Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm

Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selection that is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding technique. As a trade-off exists between capacity...

Full description

Saved in:
Bibliographic Details
Main Authors: Noor Azam, Muhammad Harith, Ridzuan, Farida, Mohd Sayuti, M Norazizi Sham
Format: Article
Language:English
Published: Universiti Utara Malaysia Press 2023
Subjects:
Online Access:https://repo.uum.edu.my/id/eprint/29403/1/JICT%2022%2002%202023%20255-282.pdf
https://repo.uum.edu.my/id/eprint/29403/
https://doi.org/10.32890/jict2023.22.2.5
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selection that is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding technique. As a trade-off exists between capacity and imperceptibility, producing a method focused on optimising both features is crucial. One of the search methods commonly used to find solutions for the trade-off problem in various fields is the Multi-Objective Evolutionary Algorithm (MOEA). Therefore, this research proposed a new method for optimising cover audio selection for audio steganography using the Non-dominated Sorting Genetic Algorithm-II (NSGA-II), which falls under the MOEA Pareto dominance paradigm. The proposed method provided suggestions for cover audio to users based on imperceptibility and capacity features. The sample difference calculation was initially formulated to determine the maximum capacity for each cover audio defined in the cover audio database. Next, NSGA-II was implemented to determine the optimised solutions based on the parameters provided by each chromosome. The experimental results demonstrated the effectiveness of the proposed method as it managed to dominate the solutions from the previous method selected based on one criterion only. In addition, the proposed method considered that the trade-off managed to select the solution as the highest priority compared to the previous method, which put the same solution as low as 71 in the priority ranking. In conclusion, the method optimised the cover audio selected, thus, improving the effectiveness of the audio steganography used. It can be a response to help people whose computers and mobile devices continue to be unfamiliar with audio steganography in an age where information security is crucial.