Identification of Key Parameters for Cover Audio Generation in Imperceptible Audio Steganography

Authors

  • Muhammad Harith Noor Azam Faculty of Science and Technology, Universiti Sains Islam Malaysia, Nilai 71800, Negeri Sembilan, Malaysia.
  • Farida Ridzuan CyberSecurity and Systems Research Unit, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Nilai 71800, Negeri Sembilan, Malaysia.
  • A H Azni Faculty of Science and Technology, Universiti Sains Islam Malaysia, Nilai 71800, Negeri Sembilan, Malaysia.
  • Sakinah Ali Pitchay CyberSecurity and Systems Research Unit, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Nilai 71800, Negeri Sembilan, Malaysia.
  • Nur Hafiza Zakaria Faculty of Science and Technology, Universiti Sains Islam Malaysia, Nilai 71800, Negeri Sembilan, Malaysia.

DOI:

https://doi.org/10.33102/mjosht.540

Keywords:

audio steganography, Cover generation, Audio parameters

Abstract

The security of data during communication is an ever-growing challenge, as outdated algorithms face increasing vulnerability. Audio steganography offers a promising alternative by embedding data within audio signals in a manner that is imperceptible to human listeners. Recent advancements in cover selection as well as cover generation techniques have improved the quality and suitability of audio for embedding, yet the parameters influencing imperceptibility remain underexplored. This research aims to identify and evaluate key audio parameters which are energy, the total and value distribution of silent samples. These parameters can be assessed prior to the embedding process which offer a potential advantage over existing metrics, typically require post-embedding analysis to accurately assess imperceptibility. The methodology of this research consists of five main stages: parameter identification, dataset preparation, parameter extraction, embedding, and evaluation. Signal-to-Noise Ratio (SNR) was employed as the primary metric to assess perceptual transparency, with 20% data capacity embedded in each audio of total 220 audio.  The first experiment revealed a positive correlation as high as r = 0.706 between energy and SNR, indicating that higher-energy audio benefit from auditory masking, resulting in improved imperceptibility. The second experiment showed a negative correlation, r = –0.787 between total silent sample and SNR, confirming that embedding in silent sample increases the risk of perceptible artifacts. Silent sample that has higher value exhibited superior SNR values compared to those with extremely lower value. These findings highlight the importance of pre-embedding analysis in identifying suitable samples for embedding. By identifying and evaluating these influential parameters, this research contributes to the development of intelligent cover generation strategies that enhance the transparency of audio steganography systems. The insights presented offer a foundation for future design, optimization, and real-world application of robust data-hiding techniques.

 

Downloads

Download data is not yet available.

References

[1] B. E. Carvajal-Gámez, M. A. Castillo-Martínez, L. A. Castañeda-Briones, F. J. Gallegos-Funes, and M. A. Díaz-Casco, “Audio Steganalysis Estimation with the Goertzel Algorithm,” Applied Sciences (Switzerland), vol. 14, no. 14, Jul. 2024, doi: 10.3390/app14146000.

[2] J. Jezdimirovic, N. Pekez, and J. Kovacevic, “Security enhancement of LSB-based audio steganography method,” 2023 IEEE Zooming Innovation in Consumer Technologies Conference, ZINC 2023, pp. 77–82, 2023, doi: 10.1109/ZINC58345.2023.10174020.

[3] M. H. Noor Azam, F. Ridzuan, and M. N. S. Mohd Sayuti, “Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm,” Journal of Information and Communication Technology, vol. 22, no. 2, pp. 255–282, 2023, doi: https://doi.org/10.32890/jict2023.22.2.5

[4] Y. Ren, D. Liu, C. Liu, Q. Xiong, J. Fu, and L. Wang, “A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet,” IEEE Trans. Dependable Secure Comput., vol. 20, no. 1, pp. 665–679, 2023, doi: 10.1109/TDSC.2022.3141121.

[5] D. R. I. M. Setiadi, “Improved payload capacity in LSB image steganography uses dilated hybrid edge detection,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 2, pp. 104–114, 2022, doi: 10.1016/j.jksuci.2019.12.007.

[6] S. Rustad, D. R. I. M. Setiadi, A. Syukur, and P. N. Andono, “Inverted LSB image steganography using adaptive pattern to improve imperceptibility,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 6, pp. 3559–3568, 2022, doi: 10.1016/j.jksuci.2020.12.017.

[7] M. H. Noor Azam, F. Ridzuan, M. N. S. Mohd Sayuti, A. H. Azni, S. Ali Pitchay, and N. H. Mohd Alwi, “A Method of Cover Audio Selection for Embedding Based on Various Criteria,” in ITM Web of Conferences, vol. 63, 2024, p. 01001. doi: 10.1051/itmconf/20246301001.

[8] M. H. N. Azam, F. Ridzuan, M. Norazizi Sham Mohd Sayuti, A. H. , Azni, N. H. , Zakaria, and B. Harjito, “Improving Dynamic Security of the Least Significant Bit using Block-based Chaotic Multi-Level LSB (BCM-LSB),” in International Conference on Cyber Security, Privacy in Communication Networks, Springer Nature Singapore, 2024.

[9] M. A. Nasr et al., “A robust audio steganography technique based on image encryption using different chaotic maps,” Sci. Rep., vol. 14, no. 1, Dec. 2024, doi: 10.1038/s41598-024-70940-3.

[10] J. Wang and K. Wang, “A novel audio steganography based on the segmentation of the foreground and background of audio,” Computers and Electrical Engineering, vol. 123, Apr. 2025, doi: 10.1016/j.compeleceng.2024.110026.

[11] F. ASLANTAŞ and C. HANİLÇİ, “Comparative Analysis Of Audio Steganography Methods,” Journal of Innovative Science and Engineering (JISE), Jan. 2022, doi: 10.38088/jise.932549.

[12] A. A. Alsabhany, “The Adaptive Multi-Level Phase Coding Method in Audio Steganography for Confidential Communication,” Universiti Sains Islam Malaysia, 2019.

[13] M. H. Sayed and T. M. Wahbi, “Information Security for Audio Steganography Using a Phase Coding Method,” European Journal of Theoretical and Applied Sciences, vol. 2, no. 1, pp. 634–647, Jan. 2024, doi: 10.59324/ejtas.2024.2(1).55.

[14] M. M. Mahmoud and H. T. Elshoush, “Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography-An Innovative Approach,” IEEE Access, vol. 10, pp. 29954–29971, 2022, doi: 10.1109/ACCESS.2022.3155146.

[15] S. Nazari, “Cover Selection Steganography Via Run Length Matrix and Human Visual System,” Journal of Information Systems and Telecommunication, vol. 1, no. 2, 2013.

[16] Y. Hu, Z. Yang, H. Cao, and Y. Huang, “Multi-modal Steganography Based on Semantic Relevancy,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Melbourne, VIC, Australia: Springer, 2021, pp. 3–14. doi: 10.1007/978-3-030-69449-4_1.

[17] M. H. Noor Azam, F. Ridzuan, M. N. S. Mohd Sayuti, A. H. Azni, N. H. Zakaria, and V. Potdar, “A systematic review on cover selection methods for steganography: Trend analysis, novel classification and analysis of the elements,” May 01, 2025, Elsevier Ireland Ltd. doi: 10.1016/j.cosrev.2025.100726.

[18] P. D. Shah and R. S. Bichkar, “Genetic Algorithm Based Approach to Select Suitable Cover Image for Image Steganography,” in 2020 International Conference for Emerging Technology, INCET 2020, 2020, pp. 1–5. doi: 10.1109/INCET49848.2020.9154032.

[19] V. Hajduk and D. Levický, “Cover Selection Steganography with Intra-Image Scanning,” 2018 28th International Conference Radioelektronika (RADIOELEKTRONIKA), pp. 1–4, 2018.

[20] Z. Wang, X. Zhang, and Z. Yin, “Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization,” IEEE Signal Process. Lett., vol. 25, no. 10, pp. 1530–1534, 2018, doi: 10.1109/LSP.2018.2865888.

[21] M. H. Noor Azam, “Enhancement of Cover Selection-based Audio Steganography (CAS) using Block-based Chaotic Multi-level LSB (BCM-LSB) for Balanced Performance,” Universiti Sains Islam Malaysia, 2023.

[22] B. J. Bhatkalkar, R. V. Arjunan, A. Alok, R. Sanghavi, D. Cenitta, and R. Kamath, “A Novel Method for Sample Selection in Audio Stenographic Systems,” in 6th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2022 - Proceedings, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 664–672. doi: 10.1109/ICECA55336.2022.10009492.

[23] X. Dong, M. F. Bodo, and Z. Ignjcrtovic, “Robustness Analysis of Digital Audio Steganographic Method based on Phase Manipulation,” in Proceedings 7th International Conference on Signal Processing, IEEE, 2004, pp. 2375–2378.

[24] H. Miao, L. Huang, Y. Shen, X. Lu, and Z. Chen, “Steganalysis of compressed speech based on markov and entropy,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 2014, pp. 63–76. doi: 10.1007/978-3-662-43886-2_5.

[25] S. T. Chen, T. W. Huang, and C. T. Yang, “High-SNR steganography for digital audio signal in the wavelet domain,” Multimed. Tools Appl., vol. 80, no. 6, pp. 9597–9614, Mar. 2021, doi: 10.1007/s11042-020-09980-6.

[26] M. H. N. Azam, F. Ridzuan, and M. N. S. M. Sayuti, “A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography,” Pertanika J. Sci. Technol., vol. 30, no. 1, pp. 497–511, 2022, doi: 10.47836/pjst.30.1.27.

[27] I. Avcibaş, “Audio Steganalysis With Content-Independent Distortion Measures,” IEEE Signal Process. Lett., vol. 13, no. 2, pp. 92–95, 2006, doi: 10.1109/LSP.2005.862152.

[28] R. Shmueli, D. Mishra, T. Shmueli, and O. Hadar, “A novel technique for image steganography based on maximum energy seam,” Multimed. Tools Appl., vol. 83, no. 28, pp. 70907–70920, Aug. 2024, doi: 10.1007/s11042-024-18476-6.

[29] [T. Wu, X. Hu, and C. Liu, “Security-oriented steganographic payload allocation for multi-remote sensing images,” Sci. Rep., vol. 14, no. 1, 2024, doi: 10.1038/s41598-024-55474-y.

Downloads

Published

2026-03-14

How to Cite

Identification of Key Parameters for Cover Audio Generation in Imperceptible Audio Steganography. (2026). Malaysian Journal of Science Health & Technology, 11(3), 106-115. https://doi.org/10.33102/mjosht.540

Similar Articles

1-10 of 19

You may also start an advanced similarity search for this article.