Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
This research paper illustrates the concept of implementing steganography in a way that the text is converted into an audio file and on extraction we get it back in the text format. Steganography is a technique of data hiding and we are accomplishing this by converting the text file into an audio file and after extraction the text file will be extracted from the audio and the data can be read. This is a great technique to hide data, no one can recognize that even an audio can have a data in text format and data will be transferred safely. This will be helpful for RAW, IB, CBI and many other associations that want to secure their confidential data. It will be greatest technique in future after enhancement at certain level.
2014
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate rotation because of the significance, accuracy and sensitivity of the information. Steganography and Cryptography are considered as one of the techniques which are used to protect the important information, but both techniques have their pro's and con's. This paper aims to conquer their respective drawbacks and to achieve this we are using a double layer protection technique which is cryptography cum steganography approach.
International Journal of Computer Applications
Steganography is a science to hide information, it hides a message to another object, and it increases the security of data transmission and archiving it. In the process of steganography, the hidden object in which data is hidden the carrier object and the new object, is called the steganography object. The multiple carriers, such as text, audio, video, image and so can be mentioned for steganography; however, audio has been significantly considered due to the multiplicity of uses in various fields such as the internet. For steganography process, several methods have been developed; including work in the temporary and transformation, each of has its own advantages and disadvantages, and special function. In this paper we mainly review and evaluate different types of audio steganography techniques, advantages and disadvantages.
2016 18th International Conference on Advanced Communication Technology (ICACT), 2016
Steganography is the art of science dealing with hiding secret data inside image, audio, video or text files. In audio steganography; secret message is embedded in the digital sound by slightly altering the binary sequence of the sound file. Existing audio steganography software deal with WAV, AU, and even MP3 sound files. Embedding secret messages in the digital sound is usually a more difficult process than embedding messages in other forms, such as digital images. Audio steganography uses different algorithms, but (LSB) least significant bit is applied in this paper. The quality of sound is depended on the size of the audio which the user selects and length of the message.
International Journal of Advances in Applied Sciences (IJAAS), 2022
These days there are many security issues facing users while they are using the internet for exchanging information among them. And, users use technology devices, such as mobiles and computers, and they connect them to the network and internet. Therefore, users always looking for a safe way to exchange information locally and globally, when they are connecting to a network. Also, these problems lead them to many further issues such as losing privacy, hacking, and detecting personal information. Although, many security techniques have been used to solve these issues by creating many different software utilities; some of them worked perfectly to some extent, while some others still did not comply with the security environment. This research paper finds a new methodology to secure text information while exchanging among permitted users over the internet. This method is a combination of cryptography and steganography with audio and imaging multimedia, which works on hiding and encrypting information before sending it over a network. As result, this technique will add additional security processes to the data exchange, and it will provide a more reliable environment for the user to connect to the network. In addition, the quality of the data will not be altered or noticed during the encryption and decryption process.
Security is most important issue in digital communication. Data security means protective digital privacy measures that are applied to prevent unauthorized access to computers, huge databases and online data it is also protects data from corruption. Security is most important issue in digital communication. Cryptography and steganography are two popular methods available to provide security. Steganography focuses on hiding information in such a way that the message is undetectable for outsiders and only appears to the sender and intended recipient. It is useful tool that allows covert transmission of information over and over communications channel. Steganography is a technique which is used to hide the message and prevent the detection of hidden message. Various modern techniques of steganography are: a) Video Steganography b)Audio Steganography Audio Video steganography is a modern steganography of hiding information in a way that the unwanted people may not access the information.
In this paper, a robust substitution technique is used to implement proposed work of audio steganography. Steganography is an art and science methodology of writing hidden messages such a way that no one apart from the intended reciever knows the existence of the secret message data. This technique resolves the various inherent issues ,after that it increases the data hiding capacity while being also achieve robustness from various intentional as well as unintentional hacking attacks.like this it provides privacy to data. The strength of our algorithm is depend on the segment size and its used to achieve very high embedding capacity for different data type that can reach up to 25% from the input audio file size.We are developing two novel approaches of substitution technique of audio steganography that improves the capacity of cover audio which for embedds additional data. Using these methods, messages are embedded into multiple LSB bits. This technique utilizes up to 7 LSBs for embedding data. Results show that both these techniques improve data hiding capacity of cover audio by 25% to 85% These latest approaches for increasing capacity show better results as compared to the existing techniques.
International Journal of Science and Research (IJSR), 2015
Data hiding techniques have taken vital role with the hasty growth of exhaustive transfer of multimedia content and secret communications. Steganography is the art of hiding information in ways that prevent recognition. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot be able to sense the presence of contents of the hidden message. Lots of different carrier file formats can be used, but digital images are the most popular because of their occurrence on the Internet. In this, data hiding method that utilizes encoding on letters, then compression of that letters and then a new technique is proposed which is combination of two techniques. Results came from the experiment show that the proposed method can bury a large amount of secret data and also keep very high security, when the message is decrypted.
International Journal of Computer Applications, 2013
Today's large demand for internet applications requires data to be transmitted in a safe and secure manner. Data transmission in public communication system insecure because of interception and improper manipulation by eavesdropper. So the solution for this problem is Steganography, Steganography is the art of hiding one medium of information into another medium. There are many approaches for hiding textual information in multimedia file such as image, audio and video. Hiding textual information in multimedia file provides the most effective way to guard privacy. Key aspect of embedding text in multimedia file is that, after embedding text in multimedia file the size of the multimedia file remains same. The existing system can't provide more security and message length is restricted to few characters only. The proposed technique alters the data of lower bit in a cover object to embed textual information. The main goal of this paper is to embed textual information into multimedia file and the text message is encrypted before embedding to get advantage of cryptography.
2006
A Mukherjee, Non-member S Ghosh, Non-member S Biswas, Non-member P Chakraborty, Non-member A crypto system can be used to encrypt messages sent between two communicating parties so that an eavesdropper who overhears the encrypted messages will not be able to decode them. The paper mainly concentrates on the method in which the substitution technique of steganography can been used to hide data in a 24-bit bitmap file. Popular audio hiding techniques based on methods of steganography is also discussed here.
A Steganographic method for embedding textual information in WAV audio is discussed here. In the proposed method each audio sample is converted into bits and then the textual information is embedded in it. In embedding process , first the message character is converted into its equivalent binary. The last 4 bits of this binary is taken into consideration and applying redundancy of the binary code the prefix either 0 or 1 is used. To identify the uppercase, lower case, space ,and number the control symbols in the form of binary is used. By using proposed LSB based algorithm, the capacity of stego system to hide the text increases. The performance evaluation is done on the basis of MOS by taking 20 samples and comparison of SNR values with some known and proposed algorithm.
International Journal of Computer Applications, 2011
In this paper, we propose a new approach which is sophisticated for concealing the data. We are using Audio Steganography to make the confidential data more secure, so that the data cannot be tracked and modified by the intruders. To make the confidential data secure we are using efficient and reliable algorithms. This paper describes how the data is secured form the intruders even though they trace the audio file which contains the confidential data.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Today, the protection is getting the imperative interest due to the elevated use of internet. As the use of internet is increased, the charge at which the records are interchanged per day is additionally increased. The data that is interchanged every day might also turn out to be the target of fraudsters. To take action to do something in particular to resolve this hassle one of the powerful technology is the Steganography. The Steganography is a process of concealing secret information behind an harmless cover file, such that the existence of information is no longer usually admitted. This paper uses the idea of Audio and Video Steganography, where the data is hidden behind the audios and frames of videos.
IRJET, 2023
Recently, capabilities of attackers have been increased dramatically in terms of compromising secret data exchanged among users over the Internet. Using cryptographic approaches contribute to ensure confidentiality of data, but they do not provide secrecy of communication between the connected parties. Steganography can be used to strengthen cryptographic approaches by hiding secret data within innocent audios after passing an encryption stage. This adds second level of protection against attacks as well as hiding the communication itself between sender and receiver. This work proposed an enhanced steganography-based approach to protect secret data by embedding within audio files. Encryption using 3-DES is employed to create the first defense, while hiding in Least Significant Bit (LSB) creates the second defense with respect of ensuring high matching between cover file and stego file, high resistance against attacks, and high accuracy of retrieving the hidden data. The proposed approach achieves better performance in terms of PSNR, SSIM, and correlation.
Watermarking has been proposed as a solution to the problem of resolving Copyright ownership of multimedia data (image, audio, video). The work presented in this thesis is concerned with the design of robust digital image watermarking algorithms of least significant bit (LSB) algorithm for copyright protection and similarly the voice is compressed by using linear predictive code (LPC) algorithm, It is one of the most powerful speech analysis techniques, and one of the most useful methods for encoding good quality speech at a low bit rate and provides extremely accurate estimates of speech parameters. Finally hide the watermarked image and compressed voice by using Steganographic method. Steganography is an art of sending hidden data or a secret message over a public channel so that a third party cannot detect the presence of the secret message. Firstly, an overview of the watermarking system, applications of watermarking and attacks, are given. The robustness of the data is very important issue in watermarking. The watermarking algorithm which requires the presence of original image for watermark detection.
Abstract— Digital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and it is important that communication be made secret. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentially and data integrity are required to protect against unauthorized access and use. This has resulted in an unstable growth in the field of information hiding. In a modern era of Information Technology, illicit copying and illegal distribution accompany the adoption of widespread electronic distribution of copyrighted material. This is the main reason why people think about how to protect their work and how to prevent such unlawful activities. For this purpose various methods including cryptography, steganography, Digital signature, coding and so on have been used. Steganography is the best suited technique that allow user to hide a message in another message (cover media). Most of steganography research uses cover media as pictures, video clips, text and sounds. This paper focuses on the various techniques in steganography to enhance the security of communication over an open channel.
2022
Security is the major challenge of digital communication. Cryptography and steganography are two common methods available to ensure security.Steganography is the term used to hide secret messages in a text, audio or image file.Modern methods are necessary to keep information secret and to protect it from the growing danger of external hackers.Steganography makes it possible to transmit information through communication channels. In this work we have focused on digital audio as the carrier and cover file. Audio steganography is a method to safely conceal a secret message into an audio cover file in various ways.The audio files are in the standard WAV format, in which the secret message is embedded by using the LSB algorithm. The secret message gets encrypted using the RSA algorithm before the embedding process. This combination is providing two level security to the secret message to be transmitted.
Audio as a cover mediu m in steganography has its own place due to its bigger size compare to other carrier's file like (text, image, etc.). So there are more possibilities to hide large amount of data inside audio as a cover. There are also some inherent characteristics in Hu man Auditory System (HAS), which make it great success in field of Steganogarphy. Dig ital contents are easy to be pirated and to be distributed in today's world. Recently created technology on web increases the rate of data transmission, open new possibilit ies for audio steganography. Digital steganography is based on the fact that artifacts like audio files contain redundant informat ion, so instead of eliminating the redundant information, we replace some of it with other data based on human auditory system. Audio steganography, or information hiding in audio signals, is gaining widespread importance for secure communication of informat ion such as covert battlefield data. On another level, watermarking of audio signals for digital rights management is becoming vital to prevent illegal copying, file sharing, etc. In fact, when co mmunicat ion about highly confidential topics is needed, steganography combined with cryptography would be the most secure way to go. Because the mere existence of an encrypted communication draws attention to it, hiding it in another file ups your security level substantially. In this paper we will take an in-depth look at this technology by introducing the reader to various existent methods of Audio Steganography, its practical applications, what works, what does not, and possible research areas.
Steganography is an art of sending hidden data or secret messages so that a third party cannot detect the presence of the secret messages. The goal of steganography is different from classical encryption. In this paper, secret message in the form of text file is embedded within the carrier audio file (.wav). The LSB embedding method replaces the LSB bits of carrier audio file by secret data bits. In the transmitter end the output is similar to the carrier with secret message embedded inside. At the receiver end the original message can be retrieved without any loss.
Steganography is essentially a security system which is utilized to shroud the private or mystery information. This mystery information is inserted or hid in a manner that no other individual separated from the sender or beneficiary can seize it. Audio Steganography is a piece of steganography in which the spread media utilized is a sound document, by changing a data in an intangible way. The cryptographic strategies in audio steganography "scramble" messages so if caught, the messages can't be comprehended, while, inserting, "covers" a message to shroud its presence and concealing the way that a message is being sent out and out. Inserting is not expected to supplant cryptography but rather supplement it and it is a more perplexing system. Presently, because of the accessibility of repetition the first message before inserting and the stego message after extraction continues as before, in this manner keeping up its trustworthiness. Audio Steganography can ac...
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting the confidentiality, integrity and availability of information from unauthorized access. In this paper, a data hiding system that is based on audio steganography and cryptography is proposed to secure data transfer between the source and destination. Audio medium is used for the steganography and a LSB (Least Significant Bit) algorithm is employed to encode the message inside the audio file. The proposed system was evaluated for effectiveness and the result shows that, the encryption and decryption methods used for developing the system make the security of the proposed system more efficient in securing data from unauthorized access. The system is therefore, recommended to be used by the Internet users for establishing a more secure communication.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.