Skip to main content

Secret Audio Messages Hiding in Images

  • Conference paper
  • First Online:
Big Data Analysis and Deep Learning Applications (ICBDL 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 744))

  • 2161 Accesses

Abstract

Today, security of data transmission is a big problem in society. Information security fields play a vital role in network communication. To secure information, cryptography and steganography are widely used. Image steganography become popular because images are frequently used on internet. In this paper, the combination of cryptography and steganography is used to provide more secure which mean that it provides two layers protection. The secret audios or important speeches are recorded and this secret data is encrypted using Advance Encryption Standard (AES). This cipher data is embedded into cover images using Random-Based Least Significant Bit method. The random positions of image for LSB are also generated by the use of AES key. The resulting stego images are sent to the receiver and the receiver needed to perform the reverse processes to obtain the secret data. The image quality is analyzed in terms of both Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) measured between the cover image and stego image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jirwan, N., Singh, A., Vijay, S.: Review and analysis of cryptography techniques. Int. J. Sci. Eng. Res. 4(3), 1–6 (2013)

    Google Scholar 

  2. Dilawar, A.: Image Steganography: for hiding audio messages within gray scale images. Department of Computer Science and Software Engineering, International Islamic University (2014)

    Google Scholar 

  3. Sakthisudhan, K., Prabhu, P., Thangaraj, P.: Secure audio steganography for hiding secret information. In: International Conference on Recent Trends in Computational Methods, Communication and Controls (ICON3C 2012). Bannari Amman Institute of Technology, Erode – India (2012)

    Google Scholar 

  4. Sherly, A.P., Amritha, P.P.: A compressed video steganography using TPVD. Int. J. Database Manag. Syst. (IJDMS) 2(3), August 2010. TIFAC CORE in Cyber Security, Amrita Vishwa Vidyapeetham, Coimbatore

    Google Scholar 

  5. Announcing the ADVANCED ENCRYPTION (AES): Federal Information Processing Standards Publication 197, United States National Institute of Standards and Technology (NIST), 26 November 2001

    Google Scholar 

  6. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn., 16 November 2005

    Google Scholar 

  7. Lin, E.T., Dell, E.J.: A review of data hiding in digital images. In: Video and Image Processing Laboratory School of Electrical and Computer Engineering

    Google Scholar 

  8. Dilawar, A.: Image Steganography: For Hiding audio messages within Gray scale images. Department of Computer Science and Software Engineering, International Islamic University (2014)

    Google Scholar 

  9. Bhagyashri, A.P. et al.: Review of an improved audio steganographic technique over LSB through random based approach. IOSR J. Comput. Eng. (IOSR-JCE). Government Engineering College Aurangabad MS, India

    Google Scholar 

Download references

Acknowledgments

First of all, I would like to express my special thanks to Dr. Aung Win, Rector, University of Technology (Yatanarpon Cyber City). I would like to express my respectful gratitude to Dr. Soe Soe Khaing, Pro-rector, University of Technology (Yatanarpon Cyber City), for her kind permission to complete this thesis. I am thankful to her for giving enough consideration to her ideas and views. I would like to express grateful thank to Dr. Cho Me Me Maung, Professor and Head and Dr. Hnin Hnin Htun, Professor and Course Coordinator, Department of Computer Engineering, for her kind guidance, encouragement in making my thesis to complete successfully. I am very grateful to my supervisor, Dr. Tin Myint Naing, Associate Professor, University of Technology (Yatanarpon Cyber City), for his kind guidance and encouragement. He has been very supportive in this thesis, and also guides a lot, particularly, at the level of quality of presentation.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Saw Win Naing or Tin Myint Naing .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Naing, S.W., Naing, T.M. (2019). Secret Audio Messages Hiding in Images. In: Zin, T., Lin, JW. (eds) Big Data Analysis and Deep Learning Applications. ICBDL 2018. Advances in Intelligent Systems and Computing, vol 744. Springer, Singapore. https://doi.org/10.1007/978-981-13-0869-7_24

Download citation

Publish with us

Policies and ethics