Applied Steganographic System for Hiding Textual Information on Audio Files

  • Conference paper
  • First Online:
Emerging Networking in the Digital Transformation Age (TCSET 2022)

Abstract

The article presents an applied steganographic system of hiding textual information in audio files on the basic of an advanced approach that combines the methods of steganography and cryptography. The method of the least significant bit (LSB) was used as a steganographic transformation algorithm. The low level of reliability of the method can be improved by introducing a cryptographic layer, the feasibility of which is justified in the article. The improvement is to add one of the modern symmetric encryption algorithms – the AES algorithm in CBC mode. The applied steganographic system for hiding textual information in audio files, taking into account the improvement of the LSB method, is implemented in the Microsoft Visual Studio 2019 environment using the cryptographic libraries that are present in it. The application is developed in the C++ programming language. NIST tests were used to assess the stability of the implemented system to steganalysis. The proposed approach is considered in order to anticipate its role in emerging networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 181.89
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 235.39
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hazra, T.K., Samanta, R., Mukherjee, N., Chakraborty A.K.: Hybrid image encryption and steganography using SCAN pattern for secure communication. In: 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON) , Bangkok, pp. 370–380 (2017)

    Google Scholar 

  2. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking, pp. 121–148. Artech, Boston (2000)

    Google Scholar 

  3. Basu, P.N., Bhowmik, T.: On embedding of text in audio-a case of steganography. In: Proceedings of International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 203–206 (2010)

    Google Scholar 

  4. Kaur, N., Behal, S.: A survey on various types of steganography and analysis of hiding techniques. Int. J. Eng. Trends Technol. (IJETT) V11(8), 388–392 (2014). ISSN: 2231–5381

    Google Scholar 

  5. Bhagat, V.B., Kulurkar, P.N.: Audio and video steganography: using lsb and phase encoding algorithm. IJPRET 3(9), 1640–1648 (2015)

    Google Scholar 

  6. Jian, C.T., Wen, C.C., Binti Ab Rahman, N.H., Hamid, I.R.B.A.: Audio steganography with embedded text. In: IOP Conference, vol. 226, no. 1, pp. 1–10 (2017)

    Google Scholar 

  7. Bandi, S, Rddy, H.S.M.: Combined audio steganography and AES encryption to hide the text and image into audio using DCT. J. Recent Technol. Eng. 8(3), 1732–1738 (2019)

    Google Scholar 

  8. Buchyk, S., Tolyupa, S., Symonychenko, Y., Symonychenko, A., Platonenko, A.: Improvement of steganographic methods based on the analysis of image color models. In: Cybersecurity Providing in Information and Telecommunication Systems, Kyiv, Ukraine, pp. 117–124. (2021)

    Google Scholar 

  9. Tian, J., **ong, G., Li, Z., Gou, Z.G.: A survey of key technologies for constructing network covert channel. Secur. Commun. Netw. 2020, Article ID 8892896, 20 (2020). https://doi.org/10.1155/2020/8892896

  10. Pooyan, M., Delforouzi, A.: LSB-based audio steganography method based on lifting wavelet transform. In: ISSPIT 2007, Egypt (2007)

    Google Scholar 

  11. Buchyk, S.S., Khomenko, O.V.: Applied program for hiding textual information in audio files. In: Applied Systems and Technologies in the Information Society: V International Scientific and Practical Conference, Kyiv, pp. 27–32 (2021)

    Google Scholar 

  12. Buchyk, S., Piatyhor, V.: Diceware password generation algorithm modification based on pseudo-random sequences, Kyiv (2021)

    Google Scholar 

  13. Eastlake, D., Schiller, J., Crocker, S.: Randomness requirements for security (2005)

    Google Scholar 

  14. Al-Ani, Z.K., Zaidan, A.A., Zaidan, B.B., Alanazi, H.O.: Overview: main fundamentals for steganography. J. Comp. 2(3), 158–165 (2010)

    Google Scholar 

  15. Korzhik, V., Fedyanin, I., Godlewski, A., Morales-Luna, G.: Steganalysis based on statistical properties of the encrypted messages. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 288–298. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65127-9_23

    Chapter  Google Scholar 

  16. Akhrameeva, K., Korzhik, V., Nguyen, C.: Detection of video steganography with the use of universal method based on NIST-tests. Proc. Telecom. Univ. 6(1), 72–78 (2020)

    Google Scholar 

  17. National Institute of Standards and Technology, p. 131 (2010). https://www.nist.gov/publications/statistical-test-suite-random-and-pseudorandom-numbergenerator-cryptographic. Accessed 20 Nov 2021

  18. Python implementation of NIST's A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. https://github.com/stevenang/randomness_testsuite. Accessed 20 Nov 2021

  19. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf. Accessed 20 Jan 2022

  20. Yudin, O., Symonychenko, Y., Symonychenko, A.: The method of detection of hidden information in a digital image using steganographic methods of analysis. In: IEEE International Conference 2019 on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, pp. 262–266(2019)

    Google Scholar 

  21. Yudin, O., Ziubina, R., Buchyk, S., Frolov, O., Suprun O., Barannik, N.: Efficiency assessment of the steganographic coding method with indirect integration of critical information. In: IEEE International Conference 2019 on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, pp. 36–40 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Serhii Toliupa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Buchyk, S., Toliupa, S., Lukova-Chuiko, N., Khomenko, O., Serpinskyi, Y. (2023). Applied Steganographic System for Hiding Textual Information on Audio Files. In: Klymash, M., Luntovskyy, A., Beshley, M., Melnyk, I., Schill, A. (eds) Emerging Networking in the Digital Transformation Age. TCSET 2022. Lecture Notes in Electrical Engineering, vol 965. Springer, Cham. https://doi.org/10.1007/978-3-031-24963-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-24963-1_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-24962-4

  • Online ISBN: 978-3-031-24963-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation