Skip to main content

A GA based audio steganography with enhanced security


In the current internet community, secure data transfer is limited due to its attack made on data communication. So more robust methods are chosen so that they ensure secured data transfer. One of the solutions which came to the rescue is the audio Steganography.

“A GA Based Audio Steganography with enhanced security” is one propose system which is based on audio Steganography and cryptography, ensures secure data transfer between the source and destination. Here we present a novel, principled approach to resolve the remained problems of substitution technique of audio Steganography. We use most powerful encryption algorithm (RSA) to encrypt message in the first level of security, which is very complex to break. In the second level, we use a more powerful GA based LSB (Least Significant Bit) Algorithm to encode the encrypted message into audio data. Here encrypted message bits are embedded into random and higher LSB layers, resulting in increased robustness against noise addition. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well. On the other hand, to reduce the distortion, GA operators are used.

The basic idea behind this paper is maintained randomness in message bit insertion into audio data for hiding the data from hackers and multi-objective GA is used to reduce distortion.

This is a preview of subscription content, access via your institution.


  1. Zamani, M., Manaf, A.A., Ahmad, R.B., Zeki, A.M., & Abdullah, S. (2009) A genetic-algorithm-based approach for audio steganography. World Academy of Science, Engineering and Technology, 54.

  2. Cvejic, N., & Seppänen, T. (2002). Increasing the capacity of LSB based audio steganography. In Proc. 5th IEEE international workshop on multimedia signal processing, St. Thomas, VI, December, 2002 (pp. 336–338).

    Google Scholar 

  3. Lee, Y. K., & Chen, L. H. (2000). High capacity image steganographic model. In IEEE proceedings vision, image and signal processing (pp. 288–294).

    Google Scholar 

  4. Pal, S. K., Saxena, P. K., & Mutto, S. K. (2002). The future of audio steganography. In Pacific Rim workshop on digital steganography, Japan.

    Google Scholar 

  5. Westfeld, A., & Pitzmann, A. (2000). Attacks on steganographic systems. : Vol. 1768. Lecture notes in computer science (pp. 61–75). Berlin: Springer.

    Google Scholar 

  6. Sridevi, R., Damodaram, A., & Narasimham, S. V. L. Efficient method of audio steganography by modified LSB algorithm and strong encryption key with enhanced security. Journal of Theoretical and Applied Information Technology, 2005–2009 JATIT.

  7. Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding—a survey. Proceedings of IEEE, 87(7), 1062–1078.

    Article  Google Scholar 

  8. Cvejic, N., & Seppanen, T. (2004). Increasing robustness of LSB audio steganography using a novel embedding method. In International conference on information technology: coding and computing, The Orleans, Las Vegas, Nevada, USA, April 5–7, 2004 (Vol. 2, pp. 533–537).

    Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Tai-Hoon Kim.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Bhowal, K., Bhattacharyya, D., Jyoti Pal, A. et al. A GA based audio steganography with enhanced security. Telecommun Syst 52, 2197–2204 (2013).

Download citation

  • Published:

  • Issue Date:

  • DOI: