Hybrid Audio Steganography and Cryptography Method Based on High Least Significant Bit (LSB) Layers and One-Time Pad—A Novel Approach

  • Samah M. H. Alwahbani
  • Huwaida T. I. Elshoush
Conference paper
Part of the Studies in Computational Intelligence book series (SCI, volume 751)


The paper proposes a novel chaos based audio steganography and cryptography method. It is a higher Least Significant Bit (LSB) layers algorithm in which the secret message is encrypted first by one-time pad algorithm. Two chaotic sequences of Piecewise Linear Chaotic Map (PWLCM) were used. In the encryption process, the key for one-time pad is generated by PWLCM chaotic map. In the steganography process, the second sequence of PWLCM is used to generate a random sequence. Then, indices of the ordered generated sequence were used to embed the encrypted message in randomly selected audio samples. The encrypted data were embedded on the higher layers other than the LSB using efficient bits adjustment algorithm, in order to increase the robustness against noise addition or MPEG compression. An analysis is discussed for the proposed scheme. For the steganography algorithm, the proposed scheme overcomes the main two problems for LSB coding, which are the low robustness of secret message extraction and destruction. For the former, the proposed method encrypts the secret message by perfect efficient algorithm which is the one-time pad. Regard of the second one, the secret message is hidden in higher layers which improve the robustness against signal processing manipulation. The main three steganography characteristics were tested and evaluated which are high capacity, perceptual transparency and robustness. Furthermore, the drawbacks of key generation and key distribution for one-time pad is sloved by using the chaotic maps. For the experimental results, waveform analysis and signal-to-noise Ratio are made, which show the high quality of the stego audio, and hence demonstrate the efficiency of the proposed scheme.



The authors would like to thank the University of Khartoum (UofK), Nile Center for Technology Research (NCTR) and Sudan’s National Telecommunications Corporation (NTC) for their funding to this research paper.


  1. 1.
    Alwahbani, S.M., Elshoush, H.T.: Chaos-based Audio Steganography and Cryptography Using LSB Method and One-Time Pad, SAI Intelligent Systems Conference, London, UK, 21–22 September, pp. 1072–1078 (2016)Google Scholar
  2. 2.
    Awad, A., Saadane, A.: New chaotic permutation methods for image encryption. IAENG Int. J. Comput. Sci. 37(4) (2010)Google Scholar
  3. 3.
    Adhiya, K.P., Patil, S.A.: Hiding text in audio using LSB based steganography. Inf. Knowl. Manag. IISTE 2(3), 8–14 (2012)Google Scholar
  4. 4.
    Bandyopadhyay, S., Datta, B.: Higher LSB layer based audio steganography technique. Int. J. Electron. Commun. Technol. 2(4) (2011)Google Scholar
  5. 5.
    Bassil, Y.: A two intermediates audio steganography technique. J. Emergi. Trends Comput. Inf. Sci. (CIS) 3(11) (2012)Google Scholar
  6. 6.
    Castelan, Y., Khodja, B.: MP3 Steganography Techniques, RIIT’15, Chicago, IL, USA, 30 September–3 October 2015Google Scholar
  7. 7.
    Chattopadhyay, D., Mandal, M.K., Nandi, D.: Symmetric key chaotic image encryption using circle map. Indian J. Sci. Technol. (2011)Google Scholar
  8. 8.
    Cvejic, N., Seppanen, T.: Increasing robustness of LSB audio steganography using a novel embedding method. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC04), IEEE (2004)Google Scholar
  9. 9.
    Dengre, A.R., Gawande, A.D., Deshmukh, A.B.: Effect of audio steganography based on LSB insertion with image watermarking using AVI video. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2(6), 363–370 (2013)Google Scholar
  10. 10.
    Divya, S., Reddy, M.R.: Hiding text in audio using multiple LSB steganography and provide security using cryptography. Int. J. Sci. Technol. Res. 1(6), 68–70 (2012)Google Scholar
  11. 11.
    Dutta, P., Bhattacharyya, D., Kim, T.H.: Data hiding in audio signal: a review. Int. J. Database Theory Appl. 2(2), 1–8 (2009)Google Scholar
  12. 12.
    Gadicha, A.B.: Audio wave steganography. Int. J. Soft Comput. Eng. (IJSCE) 1(5), 174–176 (2011)Google Scholar
  13. 13.
    Hmood, D.N., Khudhiar, K.A., Altaei, M.S.: A new steganographic method for embedded image in audio file. Int. J. Comput. Sci. Secur. (IJCSS) 6(2), 135–141 (2012)Google Scholar
  14. 14.
    Jayaram, P., Ranganatha, H., Anupama, H.: Information hiding using audio steganography—a survey. Int. J. Multimedia Appl. (IJMA) 3(3) (2011)Google Scholar
  15. 15.
    Hung, K.: A Study on Efficient Chaotic Image Encryption Schemes, Department of Electronic Engineering, City University of Hong Kong, Master thesis (2007)Google Scholar
  16. 16.
    Kumar, S., Barnali, B., Banik, G.: LSB modification and phase encoding technique of audio steganography revisited. Int. J. Adv. Res. Comput. Commun. Eng. 1(4) (2012)Google Scholar
  17. 17.
    Mahajan, S., Singh, A.: A review of methods and approach for secure steganography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(10), 67–70 (2012)Google Scholar
  18. 18.
    Malviya, S., Saxena, M., Khare, A.: Audio steganography by different methods. Int. J. Emerg. Technol. Adv. Eng. 2(7), 371–375 (2012)Google Scholar
  19. 19.
    Mandal, P.C.: Modern steganographic technique: a survey. Int. J. Comput. Sci. Eng. Technol. (IJCSET) 3(9), 444–448 (2012)Google Scholar
  20. 20.
    Meligy, A.M., Nasef, M.M., Eid, F.T.: A hybrid technique for enhancing the efficiency of audio steganography. Int. J. Image Gr. Signal Process. 8(1), 36 (2016)Google Scholar
  21. 21.
    Nehru, G., Dhar, P.: A detailed look of audio steganography techniques using LSB and genetic algorithm approach. IJCSI Int. J. Comput. Sci. Issues 9(2), 402–406 (2012)Google Scholar
  22. 22.
    Nosrati, M., Karimi, R., Hariri, M.: Audio steganography: a survey on recent approaches. World Appl. Program. 2(3), 202–205 (2012)Google Scholar
  23. 23.
    Padmashree, G., Venugopala, P.S.: Audio stegnography and cryptography: using LSB algorithm at 4th and 5th LSB layers. Int. J. Eng. Innov. Technol. (IJEIT) 2(4), 177–181 (2012)Google Scholar
  24. 24.
    Parthasarathy, C., Srivatsa, S.K.: Increased robustness of LSB audio steganography by reduced distortion LSB coding. J. Theor. Appl. Inf. Technol. 7(1), 80–86 (2009)Google Scholar
  25. 25.
    Patil, B.A., Chakkarwar, V.A.: Review of an improved audio steganographic technique over LSB through random based approach. IOSR J. Comput. Eng. (IOSR-JCE) 9(1), 30–34 (2013)Google Scholar
  26. 26.
    Prabu, A.V., Srinivasarao, S., Apparao, T., Rao, M.J., RaoK, B.: Audio encryption in handsets. Int. J. Comput. Appl. 40(6), 40–45 (2012)Google Scholar
  27. 27.
    Priyanka, R.B., Vrushabh, R.K., Komal, K.P., Pingle, S.M., Sanghavi Mahesh, R.: Audio steganography using LSB, 1st international conference on recent trends in engineering & technology. Spec. Issue Int. J. Electron. Commun. Soft Comput. Sci. Eng. 90–92 (2012)Google Scholar
  28. 28.
    Rana, M., Rohit, T.: Genetic Algorithm in Audio Steganography (2014). arXiv:1407.2729
  29. 29.
    Rijmenants, D.: The complete guide to secure communications with the one time pad cipher. Cipher Mach. Cryptology (2012)Google Scholar
  30. 30.
    Roy, S., Singh, A.K., Parida, J., Sairam, A.S.: Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization. In: CCSEIT-12, 26–28 October 2012Google Scholar
  31. 31.
    Santhi, V., Govindaraju, L.: Stego-audio using genetic algorithm approach. Res. J. Appl. Sci. Eng. Technol. 7(22), 4806–4812 (2014)Google Scholar
  32. 32.
    Sheikhan, M., Asadollahi, K., Shahnazi, R.: Improvement of embedding capacity and quality of DWT-based audio steganography systems. World Appl. Sci. J. 13(3), 507–516 (2011)Google Scholar
  33. 33.
    Singh, P.K., Aggrawal, R.K.: Enhancement of LSB based steganography for hiding image in audio. Int. J. Comput. Sci. Eng. 02(05), 1652–1658 (2010)Google Scholar
  34. 34.
    Singh, G., Tiwari, K., Singh, S.: Audio steganography using RSA algorithm and genetic based substitution method to enhance security. Int. J. Sci. Eng. Res. 5(5) (2014)Google Scholar
  35. 35.
    Stallings, W.: Cryptography and Network Security Principles and Practice, 5th edn. Prentice Hall, USA (2011)Google Scholar
  36. 36.
    Yoon, J.W., Kim, H., Jo, H., Lee, H., Lee, K.: Visual Honey Encryption: Application to Steganography, IH&MMSec15, Portland, Oregon, USA, 17–19 June 2015Google Scholar
  37. 37.
    Zamani, M., Manaf, A.A., Ahmad, R.B., Zeki, A.M., Abdullah, S.: A genetic-algorithm-based approach for audio steganography. World Acad. Sci. Eng. Technol. 30, 355–358 (2009)Google Scholar
  38. 38.
    Zamani, M., Abdul Manaf, A.B., Zeidanloo, H.R., Chaeikar, S.S.: Genetic substitution-based audio steganography for high capacity applications. Int. J. Internet Technol. Secure. Trans. 3(1), 97–110 (2011)Google Scholar
  39. 39.
    Zameer, F., Tarun, K.: Audio steganography using DES algorithm. In: Proceedings of the 5th National Conference, New Delhi, India (2011)Google Scholar
  40. 40.
    Zamani, M., Abdul Manaf, A.: Genetic algorithm for fragile audio watermarking. Telecommun. Syst. 59, 291–304 (2015)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Samah M. H. Alwahbani
    • 1
  • Huwaida T. I. Elshoush
    • 1
  1. 1.Faculty of Mathematical ScienceUniversity of KhartoumKhartoumSudan

Personalised recommendations