Pilot Study to Enhance Cover-Selection-Based Audio Steganography (CAS) Using Feed-Forward Neural Network

Pilot Study to Enhance Cover-Selection-Based Audio Steganography (CAS) Using Feed-Forward Neural Network

Authors

  • Taqiyuddin Anas Faculty of Science and Technology,Universiti Sains Islam Malaysia
  • Farida Ridzuan Cybersecurity and Systems Research Unit, Faculty of Science and Technology, Universiti Sains Islam Malaysia
  • Sakinah Ali Pitchay Faculty of Science and Technology,Universiti Sains Islam Malaysia

DOI:

https://doi.org/10.24191/jcrinn.v10i1.490

Keywords:

Cover selection, carrier selection, steganography, audiosteganography, feed-forward neural network, machine learning

Abstract

Steganography is a method of concealing a hidden message inside another medium ranging from image to video. The specification of the cover audio used for message embedding plays a role in the whole steganography performance. The Cover-Selection-Based Audio Steganography (CAS) technique addressed cover selection in audio steganography. However, finding the optimal cover audio using the CAS technique currently takes a significant amount of time. Therefore, the CAS technique is improved by utilising a machine learning technique called Feed-Forward Neural Network (FFNN). Similarly to CAS, Least Significant Bit (LSB) encoding is utilised for data embedding. The proposed technique’s effectiveness is assessed by comparing it with CAS regarding time performance, precision, and the stego audio quality, using a dataset of 95 inputs. The pilot study demonstrated that the FFNN model achieved 60% precision over the CAS technique in machine learning evaluation. For the audio stego evaluation, the finding shows that the proposed technique performed slightly lower than the CAS technique in the imperceptibility aspect while performing better than the CAS technique in the robustness and capacity aspects. The proposed technique achieved faster cover selection with a 5,126.89% speed reduction in performance evaluation. This study offers a valuable reference for future research on audio steganography, particularly in enhancing the performance of cover selection using machine learning

Downloads

Download data is not yet available.

Author Biographies

Taqiyuddin Anas, Faculty of Science and Technology,Universiti Sains Islam Malaysia

Taqiyuddin Anas, BSc is a graduate of Information Security and Assurance Program, Faculty of Science and Technology, Universiti Sains Islam Malaysia. His main research activity is in steganography and machine learning. His career interest related to blue team in cybersecurity, focusing on malware reversing, rules detection, and threat hunting. He can be reached through his email at ahmadtaqiyuddinn98@raudah.usim.edu.my

Farida Ridzuan, Cybersecurity and Systems Research Unit, Faculty of Science and Technology, Universiti Sains Islam Malaysia

Farida Ridzuan, PhD is an Associate Professor in the Information Security and Assurance Program, Faculty of Science and Technology, Universiti Sains Islam Malaysia. She earned her first-class B.Sc. (Hons.) in Computer Science from Universiti Teknologi Malaysia, an M.Sc. in Discrete Mathematics from the University of Essex, U.K., and a Ph.D. from Curtin University, Australia. Her research focuses on steganography and cryptography, with numerous publications in top-tier journals and RM2 million in secured research funding. She can be reached at farida@usim.edu.my.

Sakinah Ali Pitchay, Faculty of Science and Technology,Universiti Sains Islam Malaysia

Sakinah Ali Pitchay, PhD is an Associate Professor in the Information Security and Assurance Program at Universiti Sains Islam Malaysia. She received her PhD in Computer Science from the University of Birmingham, UK, a Master's degree in Software Engineering from Universiti Teknologi Malaysia and B.IT (Software Engineering) from Universiti Malaysia Terengganu. Her research interests include image enhancement, information security, and software engineering, and she has numerous publications. She won many innovation competitions and was recently awarded the Special Innovation Award in the Bank Innovation Challenge 2024 for the research grant. She can be reached at sakinah.ali@usim.edu.my and via www.linkedin.com/in/sakinah-ali-pitchay

References

Amin Seyyedi, S., & Ivanov, N. (2014). Statistical image classification for image steganographic Techniques. International Journal of Image, Graphics and Signal Processing, 6(8), 19–24. https://doi.org/10.5815/ijigsp.2014.08.03

Andono, P. N., & Setiadi, D. R. I. M. (2023). Quantization selection based on characteristic of cover image for PVD Steganography to optimize imperceptibility and capacity. Multimedia Tools and Applications, 82(3), 3561–3580. https://doi.org/10.1007/s11042-022-13393-y

Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 5(3), 75–80. https://doi.org/10.1109/4236.935180

Bhowal, K., Sarkar, D., Biswas, S., & Sarkar, P. P. (2017). A steganographic approach to hide hidden data in digital audio based on XOR operands triplet property with high embedding rate and good quality audio. Turkish Journal Of Electrical Engineering & Computer Sciences, 25, 2136–2148. https://doi.org/10.3906/elk-162-267

Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, & Jiwu Huang. (2015). A strategy of clustering modification directions in spatial image steganography. IEEE Transactions on Information Forensics and Security, 10(9), 1905–1917. https://doi.org/10.1109/TIFS.2015.2434600

Das, D., Durafe, A., & Patidar, V. (2023). An Efficient Lightweight LSB Steganography with deep learning steganalysis. In M. D Patil, G. K Birajdar, & S. S Chaudhari, Computational Intelligence in Image and Video Processing (1st ed., pp. 131–154). Chapman and Hall/CRC. https://doi.org/10.1201/9781003218111-7

Noor Azam, M. H. (2023). Enhancement Of Cover Selection – Based Audio Steganography (CAS) using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance [Publication, University Sains Islam Malaysia]. https://oarep.usim.edu.my/entities/publication/458e87db-1676-4ea8-afcb-020d0c4e5847/full

Noor Azam, M. H., Mohd Ridzuan, F. H., & Mohd Sayuti, M. N. S. (2023). Optimized cover selection for audio steganography using multi-objective evolutionary algorithm. Journal of Information and Communication Technology, 22(2), 255–282. https://doi.org/10.32890/jict2023.22.2.5

Rashid, R. Dh. (2020). Cover image selection for embedding based on different criteria. In S. S. Agaian, S. P. DelMarco, & V. K. Asari (Eds.), Mobile Multimedia/Image Processing, Security, and Applications 2020 (p. 30). SPIE. https://doi.org/10.1117/12.2560720

Ren-e, Y. (2014). Cover selection for image steganography based on image characteristics. Journal of Optoelectronics·laser. https://www.researchgate.net/publication/288164492_Cover_selection_for_image_steganography_based_on_image_characteristics

Ridzuan, F., Taqiyuddin Anas, & Sakinah Ali Pitchay. (2024). Cover selection in steganography: A systematic literature review. Journal of Advanced Research in Applied Sciences and Engineering Technology, 107–129. https://doi.org/10.37934/araset.52.2.107129

Sajedi, H., & Jamzad, M. (2009). Secure cover selection steganography. In J. H. Park, H.-H. Chen, M. Atiquzzaman, C. Lee, T. Kim, & S.-S. Yeo (Eds.), Advances in Information Security and Assurance (Vol. 5576, pp. 317–326). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_33

Subhedar, M. S. (2021). Cover selection technique for secure transform domain image steganography. Iran Journal of Computer Science. https://doi.org/10.1007/S42044-020-00077-9

Vabalas, A., Gowen, E., Poliakoff, E., & Casson, A. J. (2019). Machine learning algorithm validation with a limited sample size. PLOS ONE, 14(11), e0224365. https://doi.org/10.1371/journal.pone.0224365

Wang, Z., Li, S., & Zhang, X. (2019). Towards improved steganalysis: When Cover selection is used in steganography. IEEE Access, 7, 168914–168921. https://doi.org/10.1109/ACCESS.2019.2955113

Wang, Z., Zhang, X., & Qian, Z. (2020). Practical cover selection for steganography. IEEE Signal Processing Letters, 27, 71–75. https://doi.org/10.1109/LSP.2019.2956416

Wu, H.-Z., Wang, H.-X., & Shi, Y.-Q. (2016). Can machine learn steganography? - Implementing LSB substitution and matrix coding steganography with feed-forward neural networks (arXiv:1606.05294). arXiv. http://arxiv.org/abs/1606.05294

Wu, S., Liu, Y., Zhong, S., & Liu, Y. (2015). What makes the stego image undetectable? Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 1–6. https://doi.org/10.1145/2808492.2808539

Ye, D., Jiang, S., & Huang, J. (2019). Heard more than heard: An audio steganography method based on GAN. ArXiv. https://www.semanticscholar.org/paper/1c33d4d27728d1b9f4589e04ab5a26cf1e961a30

Yuan, J., & Chen, H. (2014). Embedding Suitability Adaptive Cover Selection for Image Steganography: 2014 International Conference on e-Education, e-Business and Information Management (ICEEIM 2014), Shanghai, China. https://doi.org/10.2991/iceeim-14.2014.11

Downloads

Published

2025-03-06

How to Cite

Anas, T., Ridzuan, F., & Pitchay, S. A. (2025). Pilot Study to Enhance Cover-Selection-Based Audio Steganography (CAS) Using Feed-Forward Neural Network. Journal of Computing Research and Innovation, 10(1), 1–14. https://doi.org/10.24191/jcrinn.v10i1.490

Issue

Section

General Computing

Most read articles by the same author(s)

Loading...