. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-023-17921-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-023-17921-2

Keywords

Navigation