Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2014
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate rotation because of the significance, accuracy and sensitivity of the information. Steganography and Cryptography are considered as one of the techniques which are used to protect the important information, but both techniques have their pro's and con's. This paper aims to conquer their respective drawbacks and to achieve this we are using a double layer protection technique which is cryptography cum steganography approach.
International Journal of Computer Applications
Steganography is a science to hide information, it hides a message to another object, and it increases the security of data transmission and archiving it. In the process of steganography, the hidden object in which data is hidden the carrier object and the new object, is called the steganography object. The multiple carriers, such as text, audio, video, image and so can be mentioned for steganography; however, audio has been significantly considered due to the multiplicity of uses in various fields such as the internet. For steganography process, several methods have been developed; including work in the temporary and transformation, each of has its own advantages and disadvantages, and special function. In this paper we mainly review and evaluate different types of audio steganography techniques, advantages and disadvantages.
Audio as a cover mediu m in steganography has its own place due to its bigger size compare to other carrier's file like (text, image, etc.). So there are more possibilities to hide large amount of data inside audio as a cover. There are also some inherent characteristics in Hu man Auditory System (HAS), which make it great success in field of Steganogarphy. Dig ital contents are easy to be pirated and to be distributed in today's world. Recently created technology on web increases the rate of data transmission, open new possibilit ies for audio steganography. Digital steganography is based on the fact that artifacts like audio files contain redundant informat ion, so instead of eliminating the redundant information, we replace some of it with other data based on human auditory system. Audio steganography, or information hiding in audio signals, is gaining widespread importance for secure communication of informat ion such as covert battlefield data. On another level, watermarking of audio signals for digital rights management is becoming vital to prevent illegal copying, file sharing, etc. In fact, when co mmunicat ion about highly confidential topics is needed, steganography combined with cryptography would be the most secure way to go. Because the mere existence of an encrypted communication draws attention to it, hiding it in another file ups your security level substantially. In this paper we will take an in-depth look at this technology by introducing the reader to various existent methods of Audio Steganography, its practical applications, what works, what does not, and possible research areas.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Today, the protection is getting the imperative interest due to the elevated use of internet. As the use of internet is increased, the charge at which the records are interchanged per day is additionally increased. The data that is interchanged every day might also turn out to be the target of fraudsters. To take action to do something in particular to resolve this hassle one of the powerful technology is the Steganography. The Steganography is a process of concealing secret information behind an harmless cover file, such that the existence of information is no longer usually admitted. This paper uses the idea of Audio and Video Steganography, where the data is hidden behind the audios and frames of videos.
Journal of emerging technologies and innovative research, 2018
Abstract: In the current internet scenario, secure data transmission is limited due to its attack, interception and manipulation by eavesdropper. So more robust methods are required to ensure data transmission. One solution to the above problem is steganography, which is the art and science of writing message in such a way that no one can detect the existence of the hidden message. Audio steganography hide the secret message in cover audio file in an undetectable way. This paper proposes a method MAES (Modified Advance Encyption Standard) advance 3 levels LSB embedding technique with secret data. The main objective of the proposed system is to provide high audio quality, robustness, high embedded bit rate and computed using PSNR, MSE values for various audio signals.
Today's internet community the secure data transfer is bounded due to its attack on data communication. Security of data can be achieved by implementing steganography techniques. All of the existing steganographic techniques use the digital multimedia files as a cover medium to conceal secret data. Audio file use as a cover medium in steganography because of its larger size compare to other carrier's file such as text, image. So there are more possibilities to hide large amount of data inside digital audio file. Signals and digital audio files make suitable mediums for steganography because of its high level of redundancy and high data transmission rate. This is not easy to hide data in real time communication audio signals. In this paper we will survey the overall principles of hiding secret data in audio file using audio data hiding techniques, and deliver an overview of present techniques and functions and also discuss the advantages and disadvantages of different types of audio steganography methods. In this paper we have proposed a new method of audio steganography incorporating encryption and pseudorandom sequence as a key. The secret data has been encrypted using RSA and pseudorandom sequence. The encrypted data is then embedded in the audio signals. The use of the pseudorandom sequence increases the complexity of the encryption and the RSA algorithm gives a very tight cipher design.
Steganography is essentially a security system which is utilized to shroud the private or mystery information. This mystery information is inserted or hid in a manner that no other individual separated from the sender or beneficiary can seize it. Audio Steganography is a piece of steganography in which the spread media utilized is a sound document, by changing a data in an intangible way. The cryptographic strategies in audio steganography "scramble" messages so if caught, the messages can't be comprehended, while, inserting, "covers" a message to shroud its presence and concealing the way that a message is being sent out and out. Inserting is not expected to supplant cryptography but rather supplement it and it is a more perplexing system. Presently, because of the accessibility of repetition the first message before inserting and the stego message after extraction continues as before, in this manner keeping up its trustworthiness. Audio Steganography can ac...
2022
Security is the major challenge of digital communication. Cryptography and steganography are two common methods available to ensure security.Steganography is the term used to hide secret messages in a text, audio or image file.Modern methods are necessary to keep information secret and to protect it from the growing danger of external hackers.Steganography makes it possible to transmit information through communication channels. In this work we have focused on digital audio as the carrier and cover file. Audio steganography is a method to safely conceal a secret message into an audio cover file in various ways.The audio files are in the standard WAV format, in which the secret message is embedded by using the LSB algorithm. The secret message gets encrypted using the RSA algorithm before the embedding process. This combination is providing two level security to the secret message to be transmitted.
2020
Steganography conceals the existence of secret information, while cryptography hides the meaning of the confidential information. Therefore, combining these two can provide a secure communication between a sender and a receiver. This article proposes a double-layer message security scheme where cryptography is the first layer and steganography is the second layer. AES-256, Blowfish, or a Logistic map is used in the cryptography layer. The LSB substitution technique is used for the steganography layer to embed a secret message inside cover audio. The LSB substitution technique is applied by alternating between the left and the right channels, respectively. Performance of the proposed schemes is evaluated in terms of a hearing test, running time, embedding capacity, waveform plots, as well as a large number of statistical, time-domain, and frequency-domain metrics. Furthermore, a comparison between the proposed scheme using AES-256 and its counterparts from the literature is also provided. The numerical results show that the proposed schemes exhibit very good performance.
IJCA Proceedings on …, 2012
In present day to day life, effective data hiding methods are needed due to attack made on data communication. This paper presents the technique for the above requirement. In this proposed method, secret message in form of audio file is embedded within another carrier audio file (. wav) . In the transmitter end the output will be similar to the carrier with secret message embedded inside. The hacker will be blinded by the transmitted signal. At the receiver end the original message can be retrieved without any loss. The entire proposed system is simulated and their corresponding waveforms prove the effectiveness of this method.
EURASIP Journal on Audio, Speech, and Music Processing, 2012
The rapid spread in digital data usage in many real life applications have urged new and effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by implementing steganograhy techniques. Novel and versatile audio steganographic methods have been proposed. The goal of steganographic systems is to obtain secure and robust way to conceal high rate of secret data. We focus in this paper on digital audio steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital audio steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. Another contribution of this paper is the provision of a robustness-based classification of steganographic models depending on their occurrence in the embedding process. A survey of major trends of audio steganography applications is also discussed in this paper.
2013
In this paper In this paper, the proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. The performed computer simulation demonstrates the high efficiency of the proposed technique and the analytical comparative analysis indicates a number of advantages in comparison with the existed steganography software. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points The first to employ hidden communications techniques -with radio transmissionswere the armies, because of the strategic importance of secure communication and the need to conceal the source as much as possible. Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This s...
International Journal of Computer Applications, 2011
In this paper, we propose a new approach which is sophisticated for concealing the data. We are using Audio Steganography to make the confidential data more secure, so that the data cannot be tracked and modified by the intruders. To make the confidential data secure we are using efficient and reliable algorithms. This paper describes how the data is secured form the intruders even though they trace the audio file which contains the confidential data.
This research paper illustrates the concept of implementing steganography in a way that the text is converted into an audio file and on extraction we get it back in the text format. Steganography is a technique of data hiding and we are accomplishing this by converting the text file into an audio file and after extraction the text file will be extracted from the audio and the data can be read. This is a great technique to hide data, no one can recognize that even an audio can have a data in text format and data will be transferred safely. This will be helpful for RAW, IB, CBI and many other associations that want to secure their confidential data. It will be greatest technique in future after enhancement at certain level.
International Journal of Computer Applications, 2014
Today's internet community the secure data transfer is bounded due to its attack on data communication. Security of data can be achieved by implementing steganography techniques. All of the existing steganographic techniques use the digital multimedia files as a cover mediums to conceal secret data. Audio file use as a cover medium in steganography because of its larger size compare to other carrier's file such as text, image. So there are more possibilities to hide large amount of data inside digital audio file. Signals and digital audio files make suitable mediums for steganography because of its high level of redundancy and high data transmission rate. This is not easy to hide data in real time communication audio signals. In this paper we will survey the overall principles of hiding secret data in audio file using audio data hiding techniques, and deliver an overview of present techniques and functions and also discuss the advantages and disadvantages of different types of audio steganographic methods.
Watermarking has been proposed as a solution to the problem of resolving Copyright ownership of multimedia data (image, audio, video). The work presented in this thesis is concerned with the design of robust digital image watermarking algorithms of least significant bit (LSB) algorithm for copyright protection and similarly the voice is compressed by using linear predictive code (LPC) algorithm, It is one of the most powerful speech analysis techniques, and one of the most useful methods for encoding good quality speech at a low bit rate and provides extremely accurate estimates of speech parameters. Finally hide the watermarked image and compressed voice by using Steganographic method. Steganography is an art of sending hidden data or a secret message over a public channel so that a third party cannot detect the presence of the secret message. Firstly, an overview of the watermarking system, applications of watermarking and attacks, are given. The robustness of the data is very important issue in watermarking. The watermarking algorithm which requires the presence of original image for watermark detection.
2015
Communication of data in public requires data to be transmitted in robust and secure manner. Also, excessive use of digital data in various fields of life demands a secure system. Various techniques such as cryptography, steganography and watermarking have been established. Among these steganography provides better confidentiality as it is the practice of hiding data within data. In digital media steganography, text files, images, audio as well as video are used as carrier. We focus in this paper on digital audio as the carrier. In this paper, a survey on latest audio steganographic methods is carried out along with their strength and weakness. Also, comparison between various steganographic methods based on robustness is carried out. Another contribution of this paper is evaluation of performance of various reviewed steganography techniques.
we can communicate with each other by passing messages which is not secure, but we make a communication be kept secret by embedding the message into carrier or by special tools such as invisible ink, microdots etc. Steganography is the science that involves communicating secret data in an appropriate carrier which is used from hundreds of years. In digital age new techniques of hiding the data inside the carrier are invented which are known as digital steganography. Nowadays, the carrier of the message can be an image, audio, video or a text file. In this paper we have purposed a method to enhance the security level in audio steganography and also improve the quality by making 2-level steganography.
Today's increasing demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. Large number of digital audio files is copied illegally during file sharing over the network, costing huge loss to the music and broadcast industries. As a solution to this problem, it is required to secure system to send data safely. For having this security conventional system uses techniques such as cryptography steganography or watermarking. Cryptographic technique distorts the information in such a way that it cannot be recognized. Watermarking is the process of embedding into a digital file such a way that its removal is hardly possible. Steganography, which is the art and science of writing hidden messages in such a way that no one, apart from the sender and intend recipient, suspects the existence of the message, a form of security through obscurity. Audio steganography is the scheme of hiding the existence of secret information by concealing it into another medium such as audio file. The purpose of this paper is to propose an enhanced technology for hiding audio signal by combining cryptography steganography and watermarking. The experimental results show that the proposed system has high perceptual transparency, hiding capacity and robustness which is required for an efficient hiding model.
2012
Introduction Steganography, coming from the Greek words stegos, meaning roof or covered and graphia which means writing. It is the art and science of hiding the fact that communication is taking place. Using the steganography, we can embed a secret message inside a piece of unsuspicious information and Send it without anyone knowing of the existence of the secret message. Steganography and cryptography are closely related. Cryptography scrambles messages so they cannot be understood. Steganography on the other hand, will hide the message so there is no knowledge of the existence of the message in the first place. In some situations, sending an encrypted message will arouse suspicion while an invisible message will not do so. Both sciences can be combined to produce better protection of the message. The principle defined once by Kerckhoffs for cryptography, also stands for steganography: the quality of a cryptographic system should only depend on a small part of information, namely t...
2016 18th International Conference on Advanced Communication Technology (ICACT), 2016
Steganography is the art of science dealing with hiding secret data inside image, audio, video or text files. In audio steganography; secret message is embedded in the digital sound by slightly altering the binary sequence of the sound file. Existing audio steganography software deal with WAV, AU, and even MP3 sound files. Embedding secret messages in the digital sound is usually a more difficult process than embedding messages in other forms, such as digital images. Audio steganography uses different algorithms, but (LSB) least significant bit is applied in this paper. The quality of sound is depended on the size of the audio which the user selects and length of the message.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.