z-logo
Premium
A steganographic method based on optimized audio embedding technique for secure data communication in the internet of things
Author(s) -
S Anguraj,
S P Shantharajah,
J Jeba Emilyn
Publication year - 2020
Publication title -
computational intelligence
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.353
H-Index - 52
eISSN - 1467-8640
pISSN - 0824-7935
DOI - 10.1111/coin.12253
Subject(s) - computer science , steganography , least significant bit , robustness (evolution) , audio over ethernet , audio signal , embedding , speech recognition , digital audio , speech coding , artificial intelligence , gene , operating system , biochemistry , chemistry
The rapid growth of the internet and the internet of things (IoT) refers to the next phase of information revolution whose context involves billions of smart devices and sensors interconnected to facilitate speedy information and data exchange under soft real‐time constraints. Digital information revolution has caused significant changes in the data communication. This data communication may require private, secure, and sometimes malicious communication. Competent secrecy can be accomplished by applying novel and inventive audio steganography. This article focuses on the secret message followed by shuffled embedded bit substitution in original audio stream by adopting optimized audio embedding technique (OAET) from the technological observation. To hide the information in the deeper layer of the audio stream, this method uses a new elevated bit range least significant bit (LSB) audio steganography technique that decreases distortion and improves the robustness of the embedded audio stream. The proposed technique proves that the perceptual quality of audio steganography is better than the previous standard LSB technique. Experiment results proved that the cladding of the OAET provides high‐level security to the universal cyber data. The interpretation of results shows that embedding data in audio enhances the level of security when used as IoT smart speakers, where the attackers could not distinguish between the original audio and the embedded audio streams.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here