Open Access iconOpen Access



Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography

Pranati Rakshit1, Sreeparna Ganguly1, Souvik Pal2, Ayman A. Aly3, Dac-Nhuong Le4,5,*

1 JIS College of Engineering, Kalyani, West Bengal, 741235, India
2 Global Institute of Management and Technology, Nadia, West Bengal, 741102, India
3 Department of Mechanical Engineering, College of Engineering, Taif University, Taif, 21944, Saudi Arabia
4 Institute of Research and Development, Duy Tan University, Danang, 550000, Vietnam
5 Faculty of Information Technology, Duy Tan University, Danang, 550000, Vietnam

* Corresponding Author: Dac-Nhuong Le. Email: email

(This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)

Computers, Materials & Continua 2021, 67(1), 1207-1224.


With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security which is nowadays extremely required. The proposed system provides a novel method of information security using the techniques of audio steganography combined with visual cryptography. In this system, we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography. Each of the sub-images is then hidden within individual cover audio files using audio steganographic techniques. The cover audios are then sent to the required destinations where reverse steganography schemes are applied to them to get the incomprehensible component images back. At last, all the sub-images are superimposed to get the actual secret image. This method is very secure as it uses a two-step security mechanism to maintain secrecy. The possibility of interception is less in this technique because one must have each piece of correct sub-image to regenerate the actual secret image. Without superimposing every one of the sub-images meaningful secret images cannot be formed. Audio files are composed of densely packed bits. The high density of data in audio makes it hard for a listener to detect the manipulation due to the proposed time-domain audio steganographic method.


Cite This Article

P. Rakshit, S. Ganguly, S. Pal, A. A. Aly and D. Le, "Securing technique using pattern-based lsb audio steganography and intensity-based visual cryptography," Computers, Materials & Continua, vol. 67, no.1, pp. 1207–1224, 2021.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2593


  • 1905


  • 0


Share Link