Advertisement

Highly secured image hiding technique in stereo audio signal based on complete complementary codes

  • Said E. El-Khamy
  • Noha O. Korany
  • Marwa H. El-SherifEmail author
Article
  • 12 Downloads

Abstract

The recent revolution of the Internet as a collaborative medium has opened the door for people who want to share their work. Nevertheless, this may cause serious problems for privacy and copyright protection. Steganography is a powerful tool for protecting important data during transmission. It’s used to hide any secret information like text, image or audio behind a cover file. In this study, a new robust audio steganography technique based on optimum two dimensional Complete Complementary Codes (CCC) has been adopted to encode colour images data and obtain two differently encoded versions of it. These two versions are hidden in DWT coefficients of the two channels of stereo audio signal and embedding locations are determined via 2-D chaotic map random sequence. Complete Complementary Codes (CCC) are sets of spread spectrum sequence family that have ideal auto and cross-correlation properties so, they found many applications in several science areas with the broadest application possibilities in telecommunications. Various attacks are applied to the host audio signals and simulation results show high robustness and capacity with good quality of the extracted image.

Keywords

Cryptography Complete complementary codes Encoding Stereo audio Steganography Human auditory system (HAS) Threshold Auto correlation Cross correlation Hénon map Discrete wavelet transform 

Notes

References

  1. 1.
    Al-Haj A (2014) A dual transform audio watermarking algorithm. Multimed Tools Appl 73(3):1897–1912CrossRefGoogle Scholar
  2. 2.
    Al-Haj A (2014) An imperceptible and robust audio watermarking algorithm. EURASIP J Audio, Speech Music Process 2014, 37 http://asmp.eurasipjournals.com/content/2014/1/37
  3. 3.
    Al-Shameri WFH (2012) Dynamical properties of the Hénon mapping. Int J Math Anal 6(49):2419–2430MathSciNetzbMATHGoogle Scholar
  4. 4.
    Banik BG, Bandyopadhyay S (2018) Blind key based attack resistant audio steganography using cocktail party effect. Sec Commun Netw 2018(2):1–21.  https://doi.org/10.1155/2018/1781384 CrossRefGoogle Scholar
  5. 5.
    Bharti P, Soni R (2012) A New Approach of Data Hiding in Images using Cryptography and Steganography. International Journal of Computer Applications (0975–8887) 58(18).Google Scholar
  6. 6.
    Chang C (2010) A reversible data hiding scheme using complementary embedding strategy. Information Sciences 529. doi: https://doi.org/10.1080/09720529.2015.1085743
  7. 7.
    Channapragada RSR, Nukineedi DL, Prasad MVNK (2012) Digital watermarking algorithm based on CCC - FWHT technique. International Journal of Advancements in Computing Technology(IJACT) 4(18). doi: https://doi.org/10.4156/ijact.vol4.issue18.70
  8. 8.
    Dávideková M, Greguš ml M, Farkaš P, Rákus M (2016) Applications of complete complementary codes and propositions for future research areas of these codes. Proc Comput Sci 83:592 ISSN 18770509CrossRefGoogle Scholar
  9. 9.
    Detert T, Haak W, Martoyo I (2004) Complete complementary codes applied to UTRA FDD asynchronous uplink. Electrotech Conf MELECON 2004. Proc 12th IEEE Mediterranean 2:441–444CrossRefGoogle Scholar
  10. 10.
    Dhar PK, Shimamura T (2014) Audio watermarking in transform domain based on singular value decomposition and Cartesian-polar transformation. Int J Speech Technol 17:133.  https://doi.org/10.1007/s10772-013-9214-4 CrossRefGoogle Scholar
  11. 11.
    Dhar PK, Shimamura T (2015) Blind SVD-based audio watermarking using entropy and log-polar transformation. J Inform Sec Appl 20:74–83Google Scholar
  12. 12.
    El-Khamy SE, Mokhtar MA, El-Ganainy NO (2004) New techniques for image change and motion detection based on complete complementary code arrays 21. National Radio Science Conference (NRSC2004), (NTI)Google Scholar
  13. 13.
    El-Khamy SE, El-Ganainy NO, Mokhtar MA (2005) The twin image watermarking algorithm (TIWA): a new techniques for single and multi-message watermarking based on optimum complete complementary codes. EUROCON, Serbia & Montenegro, BelgradeGoogle Scholar
  14. 14.
    El-Khamy SE, Korany NO, El-Sherif MAH (2016) A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimed Tools Appl J.  https://doi.org/10.1007/s11042-016-4113-8
  15. 15.
    Elshazly AR, Nasr ME, Fuad MM, El-Samie FEA (2016) Synchronized double watermark audio watermarking scheme based on a transform domain for stereo signals. 2016 fourth international Japan-Egypt conference on electronics, Communications and Computers (JEC-ECC), Cairo: 52-57Google Scholar
  16. 16.
    Erfani Y, Siahpoush S (2009) Robust audio watermarking using improved TS echo hiding. Digit Sign Process 19:809–814CrossRefGoogle Scholar
  17. 17.
    Fallahpour M, Megías D (2011) High capacity audio watermarking using the high frequency band of the wavelet domain. Multimed Tools Appl 52:485.  https://doi.org/10.1007/s11042-010-0495-1 CrossRefGoogle Scholar
  18. 18.
    Jiao D, Xue Y, Wang C, Gao F (2014) Dual-tree complex wavelet transform blind video watermark based on complete complementary codes. Signal Processing Communications and Computing (ICSPCC) 2014 IEEE International Conference on: 250–253Google Scholar
  19. 19.
    Jichao L, Guixia K, Shan L, Ping Z (2007) Preamble design based on complete complementary sets for random access in MIMO-OFDM systems. Wireless Communications and Networking Conference. WCNC 2007. IEEE. 858–862Google Scholar
  20. 20.
    Jin Z-W, Ming S, Wang G (2014) A multiple watermarking scheme with embedding-order identifying feature. Services Computing Conference (APSCC) 2014 Asia-Pacific: 147-151Google Scholar
  21. 21.
    Khaldi K, Boudraa A (2013) Audio watermarking via EMD. IEEE Trans Audio, Speech, Language Process 21(3):675–680.  https://doi.org/10.1109/TASL.2012.2227733 CrossRefGoogle Scholar
  22. 22.
    Khirallah C, Stankovic V, Stankovic L, Poutouris D (2008) Network spread coding. Network Coding, Theory and Applications, 2008. NetCod 2008. Fourth Workshop on: 1–6.Google Scholar
  23. 23.
    Kojima T, Horii Y (2010) A steganography based on CT-CDMA communication scheme using complete complementary codes. arXiv:1001.2623v1 [cs.IT]Google Scholar
  24. 24.
    Kojima T, Mayuzumi R (2015) An improvement of the data hiding scheme based on complete complementary codes. 2015 seventh international workshop on signal design and its applications in communications (IWSDA), IEEEGoogle Scholar
  25. 25.
    Kojima T, Horii Y, Ohtani N, Sene T (2010) On some properties of a digital watermarking based on complete complementary codes. Sixth International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingGoogle Scholar
  26. 26.
    Kojima T, Ohtani N, Matsumoto T, Parampalli U (2011) A blind digital watermarking scheme based on complete complementary codes. Proc. Australian Communications Theory Workshop (AusCTW), Melbourne, VIC, Australia: 1–6Google Scholar
  27. 27.
    Kojima T, Ohtani N, Matsumoto T, Parampalli U (2011) On multiple information embedding by digital watermarking based on complete complementary codes. Signal Design and its Applications in Communications (IWSDA) 2011 Fifth International Workshop on: 100–103Google Scholar
  28. 28.
    Kojima T, Oizumi A, Okayasu K, Parampalli U (2013) An audio data hiding based on complete complementary codes and its application to an evacuation guiding system. Signal Design and Its Applications in Communications The Sixth International Workshop on: 118–121Google Scholar
  29. 29.
    Kojima T, Oizumi A, Parampalli U (2015) Properties of an emergency broadcasting system based on audio data hiding. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) 2015 International Conference on: 142–145Google Scholar
  30. 30.
    Lei B, Yann Soon I, Zhou F, Li Z, Lei H (2012) A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition. Signal Process 92(9):1985–2001CrossRefGoogle Scholar
  31. 31.
    Li S, Chen G, Zheng X (2004) Chaos-based encryption for digital images and videos, chapter 4 in Multimedia Security HandbookGoogle Scholar
  32. 32.
    Li R, Xu S, Yang H (2015) Spread spectrum audio watermarking based on perceptual characteristic aware extraction. IET Signal Process 10(3):266–273MathSciNetCrossRefGoogle Scholar
  33. 33.
    Luke HD (1985) Sets of one and higher dimensional welti codes and complementary codes. IEEE Trans Aerospace Electronic Systems AES21(2):170–179MathSciNetCrossRefGoogle Scholar
  34. 34.
    Majead A, Najim S (2016) Speech steganography system using lifting wavelet transform. J Netw Complex Syst. ISSN 2225–0603 6(3)Google Scholar
  35. 35.
    Mayazumi R, Kojima T (2011) A blind digital steganography scheme based on complete complementary codes. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) 2011 Seventh International Conference on: 45–48Google Scholar
  36. 36.
    Meligy AM, Nasef MM (2016) A hybrid technique for enhancing the efficiency of audio steganography. Int J Image, Graph Signal Process 1:36–42CrossRefGoogle Scholar
  37. 37.
    Meligy AM, Nasef MM, Eid FT (2016) A hybrid technique for enhancing the efficiency of audio steganography. IJ Image Graph Signal Process 1:36–42Google Scholar
  38. 38.
    Naidu TRK, Kumar GP, Prasad TVSG, (2016) Overview of digital audio steganography techniques. International Journal of Emerging Technologies and Engineering (IJETE) 3(7). ISSN 2348–8050Google Scholar
  39. 39.
    Nandane A, Belagali PP (2017) An efficient algorithm for speech steganography using discrete wavelet transform-sparse decomposition method. IJSRD - International Journal for Scientific Research & Development| Vol. 5, Issue 01. | ISSN (online): 2321–0613Google Scholar
  40. 40.
    Ozgur S, Williams DB (2005) Temporal partition particle filtering for multiuser detectors with mutually orthogonal sequences. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005. Proceedings (ICASSP '05) 2Google Scholar
  41. 41.
    Peijian Z, Li F, Xing Y, Daoben L (2009) Eliminating adjacent cell interference by perfect complementary codes. Network Infrastructure and Digital Content, 2009. IC-NIDC 2009. IEEE Int Conf. 819–822Google Scholar
  42. 42.
    Qin C, Chang C-C, Chiu Y-P (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978MathSciNetCrossRefzbMATHGoogle Scholar
  43. 43.
    Raghava NS, Kumar A, Deep A, Chahal A (2014) Improved LSB method for image steganography using Henon chaotic map. Open J Inform Sec Appl 1(1)Google Scholar
  44. 44.
    D.H.R. Reddy, P.P.M. Krishna, and K. R. Kumar, “ Reduction of side lobes by using complementary codes for radar application”, IOSR J Electron Commun Eng (IOSR-JECE) e-ISSN: 2278–2834,p- ISSN: 2278–8735. Volume 6, Issue 2 (May. - Jun. 2013), PP 27–30.Google Scholar
  45. 45.
    Shiu H-J, Lin B-S, Cheng C-W, Huang C-H, Lei C-L (2017) High-capacity data-hiding scheme on synthesized pitches using amplitude enhancement—a new vision of non-blind audio steganography. Symmetry 9:92MathSciNetCrossRefGoogle Scholar
  46. 46.
    Subir, Joshi AM (2016) DWT-DCT based blind audio watermarking using Arnold scrambling and cyclic codes. 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), Noida: 79–84. doi: https://doi.org/10.1109/SPIN.2016.7566666
  47. 47.
    Suehiro N (1982) Complete complementary code composed of 푁-multiple 5shift orthogonal sequences (in Japanese). IECE (presently IEICE) Trans Fundamentals (Japanese Edition) J65-A(12):1247–1253Google Scholar
  48. 48.
    Suehiro N, Hatori M (1988) 푁-shift cross-orthogonal sequences. IEEE Trans Inf Theory 34(1):143–146MathSciNetCrossRefGoogle Scholar
  49. 49.
    Sumathi CP, Santanam T, Umamaheswari G (2013) A study of various steganographic techniques used for information hiding. International Journal of Computer Science & Engineering Survey (IJCSES) 4(6)Google Scholar
  50. 50.
    Sung AH, Qiao M, Liu Q (2010) Revealing real quality of double compressed MP3 audio revealing real quality of double compressed MP3 audio. ACM International Conference of Multimedia, Firenze, ItalyGoogle Scholar
  51. 51.
    Tsou Y-C, Li Y (2013) Complete complementary code-based digital watermarking with embedding region reduction. Consumer Electronics (ISCE) 2013 IEEE 17th International Symposium on: 219–220, ISSN 0747-668XGoogle Scholar
  52. 52.
    Wang Z, Bovik A, Sheikh H, Simoncelli EP (2014) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  53. 53.
    Xiang Y, Natgunanathan I, Peng D, Zhou W, Yu S (2012) A Dual-Channel time-spread Echo method for audio watermarking. IEEE Trans Inform Forensics Sec 7(2):383–392.  https://doi.org/10.1109/TIFS.2011.2173678 CrossRefGoogle Scholar
  54. 54.
    Xue P, Liu H, Hu J, Hu R (2018) A multi-layer steganographic method based on audio time domain segmented and network steganography. 6th International Conference On Computer-Aided Design, Manufacturing, Modeling And Simulation (Cdmms 2018)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Said E. El-Khamy
    • 1
  • Noha O. Korany
    • 1
  • Marwa H. El-Sherif
    • 1
    Email author
  1. 1.Department of Electrical EngineeringAlexandria UniversityAlexandriaEgypt

Personalised recommendations