Image Hiding in an Audio File Using Chaotic Method via Genetic Algorithm

Authors

  • Azhar Kadim Al-Nahrain University

Keywords:

Image hiding, Audio signal, Chaotic map, Genetic Algorithm

Abstract

Information security is one of the most important parts of information technology and communication in the modern world. Information security has gained a lot of attention recently due to the need to transmit information through global communication channels and through the Internet. In this research, the genetic algorithm is used to develop the chaotic maps that are randomly generated by the chaotic system to find the best map by which the locations of image data are inferred to be hidden in the audio. An average image size of 64×64 pixels is used to be hidden in an audio recording of 7 seconds duration at average resolution specifications. The results show that one of the chaotic maps created at the 739 generations is the best in determining image byte hiding locations in the high-frequency band of the audio. The quality measures show the cover audio that includes the hidden image is not much different from the original input one. This confirms the validity of the proposed method and the good selection of hiding locations in accordance with information security concepts.

References

El-Khamy, S.E.; Korany, N.O.; Mohamed, A.G.; ”A New Fuzzy-DNA Image Encryption and Steganography Technique”. IEEE Access, 8: 148935–148951, 2020.

Ghanbari-Ghalehjoughi, H.; Eslami, M.; Ahmadi-kandjani, S.; Ghanbari-Ghalehjoughi, M.; Yu, Z.; “Multiple layer encryption and steganography via multi-channel ghost imaging”. Opt. Lasers Eng., 134: 106227, 2020.

Liu, H.; Sun, X.; Zhang, Y.; Wang, Y.; "An adaptive color image steganography scheme based on nonsubsampled contourlet transform and chaotic mapping"; JAIHC, 12(4): 3471-3485, 2021.

Kaur, P.; Kundra, H.; "A robust and secure image steganography using adaptive genetic algorithm-based key generation". Multimed. Tools. Appl., 80(17): 24945-24968, 2021.

Zenati, A.; Ouarda, W.; Alimi A.; “SSDIS-BEM: a new signature steganography document image system based on beta elliptic modeling”. Eng. Sci. Technol. Int. J., 23(3): 470–482, 2020.

Malik, A.; Sikka, G.; Verma, H.K.; “A high capacity text steganography scheme based on LZW compression and color coding”. Eng. Sci. Technol. Int. J., 20(1): 72–79, 2017.

Biswas, R.; Mukherjee, I.; Bandyopadhyay, S.K.; “Image feature based high capacity steganographic algorithm”. Multim. Tools Appl., 78 (14): 20019–20036, 2019.

Liu, H.; Wang, X.; “Color image encryption using spatial bit-level permutation and high-dimension chaotic system”. Opt. Commun., 284: 3895–3903, 2011.

Yu, F.; Chen, H.; Kong, X.; Yu, Q.; Cai, S.; Huang, Y.; Du, S.; “Dynamic analysis and application in medical digital image watermarking of a new multi-scroll neural network with quartic nonlinear memristor”. Eur. Phys. J. Plus, 137: 434, 2022.

Zhu, Y.; Wang, C.; Sun, J.; Yu, F.;” A Chaotic Image Encryption Method Based on the Artificial Fish Swarms Algorithm and the DNA Coding”. J. Math, 11(3): 767, 2023.

Huang, Y.F.; Lin, T.C.; Wu, H.S.; "Chaos-based image steganography: A review". IEEE Access, 8: 33519-33537, 2020.

Gao, Y.; Liu, L.; Deng, L. ;"A review of chaos-based image encryption and steganography". Nonlinear Dyn., 99(2): 1215-1237, 2020.

Xu, Z.; Zhou, Q.; Sun, L.; "Chaotic oscillator-based image encryption: A review". Nonlinear Dyn., 94(1): 1-21, 2018.

Yu, L.; Zhao, Y.; Ni, R.; Li, T.; "Improved adaptive LSB steganography based on chaos and genetic algorithm". EURASIP J. Adv. Signal Process., 2010: 2010.

Jaradat, A.; Taqieddin, E.; Mowafi, M.; "A high-capacity image steganography method using chaotic particle swarm optimization". Secur. Commun. Netw., 2021: 1-11, 2021.

Al-Dabbagh, R.D.H.; “Compact Genetic Algorithm for Cryptanalysistrapdoor 0-1 Knapsack Cipher”. ANJS, 12(2):137-145, 2018.

Kadhim, N.; “Breaking Knapsack Cipher Using Population Based Incremental Learning”. ANJS, 14(2): 199-206, 2011.

Gu, X.; Sun, Y.; “Image transformation and information hiding technology based on genetic algorithm”. EURASIP JIVP, 2018.

Shah, D.; Rajankumar, S.; "Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure". Eng. Sci. Technol. Int. J., 24(3): 782-794, 2021.

Hasan, N.; Kadim, A.; Jaber, H.; Alnajjar, A.; Altaei, M.; ”Image hiding in audio file using chaotic method”. Period. Eng. Nat. Sci., 11(3): 245-254, 2023.

Hasan, N.; Al-Mukhtar, F.; Ali, E.; ”Encrypt Audio File using Speech Audio File As a key”. IOP Conf. Ser.; Mater. Sci. Eng., 928(3): 032066, 2020.

Al-Kateeb, Z.; Shamdeen, M.; Al-Mukhtar, F.; "Encryption and Steganography a secret data using circle shapes in colored images.". J. Phys. Conf. Ser. 1591(1): 012-019, IOP Publishing, 2020.

Lu, H.; Wang, X.; Fei, Z.; Qiu, M.; ”The effects of using chaotic map on improving the performance of multiobjective evolutionary algorithms”. Math. Probl. Eng. 2014, 2014.

Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T.; “A fast and elitist multiobjective genetic algorithm: NSGA-II”. IEEE Trans. Evol. Comput., 6(2): 182–197, 2002.

May, R.; “Simple mathematical models with very complicated dynamics”; Springer,New York, NY, USA, 85–93, 2004.

Downloads

Published

2023-09-18

Issue

Section

Articles

How to Cite

[1]
“Image Hiding in an Audio File Using Chaotic Method via Genetic Algorithm”, ANJS, vol. 26, no. 3, pp. 34–43, Sep. 2023, Accessed: May 11, 2024. [Online]. Available: https://anjs.edu.iq/index.php/anjs/article/view/2580