Open Access Open Access  Restricted Access Subscription or Fee Access

An Enriched Audio Steganography for Secret Message Communication Using Novel Embedding Technique


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v9i10.3808

Abstract


In the last few years the infrastructure for distribution of digital media has grown rapidly. The distribution of such digital media provides an excellent opportunity for transmission of hidden information. Recently, digital steganography has received considerable interest and is used to hide information in carriers such as digital audio, images or video so that only the intended recipient is capable of retrieving the hidden information. This paper proposes a Novel Embedding technique Cross Bit Manipulation Algorithm (CBMA) which embeds the encrypted text file into an Audio file. Here the key of secret message is encrypted using Linear Subsequence Algorithm (LSA) and then embeds it to the Audio file using CBMA.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Cross Bit Manipulation Algorithm; Embed; Encrypt; Linear Subsequence Algorithm; Steganography

Full Text:

PDF


References


Santosa R A., Bao P.,”Audio-to-Image Wavelet Transform based Audio Steganography ,” 47th International Symposium ELMAR-2005, 2005.
http://dx.doi.org/10.1109/elmar.2005.193679

Parul Shah, Pranali and Suresh Sivaraman,” Adaptive Wavelet Packet Based Audio Steganography using Data History,” IEEE Region 10 Colloquium and the Third ICIIS, 2008.
http://dx.doi.org/10.1109/iciinfs.2008.4798397

audio steg: methods - Snotmonkey.com, http://www.snotmonkey.com/work/school/405/methods.html,2005.

Masoud Nosrati , Ronak Karimi Mehdi Hariri,” An introduction to steganography methods”, World Applied Programming, Vol (1), No (3),2011.

Direct-sequence spread spectrum (DSSS), Frequency-hopping spread spectrum (FHSS) Wikipedia, the free encyclopedia, GNU Free Documentation License http://en.wikipedia.org/wiki/Direct- sequence_spread_spectrum, http://en.wikipedia.org/wiki/Frequencyhopping_ spread_spectrum.

Samir Kumar Bandyopadhyay and Barnali Gupta Banik.,” Multi-Level Steganographic Algorithm for Audio Steganography using LSB Modification and Parity Encoding Technique,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 1, Issue 2, July – August 2012

Gattam Sindhuja, Sarvari A.V.P.,” Advanced Composite Communication System,” International Journal of Electronics Communication and Computer Technology (IJECCT), Volume 3 Issue 6 (November 2013).

David Wheeler, Daryl Johnson, Bo Yuan, Peter Lutz.,” Audio Steganography Using High Frequency Noise Introduction,” Rochester Institute of Technology RIT Scholar Works, 2012.

Bommala Suneel Kumar, Satyanarayana S.,”Data Based Text Encrypting in Audio ,” International Journal of Computer and Electronics Research [Volume 2, Issue 4, August 2013].

Haribhau Kachare, Mona Deshmukh.,” Metamorphic Cryptography: A Fusion of Cryptography and Steganography,” International Journal of Engineering and Technical Research (IJETR), Volume-2, Issue-3, March 2014.

Arfan Shaikh, Kirankumar Solanki,Vishal Uttekar, Neeraj Vishwakarma .,” Audio Steganography And Security Using Cryptography,” International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 2, February 2014.

Sakthisudhan and Prabhu P.,” Secure audio steganography for hiding text and audio files,” Advanced Engineering Informatics, 51A (2012) 11069-11072.

Zameer Fatima and Tarun Khanna,”Audio Steganography Using DES Algorithm,” Proceedings of the 5th National Conference; INDIACom-2011. Computing For Nation Development, March 10 – 11, 2011.

Abikoye Oluwakemi C, Adewole Kayode S, Oladipupo Ayotunde J.,” Efficient Data Hiding System using Cryptography and Steganography,” International Journal of Applied Information Systems, 2012 Volume 4 , Number 11.
http://dx.doi.org/10.5120/ijais12-450763

Juhi Saurabh, Asha Ambhaikar.,” Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security,” International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064.

Suryakant Thorat, Madhav Bokare.,” A Dymanic Method To Secure Confidential Data Using Signcryption With Steganography,” [IJESAT] International Journal Of Engineering Science & Advanced Technology, Volume-2, Issue-2, 183 – 191.

Rashmi Mishra, Rupal chauhan, Poonam Jhariya, Priya Mishra, Vaishali Yadav, Tazeem A Hazra.,”Audio Steganography using Matlab ,” International Journal of Engineering, Applied and Management Sciences Paradigms, Vol. 02, Issue 01, April 2013.

Linu Babu, Jais John S, Parameshachari B D,Muruganantham C, H S DivakaraMurthy.,” Steganographic Method for Data Hiding in Audio Signals with LSB & DCT ,” International Journal of Computer Science and Mobile Computing , Vol. 2, Issue. 8, August 2013, pg.54- 62.

Kirti Gandhi, Gaurav Garg, “ Modified LSB Audio Steganography Approach” International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 6, June 2012, pp 158-161.

Bankar Priyanka R., Katariya Vrushabh R., Patil Komal K ,” Audio Steganography Using LSB,” 1st International Conference on Recent Trends in Engineering & Technology, Mar-2012.

Debnath Bhattacharyya, Poulami Dutta, Tai-hoon Kim,” Data Hiding in Audio Signal: A Review,” International Journal of Database Theory and Application,Vol. 2, No. 2, June 2009.
http://dx.doi.org/10.1080/02533839.2012.679054

Vittapu Sravan kumar, Dr.A.Narendra Babu.,” Embedding Cypher Text in Audio Signal Using Steganography Technique ,” International Journal of Engineering Trends and Technology (IJETT) - Volume4 Issue7- July 2013

Blackledge J M., Al-Rawi A I, Blackledge J M, Blackledge J M.,” Multi-Channel Audio Information Hiding,” Proc. of the 15th Int. Conference on Digital Audio Effects (DAFx-12), York, UK , September 17-21, 2012.

Olanrewaju R.F., Othman Khalifa and Husna binti Abdul Rahman.,” Increasing the Hiding Capacity of Low-Bit Encoding Audio Steganography Using a Novel Embedding Technique,” World Applied Sciences Journal 20 (Mathematical Applications in Engineering): 79-83, 2012.

Yedidya Hilewitz, “Advanced Bit Manipulation Instructions: Architecture, Implementation and Applications”, 2008.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize