Secure Audio Steganography Using Vectorized LSB and Chaos-Based Encryption

Authors

DOI:

https://doi.org/10.64470/elene.2025.12

Keywords:

Audio Stenography, Chaotic Algorithms,, LSB Data Hiding , Data Security, Hybrid Encryption

Abstract

In the era of digital transformation, the protection of sensitive multimedia data against growing cyber threats has become increasingly critical. Traditional cryptographic and steganographic techniques, while effective individually, often fall short when faced with advanced detection and attack methods, making hybrid security approaches a necessity. In this study, a hybrid security approach combining chaotic algorithms and the Least Significant Bit (LSB) embedding method is proposed. The method is enhanced through key-dependent parameter assignment, as well as additional steps such as transient periods and square matrix transformation. Furthermore, vectorization after square matrix transformation simplified indexing in embedding and extraction steps, thereby improving computational efficiency. As a result, high security and integrity were achieved for both visual and audio data. In the encryption process, seven different chaotic structures (Logistic Map, Lorenz System, Piecewise Linear Chaotic Map, Tent Map, Hénon Map, Chua Circuit, Chebyshev Map) were supported, and the method was tested on these algorithms. The original content was encrypted using XOR and then embedded into the audio signal via the LSB method. The proposed method was evaluated using the EBU SQAM audio dataset and standard test images with Peak Signal-to-Noise Ratio (PSNR), Signal-to-Noise Ratio (SNR), Mean Squared Error (MSE), Structural Similarity Index Measure (SSIM), and Bit Error Rate (BER) metrics. Experimental results demonstrated that for all tests, the extracted images achieved Visual_PSNR = ∞, Visual_SSIM = 1, and Visual_BER = 0. For audio data, PSNR values ranged between 102–107 dB and SNR values approximately 53–99 dB depending on the content type. These findings reveal that the proposed method ensures both the integrity of the content and the reliable preservation of the hidden data.

Downloads

Download data is not yet available.

Author Biography

  • Zeynep Çetinkaya, Kırıkkale University

    Zeynep Çetinkaya holds bachelor's degrees in both Computer Engineering and Food Engineering, and she is currently pursuing her master’s degree in Computer Engineering. She has been conducting academic research for approximately three years. Her research interests include data mining, machine learning, optimization algorithms, data hiding, and digital watermarking.

References

Abd, A. S., Al-Thahab, O. Q. J., & Hamad, A. A. (2025). New approach in steganography algorithm by using audio and image as secure information based on chaotic method. International Journal of Sustainable and Smart Energy, 15(2), 349–358. https://doi.org/10.18280/ijsse.150216

Abood, E. W., Abdullah, A. M., Al Sibahee, M. A., Abduljabbar, Z. A., Nyangaresi, V. O., Kalafy, S. A. A., & Ghrabata, M. J. J. (2022). Audio steganography with enhanced LSB method for securing encrypted text with bit cycling. Bulletin of Electrical Engineering and Informatics, 11(1), 185–194. https://doi.org/10.11591/eei.v11i1.3279

Alligood, K. T., Sauer, T. D., & Yorke, J. A. (1996). Chaos: An introduction to dynamical systems. Springer-Verlag.

Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151. https://doi.org/10.1142/S0218127406015970

Alwahbani, S. M. H., & Elshoush, H. T. I. (2018a). Chaos-Based Audio Steganography and Cryptography Using LSB Method and One-Time Pad. In Y. Bi, S. Kapoor, & R. Bhatia (Eds.), Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016 (Vol. 16, pp. 755–768). Springer, Cham. https://doi.org/10.1007/978-3-319-56991-8_54

Alwahbani, S.M.H., Elshoush, H.T.I. (2018b). Hybrid Audio Steganography and Cryptography Method Based on High Least Significant Bit (LSB) Layers and One-Time Pad—A Novel Approach. In: Bi, Y., Kapoor, S., Bhatia, R. (eds) Intelligent Systems and Applications. IntelliSys 2016. Studies in Computational Intelligence, vol 751. Springer, Cham. https://doi.org/10.1007/978-3-319-69266-1_21

Balasubramanian, K., Kannan, N., & Ganesan, T. (2024, November). A novel encrypted data hiding and image encryption for authentication based communication framework. In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE. https://doi.org/10.1109/DELCON64804.2024.10866888

Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749–761. https://doi.org/10.1016/j.chaos.2003.12.022

Chen, Y., Tang, C., & Yi, Z. (2020). A novel image encryption scheme based on PWLCM and standard map. Complexity, 2020, Article 3026972. https://doi.org/10.1155/2020/3026972

Gonzalez, R. C., & Woods, R. E. (2018). Digital image processing (4th ed.). Pearson.

Emin, B., Akgul, A., Horasan, F., Gokyildirim, A., Calgan, H., & Volos, C. (2024). Secure encryption of biomedical images based on Arneodo chaotic system with the lowest fractional-order value. Electronics, 13(11), 2122. https://doi.org/10.3390/electronics13112122

Hénon, M. (1976). A two-dimensional mapping with a strange attractor. Communications in Mathematical Physics, 50(1), 69–77. https://doi.org/10.1007/BF01608556

Hore, A., & Ziou, D. (2010). Image quality metrics: PSNR vs. SSIM. In 2010 20th International Conference on Pattern Recognition (pp. 2366–2369). IEEE. https://doi.org/10.1109/ICPR.2010.579

Horasan, F., Ali Pala, M., Durdu, A., Akgül, A., Akmeşe, Ö. F., & Yıldız, M. Z. (2022). DWT‐SVD Based Watermarking for High‐Resolution Medical Holographic Images. Complexity, 2022(1), 3154650. https://doi.org/10.1155/2022/3154650

Katzenbeisser, S., & Petitcolas, F. A. P. (2000). Information hiding techniques for steganography and digital watermarking. Artech House.

Khalil, N., Sarhan, A., & Alshewimy, M. A. M. (2024). A secure image steganography based on LSB technique and 2D chaotic maps. Computers & Electrical Engineering, 114, 109566. https://doi.org/10.1016/j.compeleceng.2024.109566

Khanzadi, H., Eshghi, M., & Borujeni, S. E. (2014). Image encryption using random bit sequence based on chaotic maps. Arabian Journal for Science and Engineering, 39(2), 1039–1047. https://doi.org/10.1007/s13369-013-0713-z

Kiran, P., & Parameshachari, B. D. (2022). Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocessors and Microsystems, 91, 104546. https://doi.org/10.1016/j.micpro.2022.104546

Korkmaz, Z. Ü. (2025). Chaotic Audio Steganography (v1.0) [Computer software]. GitHub. https://github.com/umitkrkmz/Chaotic_Audio_Steganography

Li, L. (2024). A novel chaotic map application in image encryption algorithm. Expert Systems with Applications, 252(Part B), 124316. https://doi.org/10.1016/j.eswa.2024.124316

Li, S., Mou, X., & Cai, Y. (2001). Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. In C. P. Rangan & C. Ding (Eds.), Progress in cryptology — INDOCRYPT 2001 (pp. 316–329). Springer. https://doi.org/10.1007/3-540-45311-3_30

Lorenz, E. N. (1963). Deterministic nonperiodic flow. Journal of the Atmospheric Sciences, 20(2), 130–141. https://doi.org/10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2

Matsumoto, T. (1987). Chaos in electronic circuits. Proceedings of the IEEE, 75(8), 1033–1057. https://doi.org/10.1109/PROC.1987.13848

May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459–467. https://doi.org/10.1038/261459a0

Nasr, M. A., El-Shafai, W., El-Rabaie, E. S. M., et al. (2024). A robust audio steganography technique based on image encryption using different chaotic maps. Scientific Reports, 14, 22054. https://doi.org/10.1038/s41598-024-70940-3

Oppenheim, A. V., & Schafer, R. W. (2010). Discrete-time signal processing (3rd ed.). Pearson.

Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing (5th ed.). Pearson Education.

Proakis, J. G., & Salehi, M. (2007). Digital communications (5th ed.). McGraw-Hill.

Stallings, W. (2020). Cryptography and network security: Principles and practice (8th ed.). Pearson.

Strogatz, S. H. (2014). Nonlinear dynamics and chaos: With applications to physics, biology, chemistry, and engineering (2nd ed.). Westview Press.

Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4), 600–612. https://doi.org/10.1109/TIP.2003.819861

You, L., Liu, Q., Li, S., & Yang, T. (2025). FDAE: Lightweight privacy protection based on face detection and image encryption. IEEE Access, 13, 123297–123313. https://doi.org/10.1109/ACCESS.2025.3588006

Downloads

Published

2025-12-24

Data Availability Statement

The Python-based implementation developed for this study, along with sample datasets and usage guidelines, is publicly accessible (Korkmaz, 2025).

Issue

Section

Research Articles

How to Cite

Korkmaz, Z. Ümit, Horasan, F., & Çetinkaya, Z. (2025). Secure Audio Steganography Using Vectorized LSB and Chaos-Based Encryption. Electrical Engineering and Energy, 4(3), 68-86. https://doi.org/10.64470/elene.2025.12