Using Magic Cube and a Modified LSB for Audio Steganography

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    This paper introduces randomness-based audio steganography with magic square and magic cube cryptography methods that are respectively based on (LSB) or Least Significant, with National institute of Standards and Technology(NIST)and enhancement of LSB audio steganography.This enhancement is based on the mathematical foundations of the magic squareby using three algorithms with any order or any size. Magic square is a branch of mathematical combinatorics. It is one of the different arrays in magic number arrangements. The new proposed technique focuses on normal magic cubes of order from (3to n). The values inside the designed magic cube are used as an index to audio cover locations. These scrambled locations (according to the keys of magic cube) in audio cover are used to LSB embed secret text message. In order to increase the security of the proposed system, the starting number, the difference value, the dimension, and the values inside the magic cube are kept as a secret key. The National institute of Standards and technology (NIST) package is successfully used to test the randomness of the magic cube's keys values. peak signal to noise ratio (PSNR) of audio stegocovers are(62.65743352-79.57336476) dB in which the size of secret text message (256-16) bits.  

     


  • Keywords


    Magic cube, audio steganography, Magic Square, Least Significant Bit, steganography, NIST tests.

  • References


      [1] Musrrat Ali, Chang WookAhn, and Millie Pant, " Data Hiding Schemes: A survey", Embodying Intelligence in Multimedia Data Hiding, The authors; licensee Science Gate Publishing P.C. - CC BY-NC 4.0 International License DOI: 10.15579/gcsr., GCSR Vol. 5 ch.1, pp. 1-19, 2016.

      [2] Ziyad Tariq Mustafa Al-Ta'i, " Development of Multilayer New Covert Audio Cryptographic Model ", International Journal of Machine Learning and Computing, Vol. 1, No. 2, June 2011.

      [3] Ziyad Tariq Mustafa Al-Ta'i, " Comparison Between PSO and HPSO In Image Steganography ", International Journal of Computer Science and Information Security, Vol. 15, No. 8, August 2017.

      [4] Ziyad Tariq Mustafa Al-Ta'i, " Simulation of New Covert Audio CryptographicModel", 3rd International Conference on Machine Learning and Computing(ICMLC 2011), Singapore, 26-28 February 2011.

      [5] Abbas Cheddad , Joan Condell, Kevin Curran, and Paul Mc Kevitt, " Digital image steganography: Survey and analysis of current methods", Elsevier Journals- Signal Processing, Contents lists available at ScienceDirect, journal homepage: www.elsevier.com/locate/sigpro, Signal Processing 90 ( 727–752), 2010.

      [6] Chang CC, Lin MH, and Hu YCm,"A fast and secure image hiding scheme based on LSB substitution", International Journal of Pattern Recognition and Artificial Intelligence, Volume 16, Issue 04, June 2002.

      [7] Clifford A. Pickover, " The Zen of Magic Squares, Circles, and Stars:
      An Exhibition of Surprising Structures across Dimensions", Princeton University Press, 400 pp., ISBN 0-691-07041-5. 2002.

      [8] Saleh, K., Muhammad, M. and Ahmed, K., 2015. Using Rubik’s Cube and a Modified LSB for Audio Steganography. J. Zankoi Sulaimani, 4, pp.187-194.

      [9] Dawood, O.A., Rahma, A.M.S. and Hossen, A.M.J.A., 2015. New Variant of Public Key Based on Diffie-Hellman with Magic Cube of Six-Dimensions. International Journal of Computer Science and Information Security, 13(10), p.31.

      [10] Dawood, O.A., Rahma, A.M.S. and Hossen, A.M.J.A., 2016. Generalized Method for Constructing Magic Cube by Folded Magic Squares. International Journal of Intelligent Systems and Applications, 8(1), p.1.

      [11] Harvey D. Heinz and John R. Hendricks, " Magic Square Lexicon: Illustrated", Copyright by Harvey D. Heinz ,Published in small quantities by HDH as demand indicates, ISBN 0-9687985-0-0, Binding courtesy of Pacific Bindery Services Ltd., 2000.

      [12] D.I. George, J.Sai Geetha and K.Mani, “Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting”, International Journal of Computer Applications (0975 – 8887) Volume 96– No.14, pp. 38-43, June 2014.

      [13] Tang, Leeming. Breaking the Magician's Code: Magic Squares. Diss. University of Leeds, School of Computing, 2004.


 

View

Download

Article ID: 27989
 
DOI: 10.14419/ijet.v7i4.19.27989




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.