Pilot Study to Enhance Cover-Selection-Based Audio Steganography (CAS) Using Feed-Forward Neural Network
DOI:
https://doi.org/10.24191/jcrinn.v10i1.490Keywords:
Cover selection, carrier selection, steganography, audiosteganography, feed-forward neural network, machine learningAbstract
Steganography is a method of concealing a hidden message inside another medium ranging from image to video. The specification of the cover audio used for message embedding plays a role in the whole steganography performance. The Cover-Selection-Based Audio Steganography (CAS) technique addressed cover selection in audio steganography. However, finding the optimal cover audio using the CAS technique currently takes a significant amount of time. Therefore, the CAS technique is improved by utilising a machine learning technique called Feed-Forward Neural Network (FFNN). Similarly to CAS, Least Significant Bit (LSB) encoding is utilised for data embedding. The proposed technique’s effectiveness is assessed by comparing it with CAS regarding time performance, precision, and the stego audio quality, using a dataset of 95 inputs. The pilot study demonstrated that the FFNN model achieved 60% precision over the CAS technique in machine learning evaluation. For the audio stego evaluation, the finding shows that the proposed technique performed slightly lower than the CAS technique in the imperceptibility aspect while performing better than the CAS technique in the robustness and capacity aspects. The proposed technique achieved faster cover selection with a 5,126.89% speed reduction in performance evaluation. This study offers a valuable reference for future research on audio steganography, particularly in enhancing the performance of cover selection using machine learning
Downloads
References
Amin Seyyedi, S., & Ivanov, N. (2014). Statistical image classification for image steganographic Techniques. International Journal of Image, Graphics and Signal Processing, 6(8), 19–24. https://doi.org/10.5815/ijigsp.2014.08.03
Andono, P. N., & Setiadi, D. R. I. M. (2023). Quantization selection based on characteristic of cover image for PVD Steganography to optimize imperceptibility and capacity. Multimedia Tools and Applications, 82(3), 3561–3580. https://doi.org/10.1007/s11042-022-13393-y
Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 5(3), 75–80. https://doi.org/10.1109/4236.935180
Bhowal, K., Sarkar, D., Biswas, S., & Sarkar, P. P. (2017). A steganographic approach to hide hidden data in digital audio based on XOR operands triplet property with high embedding rate and good quality audio. Turkish Journal Of Electrical Engineering & Computer Sciences, 25, 2136–2148. https://doi.org/10.3906/elk-162-267
Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, & Jiwu Huang. (2015). A strategy of clustering modification directions in spatial image steganography. IEEE Transactions on Information Forensics and Security, 10(9), 1905–1917. https://doi.org/10.1109/TIFS.2015.2434600
Das, D., Durafe, A., & Patidar, V. (2023). An Efficient Lightweight LSB Steganography with deep learning steganalysis. In M. D Patil, G. K Birajdar, & S. S Chaudhari, Computational Intelligence in Image and Video Processing (1st ed., pp. 131–154). Chapman and Hall/CRC. https://doi.org/10.1201/9781003218111-7
Noor Azam, M. H. (2023). Enhancement Of Cover Selection – Based Audio Steganography (CAS) using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance [Publication, University Sains Islam Malaysia]. https://oarep.usim.edu.my/entities/publication/458e87db-1676-4ea8-afcb-020d0c4e5847/full
Noor Azam, M. H., Mohd Ridzuan, F. H., & Mohd Sayuti, M. N. S. (2023). Optimized cover selection for audio steganography using multi-objective evolutionary algorithm. Journal of Information and Communication Technology, 22(2), 255–282. https://doi.org/10.32890/jict2023.22.2.5
Rashid, R. Dh. (2020). Cover image selection for embedding based on different criteria. In S. S. Agaian, S. P. DelMarco, & V. K. Asari (Eds.), Mobile Multimedia/Image Processing, Security, and Applications 2020 (p. 30). SPIE. https://doi.org/10.1117/12.2560720
Ren-e, Y. (2014). Cover selection for image steganography based on image characteristics. Journal of Optoelectronics·laser. https://www.researchgate.net/publication/288164492_Cover_selection_for_image_steganography_based_on_image_characteristics
Ridzuan, F., Taqiyuddin Anas, & Sakinah Ali Pitchay. (2024). Cover selection in steganography: A systematic literature review. Journal of Advanced Research in Applied Sciences and Engineering Technology, 107–129. https://doi.org/10.37934/araset.52.2.107129
Sajedi, H., & Jamzad, M. (2009). Secure cover selection steganography. In J. H. Park, H.-H. Chen, M. Atiquzzaman, C. Lee, T. Kim, & S.-S. Yeo (Eds.), Advances in Information Security and Assurance (Vol. 5576, pp. 317–326). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_33
Subhedar, M. S. (2021). Cover selection technique for secure transform domain image steganography. Iran Journal of Computer Science. https://doi.org/10.1007/S42044-020-00077-9
Vabalas, A., Gowen, E., Poliakoff, E., & Casson, A. J. (2019). Machine learning algorithm validation with a limited sample size. PLOS ONE, 14(11), e0224365. https://doi.org/10.1371/journal.pone.0224365
Wang, Z., Li, S., & Zhang, X. (2019). Towards improved steganalysis: When Cover selection is used in steganography. IEEE Access, 7, 168914–168921. https://doi.org/10.1109/ACCESS.2019.2955113
Wang, Z., Zhang, X., & Qian, Z. (2020). Practical cover selection for steganography. IEEE Signal Processing Letters, 27, 71–75. https://doi.org/10.1109/LSP.2019.2956416
Wu, H.-Z., Wang, H.-X., & Shi, Y.-Q. (2016). Can machine learn steganography? - Implementing LSB substitution and matrix coding steganography with feed-forward neural networks (arXiv:1606.05294). arXiv. http://arxiv.org/abs/1606.05294
Wu, S., Liu, Y., Zhong, S., & Liu, Y. (2015). What makes the stego image undetectable? Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 1–6. https://doi.org/10.1145/2808492.2808539
Ye, D., Jiang, S., & Huang, J. (2019). Heard more than heard: An audio steganography method based on GAN. ArXiv. https://www.semanticscholar.org/paper/1c33d4d27728d1b9f4589e04ab5a26cf1e961a30
Yuan, J., & Chen, H. (2014). Embedding Suitability Adaptive Cover Selection for Image Steganography: 2014 International Conference on e-Education, e-Business and Information Management (ICEEIM 2014), Shanghai, China. https://doi.org/10.2991/iceeim-14.2014.11