SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 6, December 2020, pp. 5726~5735
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i6.pp5726-5735 ๏ฒ 5726
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Hiding text in speech signal using K-means,
LSB techniques and chaotic maps
Iman Qays Abduljaleel, Amal Hameed Khaleel
Department of Computer Science, Basrah University, Iraq
Article Info ABSTRACT
Article history:
Received Mar 20, 2020
Revised May 8, 2020
Accepted May 22, 2020
In this paper, a new technique that hides a secret text inside a speech signal
without any apparent noise is presented. The technique for encoding
the secret text is through first scrambling the text using Chaotic Map, then
encoding the scraped text using the Zaslavsky map, and finally hiding
the text by breaking the speech signal into blocks and using only half of each
block with the LSB, K-means algorithms. The measures (SNR, PSNR,
Correlation, SSIM, and MSE) are used on various speech files (โ€œ.WAVโ€),
and various secret texts. We observed that the suggested technique offers
high security (SNR, PSNR, Correlation, and SSIM) of an encrypted text with
low error (MSE). This indicates that the noise level in the speech signal is
very low and the speech purity is high, so the suggested method is effective
for embedding encrypted text into speech files.
Keywords:
Choatic maps
K-Means clusters
LSB technique
Steganography
Zaslavsky map Copyright ยฉ 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Amal Hameed Khaleel,
Department of Computer Science,
Basrah University,
Basrah, Iraq.
Email: amal_albahrany@yahoo.com
1. INTRODUCTION
In the modern digital communication age, information privacy is a huge concern. There are two
essential areas for ensuring information security: encryption and hiding of information. As security needs
increase, encryption alone is not sufficient, so hiding is also supplementary to encryption in security property [1].
Encryption is a system which transforms a message from a readable form into an unreadable form using
a certain key, and the secret text can only be effectively isolated by a recipient who has the secret key [2, 3].
Hiding information is a method that hides sensitive information inside the media of an information
carrier in a way that only senders and recipients who know about it can unlock. Steganography is one of these
hidden data transformation techniques that is popularly employed [4]. Steganography is governed by four key
elements: secret data, carrier file, type of carrier file, capacity carrier file [5]. In audio steganography
the human auditory system's weakness is used to hide data in the audio, because the human ear cannot
discriminate the small difference between the original file and the altered one [6]. Speech is a special case of
audio signals which is distinguished in terms of spectral bandwidth, signal continuity, and intensity
distribution [7]. Speech steganography is a particular challenge. In this paper, a speech file is selected as
a carrier medium, and a text message is hidden within it; the secret text is encoded through the use of text
scrambling using a Chaotic Map, and the scraped text is encoded using the Zaslavsky map, then the encoded
text is hidden inside a speech signal using the LSB, K-means algorithms. The proposed algorithm has
the advantages of increased capacity and protection. The proposed embedding technique did not change
the original file size, so with the proposed method the data are difficult to extract.
The LSB encoding method means the Least Significant Bits of the audio sample are replaced with
the hidden message bits, as the original audio has no effect [8]. The choice of pixels or the order of
embedding capacity may be determined by a stego-key [9]. K-means clustering, which is a data mining
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Hiding text in speech signal using K-means, LSB techniques and chaotic maps (Iman Qays Abduljaleel)
5727
technique that divides or groups n items into groups of k, where k is chosen according to the number of
groups needed. In the case of K-means, centroids represent the mean vectors [10]. The Zaslavsky Map is
a nonlinear dynamic method of discrete-timentroduced by George M Zaslavsky. It exhibits deterministic
dynamic behaviour, which is an integral part of the algorithms for contemporary data encryption [11].
A quantum logistic map is suggested by Goggin et al., [12]. Quantum chaos is based on the quantum system
displaying chaotic dynamics within a given range. The very lowest-quantum corrections cause additive noise
and quantum chaos, so the advantage of chaotic encryption is high-level security [13]. Several previous
works were designed to perform data hiding including the Echo hiding method [14], Phase and amplitude
coding methods [15].
In [16], the proposed method for LSB encoding in multiple layers is by using the bitwise operation,
meaning two message bits are embedded at a time into audio cover to increase the robustness and capacity.
In [17], the proposed technique enhances protection, where each hidden bit of information is placed in
the selected audio media cover location. The embedding location is selected based on upper 3MSB bits of
cover media. [18] proposes the enhanced technique of LSB with human detection as a key generator to
extract a secret message from the video cover file and describe the location of the message. In [19], a new
technique hides a secret text within a cover audio file using modulus function-based uint 8. In [20],
the proposed IAMM scheme exploits the DWT properties to achieve efficient speech watermarking of
the blind. Second level approximation and detail coefficients with appropriate intensity were chosen for
the embedding of information bits, and synchronisation codes for the watermarking process, respectively.
Bandi and Reddy [21] suggests encrypting the secret text message and concealing it in the cover audio, using
a combination of DCT coefficient and AES encryption method to provide data protection. Chowdary [22]
uses a different approach for data hiding in speech signals, with a unique key which contains a ten-digit
number within a speech signal for better security. Ahmed [23] suggests an algorithm using pixel value gauge
technology to mask the confidential message in the cover picture's most significant bits (MSBs).
In [24] the proposed encrypted data and address information is used to locate the next pixel, using
the Fisher-Yates Shuffle algorithm. In [25], the proposed technique embeds English text into the wave audio
using tone insertion method, which generates two frequency f1 and f2 and inserts them into an audio file in
a suitable power level according to the specific stego-table. In [26] steganography of image is suggested
using LSB and secret map techniques. The study is based on the principle of random insertion and the select
of a pixel from a host image. Applying 3D chaotic charts, Chebyshev, and 3D logistic maps performs
the technique.
The remainder of this paper is organised as follows: section 2 gives details of the general algorithms
for the suggested method. Section 3 shows the experimental results and simulation. Conclusions and future
work are presented in Section 4.
2. RESEARCH METHOD
The proposed algorithm of three stages:
๏€ญ Scrambling text algorithm: it depends on the repetition of splitting a text consisting of bits into blocks,
and using the quantum chaotic map on the resulting blocks. We repeat this process until the length of
the block reaches 8 bits. The benefit of extending the circuit of the scrambling from small blocks to larger
blocks is to scramble the text sites more than once
๏€ญ Encryption algorithm: it uses the Zaslavsky Map, which includes converting the ciphertext from
fractional values to integer values and then converting these values into bits. After that it applies the XOR
operation between the keys generated by using the Zaslavsky algorithm and the ciphertext bits.
๏€ญ Hiding algorithm: it hides the bits of encoded text in the speech signal. We divided the sound into blocks
and we used only one part of each block, which was divided into two parts, then we used the K-means
algorithm to produce an index key that represents the locations through which we hid the bits of text in
the speech signal. The LSB algorithm was also used to choose the sites of speech that it hides.
Thus, the proposed algorithm is more sophisticated and secure, and in this way, any hackers of the speech
signal will not be able to recognise the hidden text. The proposed algorithm is shown in Figure 1.
2.1. Proposed chaotic scrambling bits algorithm
This algorithm increases resistance against attacks by supplying extra security with the help of
a private key. The idea of our algorithm to generate the scrambling bits consists of the following steps:
๏€ญ Read the text file.
๏€ญ Convert the text file symbols from symbolic to ASCII.
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5726 - 5735
5728
๏€ญ Convert the ASCII symbols to binary representation (zero and one) and store them in a vector with
a length M, which represents the number of bits of the entered text; e.g., letter A=065 ASCII
value=01000001 Binary value.
๏€ญ Divide the result vector into blocks and each block with a length of n (n=8 initially).
๏€ญ If Mod (vector of length m/n)=0 then go to the next step. Otherwise, keep the remainder of the vector
text (Mod (vector of length m/n)=z ) in the last block generation with length (z) without adding zeroes.
This step of the algorithm distinguishes our research, since we depend on the original length of the text
without additions. Thus, the processing time decreases, so we do not need additional time or a large
memory.
๏€ญ Generate sequences of keys using a chaotic map, where the number of sequences is equal to the number
of blocks, and the length of each sequence is equal to (n). Also, if the length of the last block is less than
(n), then we create a sequence of keys with the length of the last block.
๏€ญ For each block with length (n) do the following:
๏€ญ Generate a sequence of keys using the chaotic quantum logistic map equation [12] as follows:
๐‘ฅ ๐‘›+1 = ๐‘Ÿ (๐‘ฅ ๐‘› โˆ’ | ๐‘ฅ ๐‘› |)2
โˆ’ ๐‘Ÿ๐‘ฆ๐‘›, (1)
๐‘ฆ ๐‘›+1 = โˆ’๐‘ฆ๐‘› ๐‘’โˆ’2๐›ฝ
+ ๐‘’โˆ’๐›ฝ
๐‘Ÿ[(2 โˆ’ ๐‘ฅ ๐‘› โˆ’ ๐‘ฅ ๐‘›
โˆ— )๐‘ฆ๐‘› โˆ’ ๐‘ฅ ๐‘› ๐‘ง ๐‘›
โˆ—
โˆ’ ๐‘ฅ ๐‘›
โˆ—
๐‘ง ๐‘›], (2)
๐‘ง ๐‘›+1 = โˆ’๐‘ง ๐‘› ๐‘’โˆ’2๐›ฝ
+ ๐‘’โˆ’๐›ฝ
๐‘Ÿ[2(1 โˆ’ ๐‘ฅ ๐‘›
โˆ— )๐‘ง ๐‘› โˆ’ 2๐‘ฅ ๐‘› ๐‘ฆ๐‘› โˆ’ ๐‘ฅ ๐‘›]. (3)
where X1=0.39, Y1=0.004, Z1=0.002, X*=0.0018, Z*= 0.0039, ฮฒ =4.46, r=3.89,
x๏ƒŽ[0,1], x*=x, y ๏ƒŽ[0,0.1], z๏ƒŽ[0,0.2], z*=z, ๏ข๏ƒŽ[6,๏‚ฅ), and r ๏ƒŽ[0,4].
๏€ญ If the length of the sequence bit of the key is not satisfied (meaning not equal to n), go back to Step (a)
๏€ญ If the last block with length (z) is equal to length (n), use the sequence bit of key that results from
Step (b), otherwise generate a sequence bit of key equal to length (z) using (1) in Step (7-a)
๏€ญ Re-arrange all keys in each block in ascending order
๏€ญ Re-order the bits of each block whose number is (n), according to the order of the values of the bit keys
that we have arranged while keeping the original value index
๏€ญ Combine the blocks in a single vector with a length of (m)
๏€ญ Calculate n=n * 2
๏€ญ Test the length of the vector=(m div new n); if greater than (8bits), go back to Step (5).
๏€ญ Convert each 8bits of vector to ASCII symbols, after that convert it to the characters of the text that are
used in the next stage (text encryption)
Figure 1. The General Structure of proposed model
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Hiding text in speech signal using K-means, LSB techniques and chaotic maps (Iman Qays Abduljaleel)
5729
2.2. Proposed zaslavsky text encryption algorithm
In this algorithm, for enhanced security the scrambling text is encrypted using random numbers
generated using the Zaslavsky map before hiding it inside a speech signal. The idea of our algorithm to
encrypt text consists of the following steps:
๏€ญ Read the scrambling text file
๏€ญ Convert the scrambling text file symbols from their symbolic form to ASCII symbols
๏€ญ Convert the ASCII symbols to the binary representation (zero and one) and store them in a vector of
length (M), which represents the number of bits of the entered scrambling text.
๏€ญ Generate Zaslavsky keys with the length of the symbolic bits (m) using equation [11] as the following:
๐‘ฅn+1 = mod ( ๐‘ฅ ๐‘› + v(1 + ยต ๐‘ฆ๐‘› ) + ิ‘ v ยต cos (2 ฯ€๐‘ฅ ๐‘›), 1) (4)
๐‘ฆ ๐‘›+1 = ๐‘’โˆ’๐‘Ÿ
(๐‘ฆ๐‘› + cos(2ฯ€๐‘ฅ ๐‘›)) (5)
and ยต =
1โˆ’๐‘’โˆ’๐‘Ÿ
๐‘Ÿ
(6)
where v, r, ิ‘ are control parameters, and e is exponentiation. The key set for the Zaslavsky map is
{x0, y0, v, r, ิ‘}. Commonly used values for the parameters are: x0=0.12, y0=0.13, v=0.2, r=5, e=0.3, ิ‘= 9.
๏€ญ Convert Zaslavsky from fractional values to integer values
๏€ญ Convert the values to a binary representation at 8bits for each numeric value
๏€ญ Make an XOR operation between every 8bits of the key value and the text value
๏€ญ Convert the text from a binary system to ASCII, then to characters, and save it in a text file for the purpose of
hiding it
2.3. Proposed embedd K-means algorithm
In our work, to get increased security and accurate results we used the K-means clustering
technique, which mainly consists of the following steps:
๏€ญ Use the K-means algorithm on the matrix to divide it into 128 clusters,
๏€ญ Use the index of each cluster in the index vector (128 values) to embed the binary text data in each first
part of the speech block
๏€ญ Store the encoded text vector, whose length is (m) in the first 128 bits of the first block of the original
speech signal, according to the sequence that we obtained from K-means, to arrange the values from 1-128
๏€ญ Begin from the second block of the speech signal, and only embed on the first part of each block
according to the index of the K-means algorithm
2.4. Proposed advance LSB embedding algorithm
The average bit replacement must not exceed 50% of the bit length into the original speech signal,
i.e. bit-length of N will affect only (n/2) bits of the host audio to produce Stegano Speech. The steps for
embedding using Least Significant Bit (LSB) algorithm are as follows:
๏€ญ Read the input speech signal in ".WAV" format and the scrambling text file.
๏€ญ Divide the original speech signal into blocks (each block contains 256 values)
๏€ญ Divide each block into two parts (each part has 128 values)
๏€ญ Take the second part of the first blocks (1-128) of the speech signal, i.e. from each block, we take
the values from 129-256, to create a two-dimensional matrix of 128 blocks, where each block has 128
values. Because ".WAV" documents has two parts, the header and the information, and the header is in
the initial 44 bytes of the document, the first bits contain little data and the embedding is clear.
In contrast, the last bits contain much data and embedding it is not known.
๏€ญ Use the proposed embed K-means algorithm on the resulting matrix to embed text vector.
๏€ญ Use a function (float2bin) to convert the values of speech signal files from their fractional form to their
binary form using 64 bits, because the values in the speech signal file are characterised by their fractional form.
๏€ญ Cut the eight bits from allocation 17 to 24 of the 64 bits for each binary number, and then apply to
the LSB algorithm that hides the data in the last bit (b1 ), where it does not correlate with the original
values and the form of the bits is as follows: b8 b7 b6 b5 b4 b3 b2 b1 where the bits (b8 b7 b6 b5) are
MSB and bits (b4 b3 b2 b1) are LSB
๏€ญ Test the MSB data by apply two relationships:
๏€ญ First relationship:
If Xor (b8, b6)=Xor (b7, b5) then change the value of b1 by doing the following
Xor (Xor (b8, b6), TextBi) the result insert in b1
Where TextBi is the bit for the text vector of length (m) to hide
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5726 - 5735
5730
This method makes it difficult to discover the original decoding values. This is one of the strengths
of our algorithm.
๏€ญ Second relationship:
If Xor (b8, b6) <> Xor (b7, b5) then change the value of b1 by doing the following
Xor (Xor (b7, b5), TextBi) the result insert in b1
Here there is the same idea, but with no equal Xor values, so it is difficult to retrieve because
the sites will differ.
๏€ญ Re-combine the eight bits cut out within the 64 bits after hiding the text data.
๏€ญ Convert the 64 bits from their binary into a fractional number to return the values of the input speech
signal
๏€ญ Repeat steps (5-10) for all 128 values in each speech signal block, which is used on all bits of the encoded
text vector that we want to hide
๏€ญ Combine the speech signal blocks in a single vector that represents the resulting speech signal vector after
the embedding process.
๏€ญ Put the length of the text to be hidden into the last block of the speech signal, so that the recipient can
know the length of the secret text. It is necessary for the recipient to know the last bit of text that is
collected in order to retrieve the text from the speech signal.
3. RESULTS AND DISCUSSIONS
To evaluate the performance of the suggested technique, 21 (โ€œ.WAVโ€) English speech samples were
used. Each audio file is a single-channel 16-bit PCM WAV with a sample rate of 22050 Hz whose duration
ranges from four to ten seconds as a cover, and four text messages (.txt) of different lengths. The proposed
technique was tested using a PC with the following properties: Pentium Intel (R) Corei7, CPU@2.60 GHz
processor, 6.00 GB RAM, 64-bit Windows 10 operating system; and MATLAB R2018b software is
the implementing and efficiency evaluation tool. We used (โ€œ.WAVโ€) audio file type as a cover file for
the purpose of hiding data because it includes high data redundancy and its format is not subjected to any
type of compression which allows higher data capacity to be hidden, so we used an LSB algorithm which
depends on redundancy for hiding data.
The five measures: signal to noise ratio (SNR), Peak Signal to noise ratio (PSNR), correlation,
structural similarity index metric (SSIM), and mean square error (MSE), are used. We used the SNR measure
because it can show the quantity of noise in the signal for audio medium, PSNR because it shows
the robustness of the proposed method, Correlation and SSIM used as quality metrices of strong
interdependencies in the speech, and MSE to prove the algorithm reliability of the conveyed data, which must
have a high retrieval rate and low error rate. The subsequent equations compute SNR, PSNR, MSE, where:
๐‘†๐‘๐‘… = 10 ๐‘™๐‘œ๐‘”10 (
โˆ‘ ๐‘œ(๐‘–)2๐‘›
๐‘–=1
โˆ‘ (๐‘œ(๐‘–)โˆ’๐‘ (๐‘–))
2๐‘›
๐‘–=1
) (7)
๐‘ƒ๐‘†๐‘๐‘… = 10๐‘™๐‘œ๐‘”10 [
max(๐‘œ(๐‘–),๐‘ (๐‘–))2
๐‘Ž๐‘๐‘ (๐‘œ(๐‘–)โˆ’๐‘ (๐‘–))2] (8)
๐‘€๐‘†๐ธ = 10๐‘™๐‘œ๐‘”10 โˆ‘ โˆ‘
(๐‘œ(๐‘–)โˆ’๐‘ (๐‘–))
2
๐‘€โˆ—๐‘
๐‘›
๐‘–=1
๐‘š
๐‘–=1 (9)
๐ถ ๐‘œ๐‘  =
โˆ‘ (๐‘œ ๐‘–โˆ’ยต ๐‘œ).(๐‘ ๐‘–โˆ’ยต ๐‘ 
๐‘›
๐‘–=1 )
[ โˆ‘ (๐‘œ ๐‘–โˆ’ยต ๐‘œ)
2๐‘›
๐‘–=1 ]
1
2โ„ [ โˆ‘ (๐‘ ๐‘–โˆ’ยต ๐‘ )
2๐‘›
๐‘–=1 ]
1
2โ„
(10)
๐‘†๐‘†๐ผ๐‘€(๐‘‚, ๐‘†) =
(2ยต ๐‘œยต ๐‘ +๐‘1)(2๐œŽ ๐‘œ๐‘ +๐‘2)
(ยต0
2+ยต ๐‘ 
2+๐‘1)(๐œŽ0
2+๐œŽ๐‘ 
2+๐‘2)
ร— 100 (11)
where:
n and m are the numbers of rows and columns in cover audio file input signals
o is the sample with index number in the original audio file
s is the sample with index number in the stego audio file
ยต ๐‘œ and ยต ๐‘  are the meam values of o and s respectively
๐œŽ๐‘œ and ๐œŽ๐‘  are the standard deviation values of o and s respectively
C1=(k1L)2
, and C2=(k2L)2
are two constants used to avoid null denominator
k1=0.01 and k2=0.03 by default
L is the dynamic range of the signal values (typically this is 2# bits per signal
-1).
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Hiding text in speech signal using K-means, LSB techniques and chaotic maps (Iman Qays Abduljaleel)
5731
The results of the analysis showed that the longer the text message, the greater the MSE and
the smaller the PSNR, and the noise rate is reduced. It can be noted from the outcome of the measures that
the square error (MSE) of the proposed method is very small, which means no noise, and no difference
between the cover speech and stegano speech. The suggested algorithm consists of three stages: scrambling
text, encryption text and hide algorithm.
Example of the proposed algorithm:
๏€ญ Scrambling text stage: Figure 2 shown the text input and text after the scrambling algorithm
Text input: My Name IMAN QAYS. I LOVE My COUNTRY IRAQ VVVVVery Much.
Scrambling text stage result:
'รกยฎโ€šยฐhz(6โ€ฐAร‰1!ยจ"#(. VZ3ร„ s$<Sโ€˜โ€ขรŽ$ยนร€8@ยฉ*{)e1M ยฒรต-โ„ข'
๏€ญ Encryption text stage: We can notice that Figure 3 shows the output of the encryption text
Input: the output of the scrambling stage
Output encrypted text stage result: 'aยฎยฏยฒยกร‘ยฆยกโ‚ฌ }ร„รชรฅร–รฐ5xร‘^1Hร9ร“uรฃยทยฉโ€ฆR-โ‚ฌ รงรHโ€ขโ€“ยปaยฒFยฎ?0โ€บxร'
๏€ญ Hide text stage result: Figure 4 shows the time waveform of the (speech1.wav) signal original before and
after embedded (Txt3.txt) file, and the differences between them and it can be seen that the differences
are very small using the method proposed.
The outcomes of the performance of the proposed algorithm which hides the text into a speech
signal is shown as Tables 1 and 2. Table 1 shows the comparative analysis for Speech1, Speech2, and
Speech3 using the existing algorithms in [17,1] and the proposed algorithms. Corresponding graphs are
shown in Figures 5 and 6. Table 2 displays the measured result using SNR, PSNR, Correlation, SSIM, and
MSE to evaluate the quality of speech before and after the texts were inserted. In Figure 7, the graphs are
shown when embedding capacity increases, SNR, PSNR, Correlation, and SSIM decrease while MSE increases.
The different performance results are dependent on different lengths of the text message.
Those findings indicate that the lower the MSE value and the higher of SNR, PSNR, Correlation, SSIM values,
the better the stego-speech signal output. Whereas the correlation and SSIM values closed to +1, which
means a high relationship between the original speech signal and the stego speech signal. Table 1 shows
the SNR MES and PSNR values for different speech signal files and different text files after
the steganography process.
(a)
(b)
Figure 2. Scrambling text stage, (a) Before scrambling process, (b) after scrambling process
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5726 - 5735
5732
(a)
(b)
Figure 3. Encryption text stage, (a) Before encryption process, (b) after encryption process
(a) (b)
Figure 4. Hide text stage result, (a) Before embedding process, (b) after embedding process
Table 1. SNR MES and PSNR values for different speech signal files and
different text files after the steganography process
Speech
signal file
name
Capacity
(Bytes)
Input
Text
Data
Embedded
(Bytes)
Existing Algorithm
in [17]
Existing Algorithm
in [1]
Proposed Algorithm
SNR PSNR SNR PSNR SNR PSNR MSE
Speech1.wav 443926 Txt1.txt 323 84.653 140.745 87.725 144.198 254.4630 142.2155 2.6654e-09
Txt2.txt 836 83.303 139.776 85.41 142.214 196.4086 113.1883 2.1305e-06
Txt3.txt 4931 78.782 134.959 79.074 135.584 176.7201 103.3441 2.0554e-05
Txt4.txt 28959 74.78 131.267 75.054 131.527 162.1293 96.0486 1.1027e-04
Speech2.wav 571258 Txt1.txt 323 87972 144.771 89.914 147.483 257.0360 143.6621 2.4582e-09
Txt2.txt 836 86.403 144.391 87.93 145.499 197.5288 113.9085 2.3226e-06
Txt3.txt 4931 80.751 138.37 81.26 138.828 178.7935 104.5409 2.0079e-05
Txt4.txt 28959 9139 134.569 77.231 134.799 163.6060 96.9471 1.1538e-04
Speech3.wav 900412 Txt1.txt 323 9053 150.934 93.865 153.41 261.4467 145.7098 2.4180e-09
Txt2.txt 836 84.915 149.89 91.881 151.425 202.9425 116.4577 2.0355e-06
Txt3.txt 4931 80.99 144.459 85.205 144.149 182.7941 106.3835 2.0706e-05
Txt4.txt 28959 84.653 140.53 81.166 140.71 167.7983 98.8856 1.1638e-04
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Hiding text in speech signal using K-means, LSB techniques and chaotic maps (Iman Qays Abduljaleel)
5733
Table 2. stego-speech signal performances dependent on the length of text message
Speech signal
file Duration
Message length Performance Testing
SNR PSNR Correlation SSIM MSE Success rate extraction %
10 ms
5 character 329.1504 187.8378 1 1 3.6415e-14 100%
15 character 315.7006 181.1129 1 1 1.7131e-13 100%
30 character 250.7466 148.6359 0.9999 0.9998 3.0302e-10 100%
50 character 221.1720 133.8485 0.9999 0.989 9.1245e-09 100%
75 character 213.8950 130.2101 0.9999 0.9888 2.1089e-08 100%
7 ms
5 character 301.4127 175.2949 1 1 4.6035e-13 100%
15 character 292.2016 170.6893 0.9985 0.9977 1.3294e-12 100%
30 character 226.0696 137.6233 0.9974 0.9899 2.6931e-09 100%
50 character 200.6336 124.9054 0.9965 0.9888 5.0355e-08 100%
75 character 189.1652 119.1711 0.9955 0.9888 1.8857e-07 100%
4 ms
5 character 263.8449 154.7290 1 1 3.1073e-11 100%
15 character 251.0597 148.3364 0.9985 0.9977 1.3541e-10 100%
30 character 224.7936 135.2033 0.9981 0.9899 2.7858e-09 100%
50 character 210.3435 127.9783 0.998 0.9875 1.4705e-08 100%
75 character 205.2477 125.4303 0.9975 0.9899 2.6439e-08 100%
Figure 5. Corresponding graphs, (a) SNR analysis for Speech1,
(b) SNR analysis for Speech2, (c) SNR analysis for Speech3
Figure 6. Corresponding graphs, (a) PSNR analysis for Speech1,
(b) PSNR analysis for Speech2, (c) PSNR analysis for Speech3
(a) (b)
(c)
(c)
(a) (b)
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5726 - 5735
5734
Figure 7. Graphs, (a) Analysis of the relation between the SNR, PSNR and the embedding text capacity,
(b) analysis of the relation between the Correlation, SSIM and the embedding text capacity,
(c) analysis of the relation between the MSE and the embedding text capacity
4. CONCLUSION
The main objective of our suggested method, which involves embedding textual information in wave
audio when transferred over the internet, is to provide efficient and secure encryption by using a more
complicated algorithm, hence hard-to-break. In this paper, a new algorithm of hiding text in the speech signal is
proposed. The proposed algorithm consists of a scrambling text file using a quantum chaotic map, and an
encrypting scramble text file using the Zaslavsky map; then, implementing the LBS algorithm using K-means
indexing to hide the encrypted text file into a speech signal. This approach produces good results with a hidden
text message that cannot be detected, or at least it cannot be recovered if it is detected. The results indicate that
even after embedding the hidden message, the size of the speech file remains the same. This algorithm was
applied to the same speech file to embed multiple text files with different sizes of text content and vice versa.
Good results were obtained, without losing the text message or noticing any noise in the cover file. In the future,
the method could be applied to domains other than speech, such as music and video.
REFERENCES
[1] S. P. Rajput, et al., โ€œAn efficient audio steganography technique to hide text in audio,โ€ Int. Conf. Comput. Commun.
Control Autom., pp. 1-6, 2017.
[2] H. A. Abdullah, and H. N. Abdullah, โ€œFPGA implementation of color image encryption using a new chaotic map,โ€
Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 1, pp. 129-137, 2019.
[3] I. U. W. Mulyono, et al., โ€œEncryption of Text Message on Audio Steganography Using Combination Vigenere
Cipher and LSB (Least Significant Bit),โ€ Kinet. Game Technol. Inf. Syst. Comput. Network, Comput. Electron.
Control, vol. 4, no. 1, pp. 63-74, 2018.
[4] A. B. W. Putra, et al., โ€œSteganography for Data Hiding in Digital Audio Data using Combined Least Significant Bit
and 4-Wrap Length Method,โ€ Proc. 2nd East Indones. Conf. Comput. Inf. Technol. Internet Things Ind. EIConCIT
2018, pp. 336-339, 2018.
[5] Y. Bassil, โ€œAudio Steganography Method for Building the Deep Web,โ€ American Journal of Engineering Research
(AJER), no. 5, pp. 45-51, 2019.
[6] M. Mustafa, et al., โ€œA Novel Enhanced LSB Algorithm for High Secure Audio Steganography,โ€ 10th Comput. Sci.
Electron. Eng. Conf. CEEC 2018 - Proc., pp. 125-130, 2019.
[7] Y. Xue, et al., โ€œRobust speech steganography using differential SVD,โ€ IEEE Access, vol. 7, pp. 153724-153733, 2019.
[8] J. Hashim, et al., โ€œLSB Modification based Audio Steganography using Advanced Encryption Standard (AES-256)
Technique,โ€ 12th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics,
MACS 2018 - Proceedings, pp. 1-6, 2019.
[9] P. Bhattacherjee, et al., โ€œA review of Steganography techniques suitable for ECG signal,โ€ Conference:
International Conference on Emerging Technologies for Sustainable Development (ICETSD '19), vol. 6, 2019.
[10] B. Pillai, et al., โ€œImage steganography method using K-means clustering and encryption techniques,โ€ 2016 Int.
Conf. Adv. Comput. Commun. Informatics, ICACCI 2016, pp. 1206-1211, 2016.
(a) (b)
(c)
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Hiding text in speech signal using K-means, LSB techniques and chaotic maps (Iman Qays Abduljaleel)
5735
[11] F. J. Farsana and K. Gopakumar, โ€œA Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random
Number Generator,โ€ Procedia Comput. Sci., vol. 93, pp. 816-823, 2016.
[12] A. Akhshani, et al., โ€œPseudo random number generator based on quantum chaotic map,โ€ Commun. Nonlinear Sci.
Numer. Simul., vol. 19, no. 1, pp. 101-111, 2014.
[13] H. Liu, et al., โ€œA novel quantum image encryption algorithm based on crossover operation and mutation operation,โ€
Multimed. Tools Appl., vol. 78, no. 14, pp. 20465-20483, 2019.
[14] wang yunlu, et al., โ€œSteganalysis on positive and negative echo hiding based on skewness and kurtosis,โ€ 9th IEEE
Conference on Industrial Electronics and Applications, pp. 1235-1238, 2014.
[15] Kamesh and N. S. Priya, โ€œA survey of cyber crimes Yanping,โ€ Secur. Commun. Networks, vol. 5, pp. 422-437, 2012.
[16] B. Datta, et al., โ€œRobust multi layer audio steganography,โ€ 12th IEEE Int. Conf. Electron. Energy, Environ.
Commun. Comput. Control (E3-C3), pp. 1-6, 2016.
[17] S. Jadhav and A. M. Rawate, โ€œA new audio steganography with enhanced security based on location selection
scheme,โ€ Int. J. Performability Eng., vol. 12, no. 5, pp. 451-458, 2016.
[18] P. G. P. S. T. Jaya, et al., โ€œEnhanced LSB Steganography with people detection as stego key generator,โ€ Proc. - Int.
Conf. Signals Syst. ICSigSys 2017, pp. 99-104, 2017.
[19] M. H. A. Al-Hooti, et al., โ€œAudio Data Hiding Using Octal Modulus Function Based Unsigned Integer Sample
Values,โ€ Int. Conf. Comput. Eng. Netw. Intell. Multimedia, CENIM 2018 - Proceeding, pp. 48-53, 2018.
[20] H. T. Hu and T. T. Lee, โ€œFrame-synchronized blind speech watermarking via improved adaptive mean modulation
and perceptual-based additive modulation in DWT domain,โ€ Digit. Signal Process. A Rev. J., vol. 87, pp. 75-85, 2019.
[21] S. Bandi and H. S. Manjunatha Reddy, โ€œCombined audio steganography and AES encryption to hide the text and
image into audio using DCT,โ€ Int. J. Recent Technol. Eng., vol. 8, no. 3, pp. 1732-1738, 2019.
[22] H. Chowdary, โ€œData Hiding in Speech Signal Using Steganography and Encryption," 3rd IEEE International
Conference on Recent Trends in Electronics, Information & Communication Technology, 2018.
[23] [S. Ahmed, โ€œData Hiding Using Green Channel as Pixel Value Indicator,โ€ International Journal of Image
Processing (IJIP), no. 12, pp. 90-100, 2018.
[24] M. Cem kasapbaลŸi and W. Elmasry, โ€œNew LSB-based colour image steganography method to enhance the
efficiency in payload capacity, security and integrity check,โ€ Sadhana - Acad. Proc. Eng. Sci., vol. 43, no. 5, 2018.
[25] S. A. Yousif, et al., โ€œAudio Steganography Using Tone Insertion Technique,โ€ Int. J. Comput. Appl. Technol. Res.,
vol. 6, no. 6, pp. 254-258, 2017.
[26] A. Alabaichi, et al., โ€œImage steganography using least significant bit and secret map techniques,โ€ International
Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 935-946, 2020.

More Related Content

What's hot

A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
ย 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAnkita Dubey
ย 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
ย 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
ย 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
ย 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907IJERA Editor
ย 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527Iasir Journals
ย 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
ย 
Pioneering VDT Image Compression using Block Coding
Pioneering VDT Image Compression using Block CodingPioneering VDT Image Compression using Block Coding
Pioneering VDT Image Compression using Block CodingDR.P.S.JAGADEESH KUMAR
ย 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
ย 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...IJECEIAES
ย 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
ย 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
ย 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
ย 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
ย 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
ย 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
ย 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
ย 

What's hot (18)

A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
ย 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubey
ย 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
ย 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
ย 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
ย 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
ย 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
ย 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
ย 
Pioneering VDT Image Compression using Block Coding
Pioneering VDT Image Compression using Block CodingPioneering VDT Image Compression using Block Coding
Pioneering VDT Image Compression using Block Coding
ย 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
ย 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
ย 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
ย 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
ย 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
ย 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
ย 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
ย 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
ย 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
ย 

Similar to Hiding text in speech signal using K-means, LSB techniques and chaotic maps

Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryptionnooriasukmaningtyas
ย 
Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...IJECEIAES
ย 
QUATERNฤฐON SECURฤฐTY USฤฐNG MODฤฐFYฤฐNG VERNAM CฤฐPHER WฤฐTH ฤฐMAGE STEGANOGRAPHY
QUATERNฤฐON SECURฤฐTY USฤฐNG MODฤฐFYฤฐNG VERNAM CฤฐPHER WฤฐTH ฤฐMAGE STEGANOGRAPHYQUATERNฤฐON SECURฤฐTY USฤฐNG MODฤฐFYฤฐNG VERNAM CฤฐPHER WฤฐTH ฤฐMAGE STEGANOGRAPHY
QUATERNฤฐON SECURฤฐTY USฤฐNG MODฤฐFYฤฐNG VERNAM CฤฐPHER WฤฐTH ฤฐMAGE STEGANOGRAPHYijma
ย 
American standard code for information interchange mapping technique for tex...
American standard code for information interchange mapping  technique for tex...American standard code for information interchange mapping  technique for tex...
American standard code for information interchange mapping technique for tex...IJECEIAES
ย 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
ย 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
ย 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
ย 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithmMohammed Kharma
ย 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
ย 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
ย 
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
ย 
A secure image steganography based on burrows wheeler transform and dynamic b...
A secure image steganography based on burrows wheeler transform and dynamic b...A secure image steganography based on burrows wheeler transform and dynamic b...
A secure image steganography based on burrows wheeler transform and dynamic b...IJECEIAES
ย 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...IAEME Publication
ย 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED
ย 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
ย 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
ย 

Similar to Hiding text in speech signal using K-means, LSB techniques and chaotic maps (20)

Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryption
ย 
Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...
ย 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
ย 
QUATERNฤฐON SECURฤฐTY USฤฐNG MODฤฐFYฤฐNG VERNAM CฤฐPHER WฤฐTH ฤฐMAGE STEGANOGRAPHY
QUATERNฤฐON SECURฤฐTY USฤฐNG MODฤฐFYฤฐNG VERNAM CฤฐPHER WฤฐTH ฤฐMAGE STEGANOGRAPHYQUATERNฤฐON SECURฤฐTY USฤฐNG MODฤฐFYฤฐNG VERNAM CฤฐPHER WฤฐTH ฤฐMAGE STEGANOGRAPHY
QUATERNฤฐON SECURฤฐTY USฤฐNG MODฤฐFYฤฐNG VERNAM CฤฐPHER WฤฐTH ฤฐMAGE STEGANOGRAPHY
ย 
American standard code for information interchange mapping technique for tex...
American standard code for information interchange mapping  technique for tex...American standard code for information interchange mapping  technique for tex...
American standard code for information interchange mapping technique for tex...
ย 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
ย 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
ย 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
ย 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm
ย 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
ย 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
ย 
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
ย 
A secure image steganography based on burrows wheeler transform and dynamic b...
A secure image steganography based on burrows wheeler transform and dynamic b...A secure image steganography based on burrows wheeler transform and dynamic b...
A secure image steganography based on burrows wheeler transform and dynamic b...
ย 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
ย 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12
ย 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ย 
G017444651
G017444651G017444651
G017444651
ย 
P017329498
P017329498P017329498
P017329498
ย 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
ย 
O017429398
O017429398O017429398
O017429398
ย 

More from IJECEIAES

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningIJECEIAES
ย 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportIJECEIAES
ย 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...IJECEIAES
ย 
Ataxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelAtaxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelIJECEIAES
ย 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...IJECEIAES
ย 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...IJECEIAES
ย 
An overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodAn overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodIJECEIAES
ย 
Recognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkRecognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkIJECEIAES
ย 
A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...IJECEIAES
ย 
An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...IJECEIAES
ย 
Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...IJECEIAES
ย 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksIJECEIAES
ย 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...IJECEIAES
ย 
Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...IJECEIAES
ย 
Efficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersEfficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersIJECEIAES
ย 
System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...IJECEIAES
ย 
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...IJECEIAES
ย 
Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...IJECEIAES
ย 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...IJECEIAES
ย 
An algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelAn algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelIJECEIAES
ย 

More from IJECEIAES (20)

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
ย 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca Airport
ย 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
ย 
Ataxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelAtaxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning model
ย 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...
ย 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
ย 
An overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodAn overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection method
ย 
Recognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkRecognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural network
ย 
A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...
ย 
An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...
ย 
Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...
ย 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
ย 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...
ย 
Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...
ย 
Efficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersEfficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacenters
ย 
System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...
ย 
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
ย 
Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...
ย 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...
ย 
An algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelAn algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D model
ย 

Recently uploaded

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
ย 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7Call Girls in Nagpur High Profile Call Girls
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
ย 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .DerechoLaboralIndivi
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
ย 

Recently uploaded (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 

Hiding text in speech signal using K-means, LSB techniques and chaotic maps

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 6, December 2020, pp. 5726~5735 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i6.pp5726-5735 ๏ฒ 5726 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Hiding text in speech signal using K-means, LSB techniques and chaotic maps Iman Qays Abduljaleel, Amal Hameed Khaleel Department of Computer Science, Basrah University, Iraq Article Info ABSTRACT Article history: Received Mar 20, 2020 Revised May 8, 2020 Accepted May 22, 2020 In this paper, a new technique that hides a secret text inside a speech signal without any apparent noise is presented. The technique for encoding the secret text is through first scrambling the text using Chaotic Map, then encoding the scraped text using the Zaslavsky map, and finally hiding the text by breaking the speech signal into blocks and using only half of each block with the LSB, K-means algorithms. The measures (SNR, PSNR, Correlation, SSIM, and MSE) are used on various speech files (โ€œ.WAVโ€), and various secret texts. We observed that the suggested technique offers high security (SNR, PSNR, Correlation, and SSIM) of an encrypted text with low error (MSE). This indicates that the noise level in the speech signal is very low and the speech purity is high, so the suggested method is effective for embedding encrypted text into speech files. Keywords: Choatic maps K-Means clusters LSB technique Steganography Zaslavsky map Copyright ยฉ 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Amal Hameed Khaleel, Department of Computer Science, Basrah University, Basrah, Iraq. Email: amal_albahrany@yahoo.com 1. INTRODUCTION In the modern digital communication age, information privacy is a huge concern. There are two essential areas for ensuring information security: encryption and hiding of information. As security needs increase, encryption alone is not sufficient, so hiding is also supplementary to encryption in security property [1]. Encryption is a system which transforms a message from a readable form into an unreadable form using a certain key, and the secret text can only be effectively isolated by a recipient who has the secret key [2, 3]. Hiding information is a method that hides sensitive information inside the media of an information carrier in a way that only senders and recipients who know about it can unlock. Steganography is one of these hidden data transformation techniques that is popularly employed [4]. Steganography is governed by four key elements: secret data, carrier file, type of carrier file, capacity carrier file [5]. In audio steganography the human auditory system's weakness is used to hide data in the audio, because the human ear cannot discriminate the small difference between the original file and the altered one [6]. Speech is a special case of audio signals which is distinguished in terms of spectral bandwidth, signal continuity, and intensity distribution [7]. Speech steganography is a particular challenge. In this paper, a speech file is selected as a carrier medium, and a text message is hidden within it; the secret text is encoded through the use of text scrambling using a Chaotic Map, and the scraped text is encoded using the Zaslavsky map, then the encoded text is hidden inside a speech signal using the LSB, K-means algorithms. The proposed algorithm has the advantages of increased capacity and protection. The proposed embedding technique did not change the original file size, so with the proposed method the data are difficult to extract. The LSB encoding method means the Least Significant Bits of the audio sample are replaced with the hidden message bits, as the original audio has no effect [8]. The choice of pixels or the order of embedding capacity may be determined by a stego-key [9]. K-means clustering, which is a data mining
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Hiding text in speech signal using K-means, LSB techniques and chaotic maps (Iman Qays Abduljaleel) 5727 technique that divides or groups n items into groups of k, where k is chosen according to the number of groups needed. In the case of K-means, centroids represent the mean vectors [10]. The Zaslavsky Map is a nonlinear dynamic method of discrete-timentroduced by George M Zaslavsky. It exhibits deterministic dynamic behaviour, which is an integral part of the algorithms for contemporary data encryption [11]. A quantum logistic map is suggested by Goggin et al., [12]. Quantum chaos is based on the quantum system displaying chaotic dynamics within a given range. The very lowest-quantum corrections cause additive noise and quantum chaos, so the advantage of chaotic encryption is high-level security [13]. Several previous works were designed to perform data hiding including the Echo hiding method [14], Phase and amplitude coding methods [15]. In [16], the proposed method for LSB encoding in multiple layers is by using the bitwise operation, meaning two message bits are embedded at a time into audio cover to increase the robustness and capacity. In [17], the proposed technique enhances protection, where each hidden bit of information is placed in the selected audio media cover location. The embedding location is selected based on upper 3MSB bits of cover media. [18] proposes the enhanced technique of LSB with human detection as a key generator to extract a secret message from the video cover file and describe the location of the message. In [19], a new technique hides a secret text within a cover audio file using modulus function-based uint 8. In [20], the proposed IAMM scheme exploits the DWT properties to achieve efficient speech watermarking of the blind. Second level approximation and detail coefficients with appropriate intensity were chosen for the embedding of information bits, and synchronisation codes for the watermarking process, respectively. Bandi and Reddy [21] suggests encrypting the secret text message and concealing it in the cover audio, using a combination of DCT coefficient and AES encryption method to provide data protection. Chowdary [22] uses a different approach for data hiding in speech signals, with a unique key which contains a ten-digit number within a speech signal for better security. Ahmed [23] suggests an algorithm using pixel value gauge technology to mask the confidential message in the cover picture's most significant bits (MSBs). In [24] the proposed encrypted data and address information is used to locate the next pixel, using the Fisher-Yates Shuffle algorithm. In [25], the proposed technique embeds English text into the wave audio using tone insertion method, which generates two frequency f1 and f2 and inserts them into an audio file in a suitable power level according to the specific stego-table. In [26] steganography of image is suggested using LSB and secret map techniques. The study is based on the principle of random insertion and the select of a pixel from a host image. Applying 3D chaotic charts, Chebyshev, and 3D logistic maps performs the technique. The remainder of this paper is organised as follows: section 2 gives details of the general algorithms for the suggested method. Section 3 shows the experimental results and simulation. Conclusions and future work are presented in Section 4. 2. RESEARCH METHOD The proposed algorithm of three stages: ๏€ญ Scrambling text algorithm: it depends on the repetition of splitting a text consisting of bits into blocks, and using the quantum chaotic map on the resulting blocks. We repeat this process until the length of the block reaches 8 bits. The benefit of extending the circuit of the scrambling from small blocks to larger blocks is to scramble the text sites more than once ๏€ญ Encryption algorithm: it uses the Zaslavsky Map, which includes converting the ciphertext from fractional values to integer values and then converting these values into bits. After that it applies the XOR operation between the keys generated by using the Zaslavsky algorithm and the ciphertext bits. ๏€ญ Hiding algorithm: it hides the bits of encoded text in the speech signal. We divided the sound into blocks and we used only one part of each block, which was divided into two parts, then we used the K-means algorithm to produce an index key that represents the locations through which we hid the bits of text in the speech signal. The LSB algorithm was also used to choose the sites of speech that it hides. Thus, the proposed algorithm is more sophisticated and secure, and in this way, any hackers of the speech signal will not be able to recognise the hidden text. The proposed algorithm is shown in Figure 1. 2.1. Proposed chaotic scrambling bits algorithm This algorithm increases resistance against attacks by supplying extra security with the help of a private key. The idea of our algorithm to generate the scrambling bits consists of the following steps: ๏€ญ Read the text file. ๏€ญ Convert the text file symbols from symbolic to ASCII.
  • 3. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5726 - 5735 5728 ๏€ญ Convert the ASCII symbols to binary representation (zero and one) and store them in a vector with a length M, which represents the number of bits of the entered text; e.g., letter A=065 ASCII value=01000001 Binary value. ๏€ญ Divide the result vector into blocks and each block with a length of n (n=8 initially). ๏€ญ If Mod (vector of length m/n)=0 then go to the next step. Otherwise, keep the remainder of the vector text (Mod (vector of length m/n)=z ) in the last block generation with length (z) without adding zeroes. This step of the algorithm distinguishes our research, since we depend on the original length of the text without additions. Thus, the processing time decreases, so we do not need additional time or a large memory. ๏€ญ Generate sequences of keys using a chaotic map, where the number of sequences is equal to the number of blocks, and the length of each sequence is equal to (n). Also, if the length of the last block is less than (n), then we create a sequence of keys with the length of the last block. ๏€ญ For each block with length (n) do the following: ๏€ญ Generate a sequence of keys using the chaotic quantum logistic map equation [12] as follows: ๐‘ฅ ๐‘›+1 = ๐‘Ÿ (๐‘ฅ ๐‘› โˆ’ | ๐‘ฅ ๐‘› |)2 โˆ’ ๐‘Ÿ๐‘ฆ๐‘›, (1) ๐‘ฆ ๐‘›+1 = โˆ’๐‘ฆ๐‘› ๐‘’โˆ’2๐›ฝ + ๐‘’โˆ’๐›ฝ ๐‘Ÿ[(2 โˆ’ ๐‘ฅ ๐‘› โˆ’ ๐‘ฅ ๐‘› โˆ— )๐‘ฆ๐‘› โˆ’ ๐‘ฅ ๐‘› ๐‘ง ๐‘› โˆ— โˆ’ ๐‘ฅ ๐‘› โˆ— ๐‘ง ๐‘›], (2) ๐‘ง ๐‘›+1 = โˆ’๐‘ง ๐‘› ๐‘’โˆ’2๐›ฝ + ๐‘’โˆ’๐›ฝ ๐‘Ÿ[2(1 โˆ’ ๐‘ฅ ๐‘› โˆ— )๐‘ง ๐‘› โˆ’ 2๐‘ฅ ๐‘› ๐‘ฆ๐‘› โˆ’ ๐‘ฅ ๐‘›]. (3) where X1=0.39, Y1=0.004, Z1=0.002, X*=0.0018, Z*= 0.0039, ฮฒ =4.46, r=3.89, x๏ƒŽ[0,1], x*=x, y ๏ƒŽ[0,0.1], z๏ƒŽ[0,0.2], z*=z, ๏ข๏ƒŽ[6,๏‚ฅ), and r ๏ƒŽ[0,4]. ๏€ญ If the length of the sequence bit of the key is not satisfied (meaning not equal to n), go back to Step (a) ๏€ญ If the last block with length (z) is equal to length (n), use the sequence bit of key that results from Step (b), otherwise generate a sequence bit of key equal to length (z) using (1) in Step (7-a) ๏€ญ Re-arrange all keys in each block in ascending order ๏€ญ Re-order the bits of each block whose number is (n), according to the order of the values of the bit keys that we have arranged while keeping the original value index ๏€ญ Combine the blocks in a single vector with a length of (m) ๏€ญ Calculate n=n * 2 ๏€ญ Test the length of the vector=(m div new n); if greater than (8bits), go back to Step (5). ๏€ญ Convert each 8bits of vector to ASCII symbols, after that convert it to the characters of the text that are used in the next stage (text encryption) Figure 1. The General Structure of proposed model
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Hiding text in speech signal using K-means, LSB techniques and chaotic maps (Iman Qays Abduljaleel) 5729 2.2. Proposed zaslavsky text encryption algorithm In this algorithm, for enhanced security the scrambling text is encrypted using random numbers generated using the Zaslavsky map before hiding it inside a speech signal. The idea of our algorithm to encrypt text consists of the following steps: ๏€ญ Read the scrambling text file ๏€ญ Convert the scrambling text file symbols from their symbolic form to ASCII symbols ๏€ญ Convert the ASCII symbols to the binary representation (zero and one) and store them in a vector of length (M), which represents the number of bits of the entered scrambling text. ๏€ญ Generate Zaslavsky keys with the length of the symbolic bits (m) using equation [11] as the following: ๐‘ฅn+1 = mod ( ๐‘ฅ ๐‘› + v(1 + ยต ๐‘ฆ๐‘› ) + ิ‘ v ยต cos (2 ฯ€๐‘ฅ ๐‘›), 1) (4) ๐‘ฆ ๐‘›+1 = ๐‘’โˆ’๐‘Ÿ (๐‘ฆ๐‘› + cos(2ฯ€๐‘ฅ ๐‘›)) (5) and ยต = 1โˆ’๐‘’โˆ’๐‘Ÿ ๐‘Ÿ (6) where v, r, ิ‘ are control parameters, and e is exponentiation. The key set for the Zaslavsky map is {x0, y0, v, r, ิ‘}. Commonly used values for the parameters are: x0=0.12, y0=0.13, v=0.2, r=5, e=0.3, ิ‘= 9. ๏€ญ Convert Zaslavsky from fractional values to integer values ๏€ญ Convert the values to a binary representation at 8bits for each numeric value ๏€ญ Make an XOR operation between every 8bits of the key value and the text value ๏€ญ Convert the text from a binary system to ASCII, then to characters, and save it in a text file for the purpose of hiding it 2.3. Proposed embedd K-means algorithm In our work, to get increased security and accurate results we used the K-means clustering technique, which mainly consists of the following steps: ๏€ญ Use the K-means algorithm on the matrix to divide it into 128 clusters, ๏€ญ Use the index of each cluster in the index vector (128 values) to embed the binary text data in each first part of the speech block ๏€ญ Store the encoded text vector, whose length is (m) in the first 128 bits of the first block of the original speech signal, according to the sequence that we obtained from K-means, to arrange the values from 1-128 ๏€ญ Begin from the second block of the speech signal, and only embed on the first part of each block according to the index of the K-means algorithm 2.4. Proposed advance LSB embedding algorithm The average bit replacement must not exceed 50% of the bit length into the original speech signal, i.e. bit-length of N will affect only (n/2) bits of the host audio to produce Stegano Speech. The steps for embedding using Least Significant Bit (LSB) algorithm are as follows: ๏€ญ Read the input speech signal in ".WAV" format and the scrambling text file. ๏€ญ Divide the original speech signal into blocks (each block contains 256 values) ๏€ญ Divide each block into two parts (each part has 128 values) ๏€ญ Take the second part of the first blocks (1-128) of the speech signal, i.e. from each block, we take the values from 129-256, to create a two-dimensional matrix of 128 blocks, where each block has 128 values. Because ".WAV" documents has two parts, the header and the information, and the header is in the initial 44 bytes of the document, the first bits contain little data and the embedding is clear. In contrast, the last bits contain much data and embedding it is not known. ๏€ญ Use the proposed embed K-means algorithm on the resulting matrix to embed text vector. ๏€ญ Use a function (float2bin) to convert the values of speech signal files from their fractional form to their binary form using 64 bits, because the values in the speech signal file are characterised by their fractional form. ๏€ญ Cut the eight bits from allocation 17 to 24 of the 64 bits for each binary number, and then apply to the LSB algorithm that hides the data in the last bit (b1 ), where it does not correlate with the original values and the form of the bits is as follows: b8 b7 b6 b5 b4 b3 b2 b1 where the bits (b8 b7 b6 b5) are MSB and bits (b4 b3 b2 b1) are LSB ๏€ญ Test the MSB data by apply two relationships: ๏€ญ First relationship: If Xor (b8, b6)=Xor (b7, b5) then change the value of b1 by doing the following Xor (Xor (b8, b6), TextBi) the result insert in b1 Where TextBi is the bit for the text vector of length (m) to hide
  • 5. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5726 - 5735 5730 This method makes it difficult to discover the original decoding values. This is one of the strengths of our algorithm. ๏€ญ Second relationship: If Xor (b8, b6) <> Xor (b7, b5) then change the value of b1 by doing the following Xor (Xor (b7, b5), TextBi) the result insert in b1 Here there is the same idea, but with no equal Xor values, so it is difficult to retrieve because the sites will differ. ๏€ญ Re-combine the eight bits cut out within the 64 bits after hiding the text data. ๏€ญ Convert the 64 bits from their binary into a fractional number to return the values of the input speech signal ๏€ญ Repeat steps (5-10) for all 128 values in each speech signal block, which is used on all bits of the encoded text vector that we want to hide ๏€ญ Combine the speech signal blocks in a single vector that represents the resulting speech signal vector after the embedding process. ๏€ญ Put the length of the text to be hidden into the last block of the speech signal, so that the recipient can know the length of the secret text. It is necessary for the recipient to know the last bit of text that is collected in order to retrieve the text from the speech signal. 3. RESULTS AND DISCUSSIONS To evaluate the performance of the suggested technique, 21 (โ€œ.WAVโ€) English speech samples were used. Each audio file is a single-channel 16-bit PCM WAV with a sample rate of 22050 Hz whose duration ranges from four to ten seconds as a cover, and four text messages (.txt) of different lengths. The proposed technique was tested using a PC with the following properties: Pentium Intel (R) Corei7, CPU@2.60 GHz processor, 6.00 GB RAM, 64-bit Windows 10 operating system; and MATLAB R2018b software is the implementing and efficiency evaluation tool. We used (โ€œ.WAVโ€) audio file type as a cover file for the purpose of hiding data because it includes high data redundancy and its format is not subjected to any type of compression which allows higher data capacity to be hidden, so we used an LSB algorithm which depends on redundancy for hiding data. The five measures: signal to noise ratio (SNR), Peak Signal to noise ratio (PSNR), correlation, structural similarity index metric (SSIM), and mean square error (MSE), are used. We used the SNR measure because it can show the quantity of noise in the signal for audio medium, PSNR because it shows the robustness of the proposed method, Correlation and SSIM used as quality metrices of strong interdependencies in the speech, and MSE to prove the algorithm reliability of the conveyed data, which must have a high retrieval rate and low error rate. The subsequent equations compute SNR, PSNR, MSE, where: ๐‘†๐‘๐‘… = 10 ๐‘™๐‘œ๐‘”10 ( โˆ‘ ๐‘œ(๐‘–)2๐‘› ๐‘–=1 โˆ‘ (๐‘œ(๐‘–)โˆ’๐‘ (๐‘–)) 2๐‘› ๐‘–=1 ) (7) ๐‘ƒ๐‘†๐‘๐‘… = 10๐‘™๐‘œ๐‘”10 [ max(๐‘œ(๐‘–),๐‘ (๐‘–))2 ๐‘Ž๐‘๐‘ (๐‘œ(๐‘–)โˆ’๐‘ (๐‘–))2] (8) ๐‘€๐‘†๐ธ = 10๐‘™๐‘œ๐‘”10 โˆ‘ โˆ‘ (๐‘œ(๐‘–)โˆ’๐‘ (๐‘–)) 2 ๐‘€โˆ—๐‘ ๐‘› ๐‘–=1 ๐‘š ๐‘–=1 (9) ๐ถ ๐‘œ๐‘  = โˆ‘ (๐‘œ ๐‘–โˆ’ยต ๐‘œ).(๐‘ ๐‘–โˆ’ยต ๐‘  ๐‘› ๐‘–=1 ) [ โˆ‘ (๐‘œ ๐‘–โˆ’ยต ๐‘œ) 2๐‘› ๐‘–=1 ] 1 2โ„ [ โˆ‘ (๐‘ ๐‘–โˆ’ยต ๐‘ ) 2๐‘› ๐‘–=1 ] 1 2โ„ (10) ๐‘†๐‘†๐ผ๐‘€(๐‘‚, ๐‘†) = (2ยต ๐‘œยต ๐‘ +๐‘1)(2๐œŽ ๐‘œ๐‘ +๐‘2) (ยต0 2+ยต ๐‘  2+๐‘1)(๐œŽ0 2+๐œŽ๐‘  2+๐‘2) ร— 100 (11) where: n and m are the numbers of rows and columns in cover audio file input signals o is the sample with index number in the original audio file s is the sample with index number in the stego audio file ยต ๐‘œ and ยต ๐‘  are the meam values of o and s respectively ๐œŽ๐‘œ and ๐œŽ๐‘  are the standard deviation values of o and s respectively C1=(k1L)2 , and C2=(k2L)2 are two constants used to avoid null denominator k1=0.01 and k2=0.03 by default L is the dynamic range of the signal values (typically this is 2# bits per signal -1).
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Hiding text in speech signal using K-means, LSB techniques and chaotic maps (Iman Qays Abduljaleel) 5731 The results of the analysis showed that the longer the text message, the greater the MSE and the smaller the PSNR, and the noise rate is reduced. It can be noted from the outcome of the measures that the square error (MSE) of the proposed method is very small, which means no noise, and no difference between the cover speech and stegano speech. The suggested algorithm consists of three stages: scrambling text, encryption text and hide algorithm. Example of the proposed algorithm: ๏€ญ Scrambling text stage: Figure 2 shown the text input and text after the scrambling algorithm Text input: My Name IMAN QAYS. I LOVE My COUNTRY IRAQ VVVVVery Much. Scrambling text stage result: 'รกยฎโ€šยฐhz(6โ€ฐAร‰1!ยจ"#(. VZ3ร„ s$<Sโ€˜โ€ขรŽ$ยนร€8@ยฉ*{)e1M ยฒรต-โ„ข' ๏€ญ Encryption text stage: We can notice that Figure 3 shows the output of the encryption text Input: the output of the scrambling stage Output encrypted text stage result: 'aยฎยฏยฒยกร‘ยฆยกโ‚ฌ }ร„รชรฅร–รฐ5xร‘^1Hร9ร“uรฃยทยฉโ€ฆR-โ‚ฌ รงรHโ€ขโ€“ยปaยฒFยฎ?0โ€บxร' ๏€ญ Hide text stage result: Figure 4 shows the time waveform of the (speech1.wav) signal original before and after embedded (Txt3.txt) file, and the differences between them and it can be seen that the differences are very small using the method proposed. The outcomes of the performance of the proposed algorithm which hides the text into a speech signal is shown as Tables 1 and 2. Table 1 shows the comparative analysis for Speech1, Speech2, and Speech3 using the existing algorithms in [17,1] and the proposed algorithms. Corresponding graphs are shown in Figures 5 and 6. Table 2 displays the measured result using SNR, PSNR, Correlation, SSIM, and MSE to evaluate the quality of speech before and after the texts were inserted. In Figure 7, the graphs are shown when embedding capacity increases, SNR, PSNR, Correlation, and SSIM decrease while MSE increases. The different performance results are dependent on different lengths of the text message. Those findings indicate that the lower the MSE value and the higher of SNR, PSNR, Correlation, SSIM values, the better the stego-speech signal output. Whereas the correlation and SSIM values closed to +1, which means a high relationship between the original speech signal and the stego speech signal. Table 1 shows the SNR MES and PSNR values for different speech signal files and different text files after the steganography process. (a) (b) Figure 2. Scrambling text stage, (a) Before scrambling process, (b) after scrambling process
  • 7. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5726 - 5735 5732 (a) (b) Figure 3. Encryption text stage, (a) Before encryption process, (b) after encryption process (a) (b) Figure 4. Hide text stage result, (a) Before embedding process, (b) after embedding process Table 1. SNR MES and PSNR values for different speech signal files and different text files after the steganography process Speech signal file name Capacity (Bytes) Input Text Data Embedded (Bytes) Existing Algorithm in [17] Existing Algorithm in [1] Proposed Algorithm SNR PSNR SNR PSNR SNR PSNR MSE Speech1.wav 443926 Txt1.txt 323 84.653 140.745 87.725 144.198 254.4630 142.2155 2.6654e-09 Txt2.txt 836 83.303 139.776 85.41 142.214 196.4086 113.1883 2.1305e-06 Txt3.txt 4931 78.782 134.959 79.074 135.584 176.7201 103.3441 2.0554e-05 Txt4.txt 28959 74.78 131.267 75.054 131.527 162.1293 96.0486 1.1027e-04 Speech2.wav 571258 Txt1.txt 323 87972 144.771 89.914 147.483 257.0360 143.6621 2.4582e-09 Txt2.txt 836 86.403 144.391 87.93 145.499 197.5288 113.9085 2.3226e-06 Txt3.txt 4931 80.751 138.37 81.26 138.828 178.7935 104.5409 2.0079e-05 Txt4.txt 28959 9139 134.569 77.231 134.799 163.6060 96.9471 1.1538e-04 Speech3.wav 900412 Txt1.txt 323 9053 150.934 93.865 153.41 261.4467 145.7098 2.4180e-09 Txt2.txt 836 84.915 149.89 91.881 151.425 202.9425 116.4577 2.0355e-06 Txt3.txt 4931 80.99 144.459 85.205 144.149 182.7941 106.3835 2.0706e-05 Txt4.txt 28959 84.653 140.53 81.166 140.71 167.7983 98.8856 1.1638e-04
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Hiding text in speech signal using K-means, LSB techniques and chaotic maps (Iman Qays Abduljaleel) 5733 Table 2. stego-speech signal performances dependent on the length of text message Speech signal file Duration Message length Performance Testing SNR PSNR Correlation SSIM MSE Success rate extraction % 10 ms 5 character 329.1504 187.8378 1 1 3.6415e-14 100% 15 character 315.7006 181.1129 1 1 1.7131e-13 100% 30 character 250.7466 148.6359 0.9999 0.9998 3.0302e-10 100% 50 character 221.1720 133.8485 0.9999 0.989 9.1245e-09 100% 75 character 213.8950 130.2101 0.9999 0.9888 2.1089e-08 100% 7 ms 5 character 301.4127 175.2949 1 1 4.6035e-13 100% 15 character 292.2016 170.6893 0.9985 0.9977 1.3294e-12 100% 30 character 226.0696 137.6233 0.9974 0.9899 2.6931e-09 100% 50 character 200.6336 124.9054 0.9965 0.9888 5.0355e-08 100% 75 character 189.1652 119.1711 0.9955 0.9888 1.8857e-07 100% 4 ms 5 character 263.8449 154.7290 1 1 3.1073e-11 100% 15 character 251.0597 148.3364 0.9985 0.9977 1.3541e-10 100% 30 character 224.7936 135.2033 0.9981 0.9899 2.7858e-09 100% 50 character 210.3435 127.9783 0.998 0.9875 1.4705e-08 100% 75 character 205.2477 125.4303 0.9975 0.9899 2.6439e-08 100% Figure 5. Corresponding graphs, (a) SNR analysis for Speech1, (b) SNR analysis for Speech2, (c) SNR analysis for Speech3 Figure 6. Corresponding graphs, (a) PSNR analysis for Speech1, (b) PSNR analysis for Speech2, (c) PSNR analysis for Speech3 (a) (b) (c) (c) (a) (b)
  • 9. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 5726 - 5735 5734 Figure 7. Graphs, (a) Analysis of the relation between the SNR, PSNR and the embedding text capacity, (b) analysis of the relation between the Correlation, SSIM and the embedding text capacity, (c) analysis of the relation between the MSE and the embedding text capacity 4. CONCLUSION The main objective of our suggested method, which involves embedding textual information in wave audio when transferred over the internet, is to provide efficient and secure encryption by using a more complicated algorithm, hence hard-to-break. In this paper, a new algorithm of hiding text in the speech signal is proposed. The proposed algorithm consists of a scrambling text file using a quantum chaotic map, and an encrypting scramble text file using the Zaslavsky map; then, implementing the LBS algorithm using K-means indexing to hide the encrypted text file into a speech signal. This approach produces good results with a hidden text message that cannot be detected, or at least it cannot be recovered if it is detected. The results indicate that even after embedding the hidden message, the size of the speech file remains the same. This algorithm was applied to the same speech file to embed multiple text files with different sizes of text content and vice versa. Good results were obtained, without losing the text message or noticing any noise in the cover file. In the future, the method could be applied to domains other than speech, such as music and video. REFERENCES [1] S. P. Rajput, et al., โ€œAn efficient audio steganography technique to hide text in audio,โ€ Int. Conf. Comput. Commun. Control Autom., pp. 1-6, 2017. [2] H. A. Abdullah, and H. N. Abdullah, โ€œFPGA implementation of color image encryption using a new chaotic map,โ€ Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 1, pp. 129-137, 2019. [3] I. U. W. Mulyono, et al., โ€œEncryption of Text Message on Audio Steganography Using Combination Vigenere Cipher and LSB (Least Significant Bit),โ€ Kinet. Game Technol. Inf. Syst. Comput. Network, Comput. Electron. Control, vol. 4, no. 1, pp. 63-74, 2018. [4] A. B. W. Putra, et al., โ€œSteganography for Data Hiding in Digital Audio Data using Combined Least Significant Bit and 4-Wrap Length Method,โ€ Proc. 2nd East Indones. Conf. Comput. Inf. Technol. Internet Things Ind. EIConCIT 2018, pp. 336-339, 2018. [5] Y. Bassil, โ€œAudio Steganography Method for Building the Deep Web,โ€ American Journal of Engineering Research (AJER), no. 5, pp. 45-51, 2019. [6] M. Mustafa, et al., โ€œA Novel Enhanced LSB Algorithm for High Secure Audio Steganography,โ€ 10th Comput. Sci. Electron. Eng. Conf. CEEC 2018 - Proc., pp. 125-130, 2019. [7] Y. Xue, et al., โ€œRobust speech steganography using differential SVD,โ€ IEEE Access, vol. 7, pp. 153724-153733, 2019. [8] J. Hashim, et al., โ€œLSB Modification based Audio Steganography using Advanced Encryption Standard (AES-256) Technique,โ€ 12th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics, MACS 2018 - Proceedings, pp. 1-6, 2019. [9] P. Bhattacherjee, et al., โ€œA review of Steganography techniques suitable for ECG signal,โ€ Conference: International Conference on Emerging Technologies for Sustainable Development (ICETSD '19), vol. 6, 2019. [10] B. Pillai, et al., โ€œImage steganography method using K-means clustering and encryption techniques,โ€ 2016 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2016, pp. 1206-1211, 2016. (a) (b) (c)
  • 10. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Hiding text in speech signal using K-means, LSB techniques and chaotic maps (Iman Qays Abduljaleel) 5735 [11] F. J. Farsana and K. Gopakumar, โ€œA Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator,โ€ Procedia Comput. Sci., vol. 93, pp. 816-823, 2016. [12] A. Akhshani, et al., โ€œPseudo random number generator based on quantum chaotic map,โ€ Commun. Nonlinear Sci. Numer. Simul., vol. 19, no. 1, pp. 101-111, 2014. [13] H. Liu, et al., โ€œA novel quantum image encryption algorithm based on crossover operation and mutation operation,โ€ Multimed. Tools Appl., vol. 78, no. 14, pp. 20465-20483, 2019. [14] wang yunlu, et al., โ€œSteganalysis on positive and negative echo hiding based on skewness and kurtosis,โ€ 9th IEEE Conference on Industrial Electronics and Applications, pp. 1235-1238, 2014. [15] Kamesh and N. S. Priya, โ€œA survey of cyber crimes Yanping,โ€ Secur. Commun. Networks, vol. 5, pp. 422-437, 2012. [16] B. Datta, et al., โ€œRobust multi layer audio steganography,โ€ 12th IEEE Int. Conf. Electron. Energy, Environ. Commun. Comput. Control (E3-C3), pp. 1-6, 2016. [17] S. Jadhav and A. M. Rawate, โ€œA new audio steganography with enhanced security based on location selection scheme,โ€ Int. J. Performability Eng., vol. 12, no. 5, pp. 451-458, 2016. [18] P. G. P. S. T. Jaya, et al., โ€œEnhanced LSB Steganography with people detection as stego key generator,โ€ Proc. - Int. Conf. Signals Syst. ICSigSys 2017, pp. 99-104, 2017. [19] M. H. A. Al-Hooti, et al., โ€œAudio Data Hiding Using Octal Modulus Function Based Unsigned Integer Sample Values,โ€ Int. Conf. Comput. Eng. Netw. Intell. Multimedia, CENIM 2018 - Proceeding, pp. 48-53, 2018. [20] H. T. Hu and T. T. Lee, โ€œFrame-synchronized blind speech watermarking via improved adaptive mean modulation and perceptual-based additive modulation in DWT domain,โ€ Digit. Signal Process. A Rev. J., vol. 87, pp. 75-85, 2019. [21] S. Bandi and H. S. Manjunatha Reddy, โ€œCombined audio steganography and AES encryption to hide the text and image into audio using DCT,โ€ Int. J. Recent Technol. Eng., vol. 8, no. 3, pp. 1732-1738, 2019. [22] H. Chowdary, โ€œData Hiding in Speech Signal Using Steganography and Encryption," 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology, 2018. [23] [S. Ahmed, โ€œData Hiding Using Green Channel as Pixel Value Indicator,โ€ International Journal of Image Processing (IJIP), no. 12, pp. 90-100, 2018. [24] M. Cem kasapbaลŸi and W. Elmasry, โ€œNew LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check,โ€ Sadhana - Acad. Proc. Eng. Sci., vol. 43, no. 5, 2018. [25] S. A. Yousif, et al., โ€œAudio Steganography Using Tone Insertion Technique,โ€ Int. J. Comput. Appl. Technol. Res., vol. 6, no. 6, pp. 254-258, 2017. [26] A. Alabaichi, et al., โ€œImage steganography using least significant bit and secret map techniques,โ€ International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 935-946, 2020.