Data Hiding Approach to Enhance the Audio Sample Spaces Using Interpolation and Multi-layering

Daffa Tristan Firdaus, Ntivuguruzwa Jean De La Croix, Tohari Ahmad*, Pascal Maniriho, Ary Mazharuddin Shiddiqi, Diana Purwitasari

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

In the face of rapid advancements in information transmission technology, ensuring the secure development of all application aspects is imperative, particularly considering the frequent data transmission over public networks. A significant vulnerability exists for data compromise during transmission without robust security measures. Thus, implementing a reliable data-hiding scheme becomes indispensable to safeguarding confidential information. Despite the introduction of various methods to address this concern, challenges persist in effectively managing data size and maintaining the resulting data quality. This research addresses these challenges with the key idea of using a combination of dynamic layering and sample interpolation to increase the samples’ capacity in accommodating the secret bits. The novelty of this study is based on the dynamic use of the multi-layering paradigm during the data embedding, which contributes to maintaining the quality of the audio sample considered for concealment. The experimental results show a significant outperformance of the proposed method, which gets a maximum peak signal-to-noise ratio (PSNR) of 120.39 decibels (dB), an ideal PSNR to secure secret data transmission.

Original languageEnglish
Pages (from-to)352-363
Number of pages12
JournalInternational Journal of Intelligent Engineering and Systems
Volume17
Issue number4
DOIs
Publication statusPublished - 2024

Keywords

  • Audio steganography
  • Data hiding
  • Information security
  • Interpolation
  • Network infrastructure

Fingerprint

Dive into the research topics of 'Data Hiding Approach to Enhance the Audio Sample Spaces Using Interpolation and Multi-layering'. Together they form a unique fingerprint.

Cite this