Abstract
Audio steganography is a rapidly growing aspect of broad information protection. However, most of the designed steganographic algorithms are vulnerable to stegoanalysis and detecting the presence of hidden messages in stegoobjects. High hopes for solving this problem are associated with multilayer and hybrid secret message embedding techniques because such mixed techniques can withstand a wide range of attacks. The proposed article expands the knowledge of multilayer methods and introduces the concept of a hybrid method based on the embedding place in different domains of steganographic methods. A comparative analysis of a single-layer, operating in two domains, and a hybrid method that combines the two embedding methods, was made. The comparative analysis shows the advantage of hybrid methods over single-layer methods. The hybrid methods have the exciting potential of creating more flexible methods better suited to a specific purpose or improving one parameter at the expense of another. In addition, combined hybrid and multilayer methods are more secure due to the greater difficulty in extracting a secret message by an intruder.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hybrid. https://dictionary.cambridge.org/dictionary/english/hybrid
What is Hybrid Methods | IGI Global. https://www.igi-global.com/dictionary/hybrid-genetic-metaheuristic-for-two-dimensional-constrained-guillotinable-cutting-problems/13485
Al-Najjar, A.: The decoy: multi-level digital multimedia steganography model. In: Proceedings of the 12th WSEAS International Conference on Communications (2008)
Ali, A.H., George, L.E., Zaidan, A.A., Mokhtar, M.R.: High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimedia Tools Appl. 77(23), 31487–31516 (2018). https://doi.org/10.1007/s11042-018-6213-0. https://linkinghub.elsevier.com/retrieve/pii/S1574013720304160
AlSabhany, A.A., Ali, A.H., Ridzuan, F., Azni, A., Mokhtar, M.R.: Digital audio steganography: systematic review, classification, and analysis of the current state of the art. Comput. Sci. Rev. 38, 100316 (2020). https://doi.org/10.1016/j.cosrev.2020.100316. https://linkinghub.elsevier.com/retrieve/pii/S1574013720304160
Bhowal, K.: Multilevel Steganography to Improve Secret Communication (2019)
Dutta, H., Das, R.K., Nandi, S., Prasanna, S.R.M.: An overview of digital audio steganography. IETE Tech. Rev. 37(6), 632–650 (2020). https://doi.org/10.1080/02564602.2019.1699454. https://www.tandfonline.com/doi/full/10.1080/02564602.2019.1699454
Hassaballah, M.: Digital Media Steganography: Principles, Algorithms, Advances (2020). https://doi.org/10.1016/C2018-0-04865-3
Hu, Y., Loizou, P.C.: Subjective comparison and evaluation of speech enhancement algorithms. Speech Commun. 49(7), 588–601 (2007). https://doi.org/10.1016/j.specom.2006.12.006. https://www.sciencedirect.com/science/article/pii/S0167639306001920
Kahn, D.: The history of steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 1–5. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61996-8_27
Kanhe, A., Aghila, G.: A DCT-SVD-based speech steganography in voiced frames. Circuits Syst. Signal Process. 37(11), 5049–5068 (2018). https://doi.org/10.1007/s00034-018-0805-9
Kumar, K.P., Kanhe, A.: Secured speech watermarking with DCT compression and chaotic embedding using DWT and SVD. Arab. J. Sci. Eng. 47(8), 10003–10024 (2022). https://doi.org/10.1007/s13369-021-06431-8
Mahmoud, M.M., Elshoush, H.T.: Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography-an innovative approach. IEEE Access 10, 29954–29971 (2022). https://doi.org/10.1109/ACCESS.2022.3155146
Manjunath, K., Kodanda Ramaiah, G.N., GiriPrasad, M.N.: Backward movement oriented shark smell optimization-based audio steganography using encryption and compression strategies. Digit. Signal Process. 122, 103335 (2022). https://doi.org/10.1016/j.dsp.2021.103335. https://www.sciencedirect.com/science/article/pii/S1051200421003742
Narula, M., Gupta, M., Garg, M.: Implementation of hybrid technique from spatial and frequency domain steganography: along with cryptography to withstand statistical attacks. In: 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), pp. 803–808. IEEE (2020). https://doi.org/10.1109/ICACCCN51052.2020.9362754. https://ieeexplore.ieee.org/document/9362754/
Pal, D., Goswami, A., Chowdhury, S., Ghoshal, N.: A novel high-density multilayered audio steganography technique in hybrid domain. In: Bhattacharjee, D., Kole, D.K., Dey, N., Basu, S., Plewczynski, D. (eds.) Proceedings of International Conference on Frontiers in Computing and Systems. AISC, vol. 1255, pp. 721–730. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-7834-2_67
Pilania, U., Tanwar, R., Gupta, P.: An ROI-based robust video steganography technique using SVD in wavelet domain. Open Comput. Sci. 12(1), 1–16 (2022). https://doi.org/10.1515/comp-2020-0229. https://www.degruyter.com/document/doi/10.1515/comp-2020-0229/html
Rao, R.C., Jayasree, P.V.Y., Rao, S.S.: Hybrid speech steganography system using SS-RDWT with IPDP-MLE approach. Soft Comput. 27(2), 1117–1129 (2023). https://doi.org/10.1007/s00500-021-05970-4
Sánchez Rinza, B.E., Munive Morales, L.G., Jaramillo Núñez, A.: LSB algorithm to hide text in an audio signal. Computación y Sistemas 26(1), 39–44 (2022). https://doi.org/10.13053/cys-26-1-4150. https://cys.cic.ipn.mx/ojs/index.php/CyS/article/view/4150
Teotia, S., Srivastava, P.: Enhancing audio and video steganography technique using hybrid algorithm. In: 2018 International Conference on Communication and Signal Processing (ICCSP), pp. 1059–1063 (2018). https://doi.org/10.1109/ICCSP.2018.8524182
Wahab, O.F.A., Khalaf, A.A.M., Hussein, A.I., Hamed, H.F.A.: Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access 9, 31805–31815 (2021). https://doi.org/10.1109/ACCESS.2021.3060317
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Pejaś, J., Cierocki, Ł. (2023). A New Approach to the Architecture of Hybrid and Multilayer Steganographic Methods. In: Saeed, K., Dvorský, J., Nishiuchi, N., Fukumoto, M. (eds) Computer Information Systems and Industrial Management. CISIM 2023. Lecture Notes in Computer Science, vol 14164. Springer, Cham. https://doi.org/10.1007/978-3-031-42823-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-42823-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-42822-7
Online ISBN: 978-3-031-42823-4
eBook Packages: Computer ScienceComputer Science (R0)