SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2098-2101 ISSN: 2249-6645
www.ijmer.com 2098 | Page
Tanmaiy G. Verma1
, Zohaib Hasan2
, Dr. Girish Verma3
1
Deptt. of Electronics and Communication, Gyan Ganga Institute of Technology
Jabalpur-482001, (M.P.), INDIA
2
Asst. Professors, Deptt. Of Electronics and Communication, Gyan Ganga Institute of Technology,
Jabalpur -482001(M.P.), INDIA
3
Professor, Deptt. Of Physics, Govt. Home Science College Jabalpur-482001(M.P.), INDIA
ABSTRACT: The rapid development of multimedia and internet allows for wide distribution of digital media data. It
becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy
and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find
appropriate rotation because of the significance, accuracy and sensitivity of the information. Steganography and
Cryptography are considered as one of the techniques which are used to protect the important information, but both
techniques have their pro’s and con’s. This paper aims to conquer their respective drawbacks and to achieve this we are
using a double layer protection technique which is cryptography cum steganography approach.
I. INTRODUCTION
Information security is essential for confidential data transfer. Steganography is one of the ways used for secure
transmission of confidential information. Hiding information in a photograph is less suspicious than communicating an
encrypted file.
The main purpose of steganography is to convey the information secretly by concealing the very existence of
information in some other medium such as image, audio or video.
I.1. Cryptography: Cryptography scrambles messages so it can’t be understood.
Modulo encryption is a popular data hiding technique in mobile devices.
Pro’s: - secure data, variable bit key for data hiding, fast and flexible easy to implement.
Con’s:- limited for mobile devices only, complex hardware, easy to detect cipher patterns.
I.2 Steganography: It is an ancient art of hiding information. It hides information in digital images.
Pro’s: Steganography methods reduce the chance of a message being detected.
Con’s: Transmitting same images again and again may arouse suspicious-ness to the intruder, easy to decipher ones
detected.
II. PROPOSED METHOD
(Transmitting Medium) (Receiving Medium)
Fig 1.1
As shown above, the data is converted in stegano-object (in this case audio file) and is being transmitted and on the
receiving terminal the stegano-object is processed and is converted back into the original data.
Data Wave
File Tx
Wave
File Rx
Data
A Unique Approach for Data Hiding Using Audio
Steganography
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2098-2101 ISSN: 2249-6645
www.ijmer.com 2099 | Page
1.3 Process flow of transmitter
Fig. 1.2
In the above fig. it can be depicted that the data is entered by the user. Then the sampling rate is being entered by
the user. Now the sampling rate entered by the user is being compared with the Nyquist rate. If the sampling rate entered by
the user is greater than Nyquist rate then next step is followed else previous step is repeated. Then this step is followed by
ASCII conversion in which the data is converted in ASCII format. Now the input is given by the user which is in the form of
voice. This step is followed by generation of cipher. In the following step stegano-object (i.e. voice generated by the user)
and the cipher so generated are combined and the output wave is being generated.
1.4 Process flow of receiver
Fig. 1.3
Fig. 1.3 represents data flow of the receiver. At the receiving terminal audio file is received. Then wave-data and parameters
are extracted. These parameters include length of data , frequency and step size. As shown in the next step De-steganography
is performed in which voice and data cipher are being extracted. Now to convert cipher into data , de-cryptography is
performed in which data is obtained in its original form.
Algorithm used for cryptography:
1. Get the data from the user(Data)
2. Transpose the given data to obtain a transposed matrix(Tdata)
Tdata = transpose(data)
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2098-2101 ISSN: 2249-6645
www.ijmer.com 2100 | Page
3. Divide the Tdata by any numerical value say ‘200’
M = Tdata / 200
4. The ‘Cipher’ so generated can be obtained by calculating the modulo
Cipher = M % 256
Algorithm used for steganography:
1. ‘X’ represents ciphered data
2. ‘W’ represents wave signal
3. ‘Y’ represents wave sound stegano-object
4. Then
Y = [W0(----),x(0), W1(----),x(1), W2(----),x(2), W3(----),x(3),-------------------]
5. The range of block of ‘W’ is decided at run time as per size of ‘X’
III. SIMULATION RESULTS
The fig. 1.4 illustrated below represents the pictorial view on the data being transmitted (Transmitter section).
Fig. 1.4
The first part of the fig.1.4 represents the audio signal which has been taken into consideration for the transmission.
The second part of the fig.1.4 represents the data which has to be transmitted over the given channel.
The third part of the fig.1.4 represents the encrypted data or the so called ‘cipher’ which has been generated by the algorithm
used for cryptography.
The fourth part of the fig.1.4 represents the combination of the audio signal and the cipher and the combination of the above
is called stegano-object.
The fig. 1.5 illustrated below represents the pictorial view on the data being received (Receiver section).
Fig. 1.5
First part of the fig 1.5 displays the received signal which has been received from the transmitter.
The second part of the fig.1.5 represents the original recovered data received by the receiver.
From fig 1.4 and fig. 1.5 it can be seen that both in transmitter and receiver recovered data is same.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2098-2101 ISSN: 2249-6645
www.ijmer.com 2101 | Page
IV. CONCLUSIONS
Both the cryptography and steganography have their own respective pros and cons, but the combination of both the model
provides better protection of the data from the intruders.
REFERENCES
[1] Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay and Tai-hoon Kim, Text Steganography: A Novel Approach,
Research paper , International Journal of Advanced Science and Technology, Vol. 3, February, 2009.
[2] Arvind Kumar, Km. Pooja, Steganography- A Data Hiding Technique, Research paper , International Journal of Computer
Applications (0975 – 8887) Volume 9– No.7, November 2010.
[3] Zaidoon Kh. AL-Ani , A.A.Zaidan, B.B.Zaidan and Hamdan.O.Alanazi, Overview: Main Fundamentals for Steganography,
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010.
[4] Ross J. Anderson, Fabien A.P. Petitcolas, On The Limits of Steganography, IEEE Journal, May 1998.
[5] Miroslav Dobs´cek, Modern Steganography, Czech Technical University in Prague.

Más contenido relacionado

La actualidad más candente

Weeds detection efficiency through different convolutional neural networks te...
Weeds detection efficiency through different convolutional neural networks te...Weeds detection efficiency through different convolutional neural networks te...
Weeds detection efficiency through different convolutional neural networks te...IJECEIAES
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
 
Steganography System for Hiding Text and Images Using Improved LSB Method
Steganography System for Hiding Text and Images Using Improved LSB MethodSteganography System for Hiding Text and Images Using Improved LSB Method
Steganography System for Hiding Text and Images Using Improved LSB MethodIRJET Journal
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET Journal
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of ThingsIRJET Journal
 
Using wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest firesUsing wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest firesLeila_maleke
 
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...IRJET Journal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret dataVema Reddy
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
 

La actualidad más candente (19)

Weeds detection efficiency through different convolutional neural networks te...
Weeds detection efficiency through different convolutional neural networks te...Weeds detection efficiency through different convolutional neural networks te...
Weeds detection efficiency through different convolutional neural networks te...
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Coding
 
Steganography System for Hiding Text and Images Using Improved LSB Method
Steganography System for Hiding Text and Images Using Improved LSB MethodSteganography System for Hiding Text and Images Using Improved LSB Method
Steganography System for Hiding Text and Images Using Improved LSB Method
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
F1803023843
F1803023843F1803023843
F1803023843
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
 
A1104010105
A1104010105A1104010105
A1104010105
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
Using wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest firesUsing wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest fires
 
Aa34163168
Aa34163168Aa34163168
Aa34163168
 
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 

Destacado

Health service quality development 282 presentation
Health service quality development 282 presentationHealth service quality development 282 presentation
Health service quality development 282 presentationE-gama
 
Stress-Strain Behaviours Of Two Stage Lime-Cement Treated Expansive Soils
Stress-Strain Behaviours Of Two Stage Lime-Cement Treated Expansive SoilsStress-Strain Behaviours Of Two Stage Lime-Cement Treated Expansive Soils
Stress-Strain Behaviours Of Two Stage Lime-Cement Treated Expansive SoilsIJMER
 
Gi2429352937
Gi2429352937Gi2429352937
Gi2429352937IJMER
 
Effect of Preform Geometry on the Material Behaviour and the Densification Me...
Effect of Preform Geometry on the Material Behaviour and the Densification Me...Effect of Preform Geometry on the Material Behaviour and the Densification Me...
Effect of Preform Geometry on the Material Behaviour and the Densification Me...IJMER
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksIJMER
 
Marketing ideas for small business
Marketing ideas for small businessMarketing ideas for small business
Marketing ideas for small businessdenise2228
 
A Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile DeviceA Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile DeviceIJMER
 
B02414541458
B02414541458B02414541458
B02414541458IJMER
 
Evaluation of Compressive Strength and Water Absorption of Styrene Butadiene...
Evaluation of Compressive Strength and Water Absorption of  Styrene Butadiene...Evaluation of Compressive Strength and Water Absorption of  Styrene Butadiene...
Evaluation of Compressive Strength and Water Absorption of Styrene Butadiene...IJMER
 
Health service quality development 282 presentation
Health service quality development 282 presentationHealth service quality development 282 presentation
Health service quality development 282 presentationE-gama
 
Lexical Pattern- Based Approach for Extracting Name Aliases
Lexical Pattern- Based Approach for Extracting Name AliasesLexical Pattern- Based Approach for Extracting Name Aliases
Lexical Pattern- Based Approach for Extracting Name AliasesIJMER
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127IJMER
 
The everlasting gospel
The everlasting gospelThe everlasting gospel
The everlasting gospelRobert Taylor
 
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...IJMER
 
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksStructural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksIJMER
 
Taguchi Analysis of Erosion Wear Maize Husk Based Polymer Composite
Taguchi Analysis of Erosion Wear Maize Husk Based Polymer CompositeTaguchi Analysis of Erosion Wear Maize Husk Based Polymer Composite
Taguchi Analysis of Erosion Wear Maize Husk Based Polymer CompositeIJMER
 
A044010114
A044010114A044010114
A044010114IJMER
 
Need For Strengthening Automobile Industry in Ethiopia
Need For Strengthening Automobile Industry in EthiopiaNeed For Strengthening Automobile Industry in Ethiopia
Need For Strengthening Automobile Industry in EthiopiaIJMER
 
Writing for pr #2
Writing for pr #2Writing for pr #2
Writing for pr #2Dicky Ahmad
 

Destacado (20)

Health service quality development 282 presentation
Health service quality development 282 presentationHealth service quality development 282 presentation
Health service quality development 282 presentation
 
Stress-Strain Behaviours Of Two Stage Lime-Cement Treated Expansive Soils
Stress-Strain Behaviours Of Two Stage Lime-Cement Treated Expansive SoilsStress-Strain Behaviours Of Two Stage Lime-Cement Treated Expansive Soils
Stress-Strain Behaviours Of Two Stage Lime-Cement Treated Expansive Soils
 
Gi2429352937
Gi2429352937Gi2429352937
Gi2429352937
 
Effect of Preform Geometry on the Material Behaviour and the Densification Me...
Effect of Preform Geometry on the Material Behaviour and the Densification Me...Effect of Preform Geometry on the Material Behaviour and the Densification Me...
Effect of Preform Geometry on the Material Behaviour and the Densification Me...
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
 
Marketing ideas for small business
Marketing ideas for small businessMarketing ideas for small business
Marketing ideas for small business
 
A Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile DeviceA Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile Device
 
B02414541458
B02414541458B02414541458
B02414541458
 
Evaluation of Compressive Strength and Water Absorption of Styrene Butadiene...
Evaluation of Compressive Strength and Water Absorption of  Styrene Butadiene...Evaluation of Compressive Strength and Water Absorption of  Styrene Butadiene...
Evaluation of Compressive Strength and Water Absorption of Styrene Butadiene...
 
Health service quality development 282 presentation
Health service quality development 282 presentationHealth service quality development 282 presentation
Health service quality development 282 presentation
 
Lexical Pattern- Based Approach for Extracting Name Aliases
Lexical Pattern- Based Approach for Extracting Name AliasesLexical Pattern- Based Approach for Extracting Name Aliases
Lexical Pattern- Based Approach for Extracting Name Aliases
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127
 
The everlasting gospel
The everlasting gospelThe everlasting gospel
The everlasting gospel
 
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...
 
Sat words week 3
Sat words week 3 Sat words week 3
Sat words week 3
 
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksStructural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor Networks
 
Taguchi Analysis of Erosion Wear Maize Husk Based Polymer Composite
Taguchi Analysis of Erosion Wear Maize Husk Based Polymer CompositeTaguchi Analysis of Erosion Wear Maize Husk Based Polymer Composite
Taguchi Analysis of Erosion Wear Maize Husk Based Polymer Composite
 
A044010114
A044010114A044010114
A044010114
 
Need For Strengthening Automobile Industry in Ethiopia
Need For Strengthening Automobile Industry in EthiopiaNeed For Strengthening Automobile Industry in Ethiopia
Need For Strengthening Automobile Industry in Ethiopia
 
Writing for pr #2
Writing for pr #2Writing for pr #2
Writing for pr #2
 

Similar a A Unique Approach for Data Hiding Using Audio Steganography

A collaborative physical layer security scheme
A collaborative physical layer security schemeA collaborative physical layer security scheme
A collaborative physical layer security schemeIJECEIAES
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganographyAlexander Decker
 
Analysis Increasing Network Signal of Dongle
Analysis Increasing Network Signal of DongleAnalysis Increasing Network Signal of Dongle
Analysis Increasing Network Signal of Dongleijsrd.com
 
Encrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryEncrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryTELKOMNIKA JOURNAL
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 

Similar a A Unique Approach for Data Hiding Using Audio Steganography (20)

[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
A collaborative physical layer security scheme
A collaborative physical layer security schemeA collaborative physical layer security scheme
A collaborative physical layer security scheme
 
D010312230
D010312230D010312230
D010312230
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
Analysis Increasing Network Signal of Dongle
Analysis Increasing Network Signal of DongleAnalysis Increasing Network Signal of Dongle
Analysis Increasing Network Signal of Dongle
 
P045068488
P045068488P045068488
P045068488
 
Encrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryEncrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometry
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
H017255560
H017255560H017255560
H017255560
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
P017329498
P017329498P017329498
P017329498
 
L1803037377
L1803037377L1803037377
L1803037377
 

Más de IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

Más de IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

A Unique Approach for Data Hiding Using Audio Steganography

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2098-2101 ISSN: 2249-6645 www.ijmer.com 2098 | Page Tanmaiy G. Verma1 , Zohaib Hasan2 , Dr. Girish Verma3 1 Deptt. of Electronics and Communication, Gyan Ganga Institute of Technology Jabalpur-482001, (M.P.), INDIA 2 Asst. Professors, Deptt. Of Electronics and Communication, Gyan Ganga Institute of Technology, Jabalpur -482001(M.P.), INDIA 3 Professor, Deptt. Of Physics, Govt. Home Science College Jabalpur-482001(M.P.), INDIA ABSTRACT: The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate rotation because of the significance, accuracy and sensitivity of the information. Steganography and Cryptography are considered as one of the techniques which are used to protect the important information, but both techniques have their pro’s and con’s. This paper aims to conquer their respective drawbacks and to achieve this we are using a double layer protection technique which is cryptography cum steganography approach. I. INTRODUCTION Information security is essential for confidential data transfer. Steganography is one of the ways used for secure transmission of confidential information. Hiding information in a photograph is less suspicious than communicating an encrypted file. The main purpose of steganography is to convey the information secretly by concealing the very existence of information in some other medium such as image, audio or video. I.1. Cryptography: Cryptography scrambles messages so it can’t be understood. Modulo encryption is a popular data hiding technique in mobile devices. Pro’s: - secure data, variable bit key for data hiding, fast and flexible easy to implement. Con’s:- limited for mobile devices only, complex hardware, easy to detect cipher patterns. I.2 Steganography: It is an ancient art of hiding information. It hides information in digital images. Pro’s: Steganography methods reduce the chance of a message being detected. Con’s: Transmitting same images again and again may arouse suspicious-ness to the intruder, easy to decipher ones detected. II. PROPOSED METHOD (Transmitting Medium) (Receiving Medium) Fig 1.1 As shown above, the data is converted in stegano-object (in this case audio file) and is being transmitted and on the receiving terminal the stegano-object is processed and is converted back into the original data. Data Wave File Tx Wave File Rx Data A Unique Approach for Data Hiding Using Audio Steganography
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2098-2101 ISSN: 2249-6645 www.ijmer.com 2099 | Page 1.3 Process flow of transmitter Fig. 1.2 In the above fig. it can be depicted that the data is entered by the user. Then the sampling rate is being entered by the user. Now the sampling rate entered by the user is being compared with the Nyquist rate. If the sampling rate entered by the user is greater than Nyquist rate then next step is followed else previous step is repeated. Then this step is followed by ASCII conversion in which the data is converted in ASCII format. Now the input is given by the user which is in the form of voice. This step is followed by generation of cipher. In the following step stegano-object (i.e. voice generated by the user) and the cipher so generated are combined and the output wave is being generated. 1.4 Process flow of receiver Fig. 1.3 Fig. 1.3 represents data flow of the receiver. At the receiving terminal audio file is received. Then wave-data and parameters are extracted. These parameters include length of data , frequency and step size. As shown in the next step De-steganography is performed in which voice and data cipher are being extracted. Now to convert cipher into data , de-cryptography is performed in which data is obtained in its original form. Algorithm used for cryptography: 1. Get the data from the user(Data) 2. Transpose the given data to obtain a transposed matrix(Tdata) Tdata = transpose(data)
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2098-2101 ISSN: 2249-6645 www.ijmer.com 2100 | Page 3. Divide the Tdata by any numerical value say ‘200’ M = Tdata / 200 4. The ‘Cipher’ so generated can be obtained by calculating the modulo Cipher = M % 256 Algorithm used for steganography: 1. ‘X’ represents ciphered data 2. ‘W’ represents wave signal 3. ‘Y’ represents wave sound stegano-object 4. Then Y = [W0(----),x(0), W1(----),x(1), W2(----),x(2), W3(----),x(3),-------------------] 5. The range of block of ‘W’ is decided at run time as per size of ‘X’ III. SIMULATION RESULTS The fig. 1.4 illustrated below represents the pictorial view on the data being transmitted (Transmitter section). Fig. 1.4 The first part of the fig.1.4 represents the audio signal which has been taken into consideration for the transmission. The second part of the fig.1.4 represents the data which has to be transmitted over the given channel. The third part of the fig.1.4 represents the encrypted data or the so called ‘cipher’ which has been generated by the algorithm used for cryptography. The fourth part of the fig.1.4 represents the combination of the audio signal and the cipher and the combination of the above is called stegano-object. The fig. 1.5 illustrated below represents the pictorial view on the data being received (Receiver section). Fig. 1.5 First part of the fig 1.5 displays the received signal which has been received from the transmitter. The second part of the fig.1.5 represents the original recovered data received by the receiver. From fig 1.4 and fig. 1.5 it can be seen that both in transmitter and receiver recovered data is same.
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2098-2101 ISSN: 2249-6645 www.ijmer.com 2101 | Page IV. CONCLUSIONS Both the cryptography and steganography have their own respective pros and cons, but the combination of both the model provides better protection of the data from the intruders. REFERENCES [1] Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay and Tai-hoon Kim, Text Steganography: A Novel Approach, Research paper , International Journal of Advanced Science and Technology, Vol. 3, February, 2009. [2] Arvind Kumar, Km. Pooja, Steganography- A Data Hiding Technique, Research paper , International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010. [3] Zaidoon Kh. AL-Ani , A.A.Zaidan, B.B.Zaidan and Hamdan.O.Alanazi, Overview: Main Fundamentals for Steganography, JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010. [4] Ross J. Anderson, Fabien A.P. Petitcolas, On The Limits of Steganography, IEEE Journal, May 1998. [5] Miroslav Dobs´cek, Modern Steganography, Czech Technical University in Prague.