It appears you don't have support to open PDFs in this web browser. To view this file, Open with your PDF reader
Abstract
The development of innovative methods for concealing critical data in multimedia files has exploded in information security in recent years. Cryptography and steganography cannot be used alone to protect data; rather, they can be combined and used in a single system. Audio steganography is among the most important information security techniques. It involves the concealment of information within audio signals to achieve covert communication. This paper introduces a comprehensive technique that integrates chaos Henon, Baker, and Arnold maps for image encryption with audio steganography to create a robust and secure audio steganography technique. First, the target image is encrypted using chaotic maps. Then, it is embeded within the high frequencies of the cover audio signal based on the Inverse Short Time Fourier Transform (ISTFT) to be transmitted to the destination through the channel. By integrating both encryption and concealment techniques, the cover audio signal quality can be preserved. Moreover, the hidden image security and robustness are improved, making the technique resistant to many types of attacks. The simulation results confirm that the suggested technique is robust in the presence of attacks. It achieves a distinct perceptual quality with an appreciated peak signal-to-noise ratio (PSNR) of 91.2 dB and a Mean Square Error (MSE) of 7.5 × 10–10. The randomness of the resulting encrypted image has successfully passed the National Institute of Standards and Technology (NIST) statistical test suite.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details



1 Menoufia University, Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering, Menouf, Egypt (GRID:grid.411775.1) (ISNI:0000 0004 0621 4712)
2 Menoufia University, Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering, Menouf, Egypt (GRID:grid.411775.1) (ISNI:0000 0004 0621 4712); Prince Sultan University, Security Engineering Lab, Computer Science Department, Riyadh, Saudi Arabia (GRID:grid.443351.4) (ISNI:0000 0004 0367 6372)
3 Higher Future Institute for Specialized Technological Studies, Computer Science Department, Cairo, Egypt (GRID:grid.411775.1)
4 Menoufia University, Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering, Menouf, Egypt (GRID:grid.411775.1) (ISNI:0000 0004 0621 4712); Princess Nourah Bint Abdulrahman University, Department of Information Technology, College of Computer and Information Sciences, Riyadh, Saudi Arabia (GRID:grid.449346.8) (ISNI:0000 0004 0501 7602)
5 Canadian International College (CIC), Electronics and Communications Engineering Department, Faculty of Engineering, Giza, Egypt (GRID:grid.442795.9) (ISNI:0000 0004 0526 921X)