Skip to main content

A New Approach to the Architecture of Hybrid and Multilayer Steganographic Methods

  • Conference paper
  • First Online:
Computer Information Systems and Industrial Management (CISIM 2023)

Abstract

Audio steganography is a rapidly growing aspect of broad information protection. However, most of the designed steganographic algorithms are vulnerable to stegoanalysis and detecting the presence of hidden messages in stegoobjects. High hopes for solving this problem are associated with multilayer and hybrid secret message embedding techniques because such mixed techniques can withstand a wide range of attacks. The proposed article expands the knowledge of multilayer methods and introduces the concept of a hybrid method based on the embedding place in different domains of steganographic methods. A comparative analysis of a single-layer, operating in two domains, and a hybrid method that combines the two embedding methods, was made. The comparative analysis shows the advantage of hybrid methods over single-layer methods. The hybrid methods have the exciting potential of creating more flexible methods better suited to a specific purpose or improving one parameter at the expense of another. In addition, combined hybrid and multilayer methods are more secure due to the greater difficulty in extracting a secret message by an intruder.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hybrid. https://dictionary.cambridge.org/dictionary/english/hybrid

  2. What is Hybrid Methods | IGI Global. https://www.igi-global.com/dictionary/hybrid-genetic-metaheuristic-for-two-dimensional-constrained-guillotinable-cutting-problems/13485

  3. Al-Najjar, A.: The decoy: multi-level digital multimedia steganography model. In: Proceedings of the 12th WSEAS International Conference on Communications (2008)

    Google Scholar 

  4. Ali, A.H., George, L.E., Zaidan, A.A., Mokhtar, M.R.: High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimedia Tools Appl. 77(23), 31487–31516 (2018). https://doi.org/10.1007/s11042-018-6213-0. https://linkinghub.elsevier.com/retrieve/pii/S1574013720304160

  5. AlSabhany, A.A., Ali, A.H., Ridzuan, F., Azni, A., Mokhtar, M.R.: Digital audio steganography: systematic review, classification, and analysis of the current state of the art. Comput. Sci. Rev. 38, 100316 (2020). https://doi.org/10.1016/j.cosrev.2020.100316. https://linkinghub.elsevier.com/retrieve/pii/S1574013720304160

  6. Bhowal, K.: Multilevel Steganography to Improve Secret Communication (2019)

    Google Scholar 

  7. Dutta, H., Das, R.K., Nandi, S., Prasanna, S.R.M.: An overview of digital audio steganography. IETE Tech. Rev. 37(6), 632–650 (2020). https://doi.org/10.1080/02564602.2019.1699454. https://www.tandfonline.com/doi/full/10.1080/02564602.2019.1699454

  8. Hassaballah, M.: Digital Media Steganography: Principles, Algorithms, Advances (2020). https://doi.org/10.1016/C2018-0-04865-3

  9. Hu, Y., Loizou, P.C.: Subjective comparison and evaluation of speech enhancement algorithms. Speech Commun. 49(7), 588–601 (2007). https://doi.org/10.1016/j.specom.2006.12.006. https://www.sciencedirect.com/science/article/pii/S0167639306001920

  10. Kahn, D.: The history of steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 1–5. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61996-8_27

    Chapter  Google Scholar 

  11. Kanhe, A., Aghila, G.: A DCT-SVD-based speech steganography in voiced frames. Circuits Syst. Signal Process. 37(11), 5049–5068 (2018). https://doi.org/10.1007/s00034-018-0805-9

    Article  Google Scholar 

  12. Kumar, K.P., Kanhe, A.: Secured speech watermarking with DCT compression and chaotic embedding using DWT and SVD. Arab. J. Sci. Eng. 47(8), 10003–10024 (2022). https://doi.org/10.1007/s13369-021-06431-8

    Article  Google Scholar 

  13. Mahmoud, M.M., Elshoush, H.T.: Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography-an innovative approach. IEEE Access 10, 29954–29971 (2022). https://doi.org/10.1109/ACCESS.2022.3155146

    Article  Google Scholar 

  14. Manjunath, K., Kodanda Ramaiah, G.N., GiriPrasad, M.N.: Backward movement oriented shark smell optimization-based audio steganography using encryption and compression strategies. Digit. Signal Process. 122, 103335 (2022). https://doi.org/10.1016/j.dsp.2021.103335. https://www.sciencedirect.com/science/article/pii/S1051200421003742

  15. Narula, M., Gupta, M., Garg, M.: Implementation of hybrid technique from spatial and frequency domain steganography: along with cryptography to withstand statistical attacks. In: 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), pp. 803–808. IEEE (2020). https://doi.org/10.1109/ICACCCN51052.2020.9362754. https://ieeexplore.ieee.org/document/9362754/

  16. Pal, D., Goswami, A., Chowdhury, S., Ghoshal, N.: A novel high-density multilayered audio steganography technique in hybrid domain. In: Bhattacharjee, D., Kole, D.K., Dey, N., Basu, S., Plewczynski, D. (eds.) Proceedings of International Conference on Frontiers in Computing and Systems. AISC, vol. 1255, pp. 721–730. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-7834-2_67

    Chapter  Google Scholar 

  17. Pilania, U., Tanwar, R., Gupta, P.: An ROI-based robust video steganography technique using SVD in wavelet domain. Open Comput. Sci. 12(1), 1–16 (2022). https://doi.org/10.1515/comp-2020-0229. https://www.degruyter.com/document/doi/10.1515/comp-2020-0229/html

  18. Rao, R.C., Jayasree, P.V.Y., Rao, S.S.: Hybrid speech steganography system using SS-RDWT with IPDP-MLE approach. Soft Comput. 27(2), 1117–1129 (2023). https://doi.org/10.1007/s00500-021-05970-4

    Article  Google Scholar 

  19. Sánchez Rinza, B.E., Munive Morales, L.G., Jaramillo Núñez, A.: LSB algorithm to hide text in an audio signal. Computación y Sistemas 26(1), 39–44 (2022). https://doi.org/10.13053/cys-26-1-4150. https://cys.cic.ipn.mx/ojs/index.php/CyS/article/view/4150

  20. Teotia, S., Srivastava, P.: Enhancing audio and video steganography technique using hybrid algorithm. In: 2018 International Conference on Communication and Signal Processing (ICCSP), pp. 1059–1063 (2018). https://doi.org/10.1109/ICCSP.2018.8524182

  21. Wahab, O.F.A., Khalaf, A.A.M., Hussein, A.I., Hamed, H.F.A.: Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access 9, 31805–31815 (2021). https://doi.org/10.1109/ACCESS.2021.3060317

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Łukasz Cierocki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pejaś, J., Cierocki, Ł. (2023). A New Approach to the Architecture of Hybrid and Multilayer Steganographic Methods. In: Saeed, K., Dvorský, J., Nishiuchi, N., Fukumoto, M. (eds) Computer Information Systems and Industrial Management. CISIM 2023. Lecture Notes in Computer Science, vol 14164. Springer, Cham. https://doi.org/10.1007/978-3-031-42823-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-42823-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-42822-7

  • Online ISBN: 978-3-031-42823-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics