Abstract
The article presents an applied steganographic system of hiding textual information in audio files on the basic of an advanced approach that combines the methods of steganography and cryptography. The method of the least significant bit (LSB) was used as a steganographic transformation algorithm. The low level of reliability of the method can be improved by introducing a cryptographic layer, the feasibility of which is justified in the article. The improvement is to add one of the modern symmetric encryption algorithms – the AES algorithm in CBC mode. The applied steganographic system for hiding textual information in audio files, taking into account the improvement of the LSB method, is implemented in the Microsoft Visual Studio 2019 environment using the cryptographic libraries that are present in it. The application is developed in the C++ programming language. NIST tests were used to assess the stability of the implemented system to steganalysis. The proposed approach is considered in order to anticipate its role in emerging networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hazra, T.K., Samanta, R., Mukherjee, N., Chakraborty A.K.: Hybrid image encryption and steganography using SCAN pattern for secure communication. In: 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON) , Bangkok, pp. 370–380 (2017)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking, pp. 121–148. Artech, Boston (2000)
Basu, P.N., Bhowmik, T.: On embedding of text in audio-a case of steganography. In: Proceedings of International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 203–206 (2010)
Kaur, N., Behal, S.: A survey on various types of steganography and analysis of hiding techniques. Int. J. Eng. Trends Technol. (IJETT) V11(8), 388–392 (2014). ISSN: 2231–5381
Bhagat, V.B., Kulurkar, P.N.: Audio and video steganography: using lsb and phase encoding algorithm. IJPRET 3(9), 1640–1648 (2015)
Jian, C.T., Wen, C.C., Binti Ab Rahman, N.H., Hamid, I.R.B.A.: Audio steganography with embedded text. In: IOP Conference, vol. 226, no. 1, pp. 1–10 (2017)
Bandi, S, Rddy, H.S.M.: Combined audio steganography and AES encryption to hide the text and image into audio using DCT. J. Recent Technol. Eng. 8(3), 1732–1738 (2019)
Buchyk, S., Tolyupa, S., Symonychenko, Y., Symonychenko, A., Platonenko, A.: Improvement of steganographic methods based on the analysis of image color models. In: Cybersecurity Providing in Information and Telecommunication Systems, Kyiv, Ukraine, pp. 117–124. (2021)
Tian, J., **ong, G., Li, Z., Gou, Z.G.: A survey of key technologies for constructing network covert channel. Secur. Commun. Netw. 2020, Article ID 8892896, 20 (2020). https://doi.org/10.1155/2020/8892896
Pooyan, M., Delforouzi, A.: LSB-based audio steganography method based on lifting wavelet transform. In: ISSPIT 2007, Egypt (2007)
Buchyk, S.S., Khomenko, O.V.: Applied program for hiding textual information in audio files. In: Applied Systems and Technologies in the Information Society: V International Scientific and Practical Conference, Kyiv, pp. 27–32 (2021)
Buchyk, S., Piatyhor, V.: Diceware password generation algorithm modification based on pseudo-random sequences, Kyiv (2021)
Eastlake, D., Schiller, J., Crocker, S.: Randomness requirements for security (2005)
Al-Ani, Z.K., Zaidan, A.A., Zaidan, B.B., Alanazi, H.O.: Overview: main fundamentals for steganography. J. Comp. 2(3), 158–165 (2010)
Korzhik, V., Fedyanin, I., Godlewski, A., Morales-Luna, G.: Steganalysis based on statistical properties of the encrypted messages. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 288–298. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65127-9_23
Akhrameeva, K., Korzhik, V., Nguyen, C.: Detection of video steganography with the use of universal method based on NIST-tests. Proc. Telecom. Univ. 6(1), 72–78 (2020)
National Institute of Standards and Technology, p. 131 (2010). https://www.nist.gov/publications/statistical-test-suite-random-and-pseudorandom-numbergenerator-cryptographic. Accessed 20 Nov 2021
Python implementation of NIST's A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. https://github.com/stevenang/randomness_testsuite. Accessed 20 Nov 2021
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf. Accessed 20 Jan 2022
Yudin, O., Symonychenko, Y., Symonychenko, A.: The method of detection of hidden information in a digital image using steganographic methods of analysis. In: IEEE International Conference 2019 on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, pp. 262–266(2019)
Yudin, O., Ziubina, R., Buchyk, S., Frolov, O., Suprun O., Barannik, N.: Efficiency assessment of the steganographic coding method with indirect integration of critical information. In: IEEE International Conference 2019 on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, pp. 36–40 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Buchyk, S., Toliupa, S., Lukova-Chuiko, N., Khomenko, O., Serpinskyi, Y. (2023). Applied Steganographic System for Hiding Textual Information on Audio Files. In: Klymash, M., Luntovskyy, A., Beshley, M., Melnyk, I., Schill, A. (eds) Emerging Networking in the Digital Transformation Age. TCSET 2022. Lecture Notes in Electrical Engineering, vol 965. Springer, Cham. https://doi.org/10.1007/978-3-031-24963-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-031-24963-1_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-24962-4
Online ISBN: 978-3-031-24963-1
eBook Packages: EngineeringEngineering (R0)