An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer

Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. Steganography is categorized into diﬀerent types based on the carrier ﬁle being used for embedding data. The audio ﬁle is focused on hiding data in this paper. Human has associated an acute degree of sensitivity to additive random noise. An individual is able to detect noise in an audio ﬁle as low as one part in 10million. Given this limitation, it seems that concealing information within audio ﬁles would be a pointless exercise. Human auditory system (HAS) experiences an interesting behavior known as masking eﬀect, which says that the threshold of hearing of one type of sound is aﬀected by the presence of another type of sound. Because of this property, it is possible to hide some data inside an audio ﬁle without being noticed. In this paper, the research problem for optimizing the audio steganography technique is laid down. In the end, a methodology is proposed that eﬀectively resolves the stated research problem and ﬁnally the implementation results are analyzed to ensure the eﬀectiveness of the given solution.


Introduction
Currently, audio steganography is limited to providing solutions related to copyright and assurance of the integrity of content [1].It is possible to expand its applications to incorporate the embedding of covert communications as well.Various audio steganography strategies are developed and utilized for embedding knowledge in audio files.ese strategies embrace low-bit encoding (LSB), polarity inversion, echo activity, part committal to writing, cepstral activity, sensory activity masking, and spread spectrum [2,3].Low-bit encoding (LSB) is the most famous technique, but it suffers from some severe limitations.Out of other techniques of communication, spread spectrum is receiving increasing attention.Spread spectrum technology forms the premise of spread spectrum steganography [4][5][6][7].Because of the higher data hiding capacity of the low-bit encoding substitution technique, its alternate is expected to have similar capacity while maintaining better robustness and imperceptibility.erefore, there is a requirement for incorporating optimization technique with a steganography method so that the required expectations can be fulfilled effectively [8][9][10][11][12].

Motivation and Scope for Optimization
e effectiveness of a steganography technique is analyzed on the parameters, namely, capacity, imperceptibility, and robustness.In most of the existing techniques, adherence with one of these parameters is usually achieved at the cost of comprising with other parameters.Low-bit encoding or LSB technique is the most commonly used technique [13][14][15][16][17][18][19].
However, the inherent limitations of the LSB method that are listed below inspire to look for an effective and optimized alternate approach [20][21][22][23][24]: (i) LSB method is prone to intentional attacks as data are embedded in LSBs only (ii) Unintentional attacks like noise disturbances are the cause of data loss e literature relevant to audio steganography techniques was studied , and the observations are summarized as a comparison of the techniques on the basic parameters, like robustness, imperceptibility, capacity, and complexity, as shown in Table 1.e analysis says that it is difficult for an existing technique to achieve the satisfactory value of all the comparison parameters.A method that yields high capacity does not have adequate robustness and imperceptibility.Similarly, if robustness was there, the capacity is compromised.erefore, an audio steganography technique needs to be optimized so that the acceptable values of evaluation parameters are achieved.

Problem Formulation
e objective is to design an optimized method that should be having a capacity similar to the LSB technique, but robustness should be high, unlike the LSB method.However, there is always a tradeoff in achieving capacity along with keeping the high value of robustness.
us, the research problem is stated using the following points: (i) An audio steganography technique is desired that should have the capacity comparable to the LSB technique but maintaining a high value of robustness and imperceptibility.(ii) Most of the techniques of implementing audio steganography that possesses satisfactory robustness have less hiding capacity.erefore, the selected technique is customized to meet the requirements.(iii) As a consequence of the customization for high capacity, more distortion will get induced in the cover file after embedding.To minimize that distortion, an optimization algorithm is used in coordination with the embedding algorithm.(iv) e sequence of embedding message bits in the audio file should not be obvious.e embedding pattern is expected to be as less predictable as possible to make the technique more secure.

Proposed Methodology
e proposed methodology resolves the research problem in an efficient manner.A coordinated approach using spread spectrum steganography, SITO, and chaos theory works in a way that the objectives of the research problem are satisfied.
e underlying representation of the proposed method is shown in Figure 1.
e proposed method comprised the following basic modules: (i) Chaotic system: chaotic map is used to provide required randomness as the pseudorandom numbers generated through some random library function result in a repetition of some pattern to be used for substitution.e cross correlation between two consecutive numbers generated through chaotic map approaches to zero.e key is obtained using logistic maps of chaos theory.(i) Spread spectrum: spread spectrum technique of implementing audio steganography is used as one of the prime components of the proposed solution.
Because of its inherent robustness, difficult to intercept, and hard to interference, the technique is the first choice in solving the given research problem.(ii) Social impact theory optimization: to minimize the distortion induced in audio samples because of embedding, social impact theory optimization (SITO) is used.In recent researches, SITO has outperformed genetic algorithm (GA) and particle swarm optimization (PSO) in achieving optimum results.e algorithm evolves iteration by iteration based on some objective functions and guarantees a nearly optimal solution at the end.e stopping criterion for the algorithm in the current research is the number of iterations.

Proposed Algorithm.
e methodology starts with a capacity check operation to verify the capability of the chosen cover audio file to embed the secret message of given

2
Journal of Computer Networks and Communications size successfully.After that, the cover audio file is transformed into its equivalent spread spectrum.Simultaneously, the secret message is converted into its binary equivalent.e required random sequence that acts as a key to guide the spreading of message bits over the entire spectrum of the cover file is obtained using the logistic map of chaotic theory.e embedding step is repeated until the complete message is hidden inside the cover file.e amount of data that is embedded per sample of the audio file is comparatively more so that capacity is increased.e initial values are calculated for evaluation parameters as well as the objective function.
e proposed algorithm is given in Algorithm 1.
In order to optimize the value of the objective function, SITO is used.e values of evaluation parameters are improved with the iterations of the optimization algorithm.e SITO terminates when an acceptable value of evaluation parameters is achieved or the number of iterations is over.
e flow chart given in Figure 2 describes the proposed methodology.

Objective Function.
e objective is to minimize MSE and maximize PSNR and SSIM.e aggregate function used here is a minimizing function given as where MSE stands for mean square error, PSNR stands for peak signal to noise ratio, and SSIM stands for structural similarity index.

Implementation
MATLAB is a multiparadigm environment developed for numerical computing primarily.With time, it got equipped with a list of toolboxes developed for specific needs.Initially, the command window was the only way to interact for executing files.Later, an additional feature of graphical interface benefitted the users.An image is taken as secret data to be embedded in audio.
Histogram representation of an image is a popular way of analyzing images.
Either the histograms can be taken of the single channel out of RGB or it can be taken of RGB in aggregate.e given histograms are obtained for blue channels of the image before embedding and extracted image.Similarly, analysis of histograms of red and green color can be done.e histogram comparisons in Figure 3 say that a histogram of the message extracted after embedding using the proposed method is closer to the histogram of the original image.

Frequency Spectrum of Cover Audio and Stego Audio.
Obtaining the frequency spectrum is a universal and straightforward technique to analyze an electric signal.Figure 4 represents the snapshots of the frequency spectrum of the audio signal before and after embedding.Frequency spectrums of the stego files after embedding of the secret message using the proposed algorithm and prior to embedding are obtained, and the snapshots are captured for the same interval so as to fit them on page size, as shown in Figure 4. e frequency spectrum of the stego audio is very similar to that of cover audio.Since the audio file is of long duration, the snapshots are captured for a specific time interval, as shown in Figure 4.

Analysis
Using PSNR, MSE, and SSIM.PSNR, MSE, and SSIM have been widely accepted as a measure of quality.To verify the quality of the proposed method, the variation of PSNR, MSE, and SSIM values is obtained.PSNR and MSE are to calculate absolute error, but SSIM gives a measure of error in the structure.
It also looks for intensity, brightness, and other parameters that are related to the structure of an image.e unit of measuring PSNR is dB, and the acceptable value is greater than 45 dB, whereas MSE has the unit square of the unit of the quantity being measured.e desired value of   MSE should be approaching to "0." e value of SSIM lies between "− 1" and "+1." e desired value of SSIM should be approaching to "+1." "0" value indicates no similarity while value "+1" indicates that both images are identical.e results show that the improvement is significant and it would be increasing with the increase in some iteration of the proposed method.Figure 5 shows the PSNR, MSE, and SSIM variation as per the increasing iterations that reflect the significant improvement gained by using the proposed work.

Visual Inspection of Original Message and Extracted
Message.
e secret messages before embedding and the hidden messages extracted from stego file are compared and analyzed for any visually noticeable differences in Figure 6.
e authentic recipient can easily recognize and evaluate secret message after extraction from stego audio file.e use of some reconstruction algorithm at the receiver's end may result in an identical image available for processing after extraction.

Robustness Measurement.
Robustness is that property of the watermarked data that make its presence silent even after attacked with general signal processing attacks [50,51].e most common parameter for measuring robustness is the correlation coefficient.e higher value of correlation coefficient of original image and watermarked image is a measure of more robustness.
e audio cover file with embedded watermarked is attacked with compression.e correlation coefficient was calculated after the attack for both the secret messages.
e average value of correlation coefficient (Corr avg ) comes out to be 0.85.

Comparison with Existing Techniques.
It is essential to examine and compare the efficacy of the proposed research with the preexisting techniques in a similar domain.e proposed work of optimizing audio steganography using social impact theory optimization is compared with some of the existing methods on different parameters like PSNR, MSE, and SSIM.
e comparison is made using the following: (i) the traditional LSB method, (ii) another optimized steganography technique where algorithm used for optimization is GA, and (iii) the implementation work done by Chen and Huang [1].7, with the LSB method, with GA, and with the research work of Chen and Huang [1].It is observed from these graphs that the PSNR achieved is satisfactory while SITO is used for optimization in the proposed work.

Comparison of PSNR Variation. PSNR variation is compared in Figure
However, the graph diverges further when the number of iterations increases.
e proposed work outperforms the

Journal of Computer Networks and Communications
LSB technique and the method of Chen and Huang [1] in case of PSNR variation.e performance greatly improves when the algorithm iterates SITO for more number of times.Figure 7 also indicates that the proposed method is far better than the LSB technique in the attainment of PSNR.Moreover, improvement in the PSNR value was observed even after few initial iterations.Similarly, GA behaves like as proposed work in initial few iterations, but after that, the variation of PSNR with respect to increase in the number of iterations starts decreasing.However, PSNR values attained by using proposed work and GA differ in the range of "0" dB to "5" dB maximum.It can be seen from the figure that the research work done by Chen and Huang [1] behave similar to the least significant bit method in the attainment of PSNR.Proposed works attain considerably greater values of PSNR as compared to the research work of Chen and Huang [1] with respect to the increase in the number of iterations.
e comparison of PSNR variation also shows that LSB technique behaved in the least effective way, while GA was comparable to the proposed method and the third one behaved in a moderate way.

Comparison of MSE Variation.
It was observed while comparing the proposed work with the LSB method, GA, and the method of Chen and Huang [1] that GA and LSB yielded almost similar results; however, the proposed work outperformed other three techniques in this category of comparison of MSE variation.
Starting from a very high value of MSE, the proposed algorithm abruptly comes down and sooner attains the acceptance value.One more fact observed from the graphs given in Figure 8 is a little variation of MSE in all the three techniques except SITO.6.6.3.Comparison of SSIM Variation.Structural similarity index (SSIM) is a way of measuring degradation in the quality of an image because of some processing task.
e acceptable value of SSIM should be close to one.From Figure 9, it is clear that the proposed method achieves a better value of SSIM as compared to LSB, GA, and research of Chen and Huang [1].However, GA performs better than the other two techniques.[50] and Lei et al. [51].e attainment of imperceptibility and robustness depends largely on scaling parameter chosen for embedding.Most of the audio steganography implementations use static value of the scaling parameter for simplicity.In the work done by Su et al. [50], an optimal method for the selection of scaling parameter is described that needs comparatively less computation.e optimal selection of the value of scaling parameter results in higher SNR value and larger robustness (correlation coefficient up to 0.99).On the other hand, Lei et al. [51] suggested a customized objective function and used self-adaptive particle swarm optimization technique along with quaternion wavelet transform.In their approach, a higher value of coefficient correlation (0.99, best value) is achieved.It can be said that the optimal choice of scaling parameter in [50] and use of modified PSO in [51] outperformed the current work.

Conclusion
e problem of finding an audio steganography technique with acceptable values of capacity, robustness, and imperceptibility is resolved using the proposed methodology.e characteristics of spread spectrum that makes it secure against interception and interference provide the required robustness.e prime security of steganography lies in difficulty to know the hiding pattern used for embedding.us, the security is ensured by making the embedding pattern truly random by utilizing chaos theory using logistic maps.
Capacity is increased by spreading a greater number of bits over the entire spectrum of a sample.is enhancement would increase the distortion too.e SITO maintains the distortion at an optimum level and optimizes the audio steganography technique to achieve the satisfactory value of the objective function.It is observed from the analysis of different graphs that significant improvement has been achieved by using social impact theory optimizer.e performance of the proposed research work improves further with the increase in the number of iterations of SITO execution.Various quality measures (PSNR, MSE, and SSIM) achieved values up to satisfaction.In some cases, GA performed somewhere close to SITO but the performance gain observed by using SITO as an optimization algorithm is more significant.e proposed methodology successfully achieves the research objectives of optimizing an audio steganography algorithm in such a way that each parameter out of robustness, capacity, and imperceptibility is attained to the satisfaction.

Figure 3 :
Figure 3: Histograms of (a) original message and (b) extracted message.

Figure 2 :
Figure 2: Flow chart of the proposed methodology.

Figure 4 :
Figure 4: Frequency spectrum of cover audio (a) and stego audio (b).

( 1 )
Comparison of PSNR, MSE, and SSIM Value Attainment.Figures 10-12 compare the PSNR, MSE, and SSIM values achieved in each of the techniques discussed above.It is clearly deduced from the respective figures that the proposed methodology attains satisfactory and better values of PSNR, MSE, and SSIM comparatively.Genetic algorithm also performed well in attaining the evaluation parameters, but still it could not overtake the proposed work.

Figure 8 :
Figure 8: Comparison of MSE variation with (a) LSB, (b) GA, and (c) the method of Chen and Huang [1].

Table 1 :
Comparison of audio steganography techniques.