Using Rubik’s Cube and a Modified LSB for Audio Steganography

Kaziwa Saleh1 , Mihran Muhammad1 , Khanda Ahmed1

1Department of Computer Science, School of Science, University of Sulaimani, Sulaimani, Kurdistan Region - Iraq

Nowadays steganography plays an important role in information security. There are
various techniques to apply steganography; one such technique is Least Significant
Bit (LSB). Due to consecutive embedding of data, LSB is highly vulnerable to data
retrieval and manipulation. This study proposes a mixture between Rubik’s cube
principle to scramble the audio data, and a modified LSB technique to hide the secret
data. The modified LSB technique includes embedding using only irredundant bits of
binary representation of each character in the secret message, and hiding in the lowest
sample between two consecutive samples of the cover audio. The used technique
makes the retrieval of secret message harder because it adds two levels of protection
(scrambling, and hiding in the lowest sample) against the attempts of obtaining data;
and makes the embedded data imperceptible.

Key Words: Audio Steganography LSB, Rubik's Cube


[1] A.P. Sherly, Sapna Sasidharan, Ashji S. Raj, P. P.Amritha. A novel approach for compressed video
steganography. In: N. Meghanathan, S. Boumerdassi, N. Chaki and D. Nagamalai recent trends in network
security and applications. Berlin Heidelberg: Springer. 567-575 (2010).
[2] Johnson, N., Duric, Z. and Jajodia, S. Information Hiding: Steganography and Watermarking-Attacks and
Countermeasures. Boston, MA: Springer US (2001).
[3] Nosrati, M., Karimi, R. and Hariri, M. Audio Steganography: A Survey on Recent Approaches. World Applied
Programming, 2(3), pp.202-205(2012).
[4] Kumar, H. and Anuradha. Enhanced LSB technique for Audio Steganography. In: Third International
Conference on Computing communication and networking technologies. IEEE, pp.1-4 (2012).
[5] Amirtharajan, R., Abhiram, M., Revathi, G., Reddy, J., Thanikaislevan, V. and Rayappan, J. Rubik's cube: A
Way for random image steganography. Research Journal of Information Technology, 5(3), pp.329-340(2013).
[6] Yen, E. and Lin, L. Rubik’s cube watermark technology for grayscale images. Expert Systems with
Applications, 37(6), pp.4033-4039(2010).
[7] Loukhaoukha, K., Chouinard, J. and Berdai, A. A secure image encryption algorithm based on Rubik's cube
principle. Journal of Electrical and Computer Engineering, 2012, p.7(2012).
[8] Rhine, R. and T Bhuvan, N. Image Scrambling Methods for Image Hiding: A Survey. International Journal of
Computer Science and Information Technologies, 5(1), pp.751-755(2014).
[9] Abu Zaher, M. Modified Least Significant Bit (MLSB). Computer and Information Science, 4(1), p.60 (2010).
[10] P. Adhiya, K. and A. Patil, S. Hiding Text in Audio Using LSB Based Steganography. Information and
Knowledge Management, 2(3), pp.8-14(2012).