Secure Audio Steganography Using Vectorized LSB and Chaos-Based Encryption
DOI:
https://doi.org/10.64470/elene.2025.12Keywords:
Audio Stenography, Chaotic Algorithms,, LSB Data Hiding , Data Security, Hybrid EncryptionAbstract
In the era of digital transformation, the protection of sensitive multimedia data against growing cyber threats has become increasingly critical. Traditional cryptographic and steganographic techniques, while effective individually, often fall short when faced with advanced detection and attack methods, making hybrid security approaches a necessity. In this study, a hybrid security approach combining chaotic algorithms and the Least Significant Bit (LSB) embedding method is proposed. The method is enhanced through key-dependent parameter assignment, as well as additional steps such as transient periods and square matrix transformation. Furthermore, vectorization after square matrix transformation simplified indexing in embedding and extraction steps, thereby improving computational efficiency. As a result, high security and integrity were achieved for both visual and audio data. In the encryption process, seven different chaotic structures (Logistic Map, Lorenz System, Piecewise Linear Chaotic Map, Tent Map, Hénon Map, Chua Circuit, Chebyshev Map) were supported, and the method was tested on these algorithms. The original content was encrypted using XOR and then embedded into the audio signal via the LSB method. The proposed method was evaluated using the EBU SQAM audio dataset and standard test images with Peak Signal-to-Noise Ratio (PSNR), Signal-to-Noise Ratio (SNR), Mean Squared Error (MSE), Structural Similarity Index Measure (SSIM), and Bit Error Rate (BER) metrics. Experimental results demonstrated that for all tests, the extracted images achieved Visual_PSNR = ∞, Visual_SSIM = 1, and Visual_BER = 0. For audio data, PSNR values ranged between 102–107 dB and SNR values approximately 53–99 dB depending on the content type. These findings reveal that the proposed method ensures both the integrity of the content and the reliable preservation of the hidden data.
Downloads
References
Abd, A. S., Al-Thahab, O. Q. J., & Hamad, A. A. (2025). New approach in steganography algorithm by using audio and image as secure information based on chaotic method. International Journal of Sustainable and Smart Energy, 15(2), 349–358. https://doi.org/10.18280/ijsse.150216
Abood, E. W., Abdullah, A. M., Al Sibahee, M. A., Abduljabbar, Z. A., Nyangaresi, V. O., Kalafy, S. A. A., & Ghrabata, M. J. J. (2022). Audio steganography with enhanced LSB method for securing encrypted text with bit cycling. Bulletin of Electrical Engineering and Informatics, 11(1), 185–194. https://doi.org/10.11591/eei.v11i1.3279
Alligood, K. T., Sauer, T. D., & Yorke, J. A. (1996). Chaos: An introduction to dynamical systems. Springer-Verlag.
Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151. https://doi.org/10.1142/S0218127406015970
Alwahbani, S. M. H., & Elshoush, H. T. I. (2018a). Chaos-Based Audio Steganography and Cryptography Using LSB Method and One-Time Pad. In Y. Bi, S. Kapoor, & R. Bhatia (Eds.), Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016 (Vol. 16, pp. 755–768). Springer, Cham. https://doi.org/10.1007/978-3-319-56991-8_54
Alwahbani, S.M.H., Elshoush, H.T.I. (2018b). Hybrid Audio Steganography and Cryptography Method Based on High Least Significant Bit (LSB) Layers and One-Time Pad—A Novel Approach. In: Bi, Y., Kapoor, S., Bhatia, R. (eds) Intelligent Systems and Applications. IntelliSys 2016. Studies in Computational Intelligence, vol 751. Springer, Cham. https://doi.org/10.1007/978-3-319-69266-1_21
Balasubramanian, K., Kannan, N., & Ganesan, T. (2024, November). A novel encrypted data hiding and image encryption for authentication based communication framework. In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE. https://doi.org/10.1109/DELCON64804.2024.10866888
Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749–761. https://doi.org/10.1016/j.chaos.2003.12.022
Chen, Y., Tang, C., & Yi, Z. (2020). A novel image encryption scheme based on PWLCM and standard map. Complexity, 2020, Article 3026972. https://doi.org/10.1155/2020/3026972
Gonzalez, R. C., & Woods, R. E. (2018). Digital image processing (4th ed.). Pearson.
Emin, B., Akgul, A., Horasan, F., Gokyildirim, A., Calgan, H., & Volos, C. (2024). Secure encryption of biomedical images based on Arneodo chaotic system with the lowest fractional-order value. Electronics, 13(11), 2122. https://doi.org/10.3390/electronics13112122
Hénon, M. (1976). A two-dimensional mapping with a strange attractor. Communications in Mathematical Physics, 50(1), 69–77. https://doi.org/10.1007/BF01608556
Hore, A., & Ziou, D. (2010). Image quality metrics: PSNR vs. SSIM. In 2010 20th International Conference on Pattern Recognition (pp. 2366–2369). IEEE. https://doi.org/10.1109/ICPR.2010.579
Horasan, F., Ali Pala, M., Durdu, A., Akgül, A., Akmeşe, Ö. F., & Yıldız, M. Z. (2022). DWT‐SVD Based Watermarking for High‐Resolution Medical Holographic Images. Complexity, 2022(1), 3154650. https://doi.org/10.1155/2022/3154650
Katzenbeisser, S., & Petitcolas, F. A. P. (2000). Information hiding techniques for steganography and digital watermarking. Artech House.
Khalil, N., Sarhan, A., & Alshewimy, M. A. M. (2024). A secure image steganography based on LSB technique and 2D chaotic maps. Computers & Electrical Engineering, 114, 109566. https://doi.org/10.1016/j.compeleceng.2024.109566
Khanzadi, H., Eshghi, M., & Borujeni, S. E. (2014). Image encryption using random bit sequence based on chaotic maps. Arabian Journal for Science and Engineering, 39(2), 1039–1047. https://doi.org/10.1007/s13369-013-0713-z
Kiran, P., & Parameshachari, B. D. (2022). Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocessors and Microsystems, 91, 104546. https://doi.org/10.1016/j.micpro.2022.104546
Korkmaz, Z. Ü. (2025). Chaotic Audio Steganography (v1.0) [Computer software]. GitHub. https://github.com/umitkrkmz/Chaotic_Audio_Steganography
Li, L. (2024). A novel chaotic map application in image encryption algorithm. Expert Systems with Applications, 252(Part B), 124316. https://doi.org/10.1016/j.eswa.2024.124316
Li, S., Mou, X., & Cai, Y. (2001). Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. In C. P. Rangan & C. Ding (Eds.), Progress in cryptology — INDOCRYPT 2001 (pp. 316–329). Springer. https://doi.org/10.1007/3-540-45311-3_30
Lorenz, E. N. (1963). Deterministic nonperiodic flow. Journal of the Atmospheric Sciences, 20(2), 130–141. https://doi.org/10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2
Matsumoto, T. (1987). Chaos in electronic circuits. Proceedings of the IEEE, 75(8), 1033–1057. https://doi.org/10.1109/PROC.1987.13848
May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459–467. https://doi.org/10.1038/261459a0
Nasr, M. A., El-Shafai, W., El-Rabaie, E. S. M., et al. (2024). A robust audio steganography technique based on image encryption using different chaotic maps. Scientific Reports, 14, 22054. https://doi.org/10.1038/s41598-024-70940-3
Oppenheim, A. V., & Schafer, R. W. (2010). Discrete-time signal processing (3rd ed.). Pearson.
Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing (5th ed.). Pearson Education.
Proakis, J. G., & Salehi, M. (2007). Digital communications (5th ed.). McGraw-Hill.
Stallings, W. (2020). Cryptography and network security: Principles and practice (8th ed.). Pearson.
Strogatz, S. H. (2014). Nonlinear dynamics and chaos: With applications to physics, biology, chemistry, and engineering (2nd ed.). Westview Press.
Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4), 600–612. https://doi.org/10.1109/TIP.2003.819861
You, L., Liu, Q., Li, S., & Yang, T. (2025). FDAE: Lightweight privacy protection based on face detection and image encryption. IEEE Access, 13, 123297–123313. https://doi.org/10.1109/ACCESS.2025.3588006
Downloads
Published
Data Availability Statement
The Python-based implementation developed for this study, along with sample datasets and usage guidelines, is publicly accessible (Korkmaz, 2025).
Issue
Section
License
Copyright (c) 2025 Zeynel Ümit Korkmaz, Fahrettin Horasan, Zeynep Çetinkaya

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright of their work and grant the journal the right to publish it under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This allows for maximum dissemination and reuse with appropriate citation.
ORCID 