Open Access   Article Go Back

Audio Steganography for Secure Data Transmission

N. Kundu1 , A. Kaur2

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-2 , Page no. 124-129, Feb-2017

Online published on Mar 01, 2017

Copyright © N. Kundu, A. Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N. Kundu, A. Kaur , “Audio Steganography for Secure Data Transmission,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.124-129, 2017.

MLA Style Citation: N. Kundu, A. Kaur "Audio Steganography for Secure Data Transmission." International Journal of Computer Sciences and Engineering 5.2 (2017): 124-129.

APA Style Citation: N. Kundu, A. Kaur , (2017). Audio Steganography for Secure Data Transmission. International Journal of Computer Sciences and Engineering, 5(2), 124-129.

BibTex Style Citation:
@article{Kundu_2017,
author = {N. Kundu, A. Kaur },
title = {Audio Steganography for Secure Data Transmission},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2017},
volume = {5},
Issue = {2},
month = {2},
year = {2017},
issn = {2347-2693},
pages = {124-129},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1190},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1190
TI - Audio Steganography for Secure Data Transmission
T2 - International Journal of Computer Sciences and Engineering
AU - N. Kundu, A. Kaur
PY - 2017
DA - 2017/03/01
PB - IJCSE, Indore, INDIA
SP - 124-129
IS - 2
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
565 440 downloads 515 downloads
  
  
           

Abstract

As the internet growing day by day secure transmission of information is crucial. Steganography and cryptography both techniques provide data confidentiality, integrity and help us to protect data from day by day attacks. Internet communication has become an essential part of infrastructure now a days and also lots of applications are internet based. So the communication made must be secret to avoid attacks. Steganography is a process of hiding the information of secret messages or one can say that it is an art of sending the hidden data or message over a public network. In the proposed approach message is first encrypted through using The Vigenere Square Encryption Algorithm. After those characters of information or data is embedded into deeper layers through modified LSB method. After that further audio transposition encryption technique is used for audio and accuracy for transposition method is measured in terms of MSE.

Key-Words / Index Term

Audio Steganography, Encryption, Audio Encryption, Modified LSB, Vigenere Square Encryption Algorithm, LSB Coding , PSNR-Peak signal to noise ratio, MSE-mean square error

References

[1] Forouzan B., “Cryptography and Network Security” special Indian Edition 2007, pp-240-330 Tata McGraw-Hill Publishing Company Limited, New Delhi.
[2] Suganya.A, Sharmila.R and Gopinathan.N, "A New Method of Secure Communication with Crystography", International Journal of Computer Sciences and Engineering, Vol.2(4), pp225-228, Apr -2014.
[3] Sangwan N., “Text Encryption with Huffman Compression”, International Journal of Computer Applications (0975 – 8887) Volume 6,pp.54, September 2012.
[4] Ayushi, “A Symmetric Key Cryptographic Algorithm” International Journal of Computer Applications, Vol. 1(15), pp.-34-37, 2010.
[5] Wang H. and Wang S., “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, vol. 47,pp.120-156 no. 10, 2004
[6] Adhiya K. and Patil S., Hiding Text in Audio Using LSB Based Steganography. Information and Knowledge Management, pp.56-98 2012.
[7] Gilani J., and Khalid M. Asad, "”An enhanced least significant bit modification technique for audio steganography”, 2011 International Conference on Computer Networks and Information Technology (ICCNIT)," pp.230-233 ,IEEE, 2011.
[8] Gill M.K. and Randhawa R. K.., "Comparative Study of Multibit LSB Steganography with Cryptography", International Journal of Computer Sciences and Engineering, Vol.3(7), pp.120-123, Jul -2015.
[9] Suri S, Joshi H, Mincoha V. and Tyagi A., "Comparative Analysis of Steganography for Coloured Images", International Journal of Computer Sciences and Engineering, Vol.2(4), pp.180-184, Apr -2014
[10] Bender W. , Gruhl D., "Echo hiding," in proceeding of the 1st Information Hiding Workshop, England, pp. 295-315, 1996.
[11] Shirali-Shahreza S., "Steganography in Silence Intervals of Speech," in , proceedings of the Fourth IEEE International Conference on Intelligent Information Hiding and Multimedia Signal (IIH-MSP 2008), Harbin , china,pp.78-80, 2008.
[12] Gopalan S., "Audio Steganography for Covert Data Transmissionby Imperceptible Tone Insertion," in WOC, Banff , Canada, pp. 8-10,2004.
[13] Tapio S. , Cvejic N., "Increasing The Capacity of LSB-Based Audio Steganography," IEEE, 2002.
[14] Kriti, and Saroha P. , "A variant of LSB steganography for hiding images in audio.," International Journal of Computer Applications, vol.6 , pp. 21-27, 2010.
[15] Shahadi H. and Jidin R., "High capacity and inaudibility audio steganography scheme," in 7th International Conference n Information Assurance and Security (IAS), IEEE, pp-890-899,2011.
[16] Bhasker V., Shiva V. Khan S., "An Optimized Method for Concealing Data using Audio Steganography," International Journal of Computer Applications, pp. 0975-8887, 2011.
[17] Gilani J., Asad A., "Three Layered Model," in International Conference on Emerging, US , pp. 56-78 , 2012.
[18] Ballestero D. and Moreno J., "Highly transparent steganography model of speech signals using Efficient Wavelet Masking," vol. 6 ,pp. 48-56 , 2012.
[19] Katariya V., Patil K., Bankar P., "Audio Steganography using LSB," international Journal of Electronics, vol. 5, pp. 90-92, 2012.
[20] R A.,Al-Anani M., Al-Khalid R. , & Al-Dallah M., "An Efficient technique for data hiding in audio signals.," American Academic & Scholarly Research Journal, vol. 56 , pp. 10-16, 2012.
[21] Galshetwar G.,Jeyakumar A., Mane A., "Data Hiding Technique: Audio Steganography using LSB Technique," International Journal of Engineering Research and Applications, vol. 5, pp. 1123-1125, 2012.
[22] Reddy M. , S.S. Divya, "Hiding Text In Audio Using Multiple LSB Steganography And Provide Security Using Cryptography," International Journal of Scientific &Technology,vol. 4 pp. 68-70, 2012.
[23] Gaidhani C.R., Deshpande V.M. and Bora V.N., "Image Steganography for Message Hiding Using Genetic Algorithm", International Journal of Computer Sciences and Engineering, Vol.2(3), pp.67-70, Mar -2014.
[24] Banerjee S., Rana L., "Dual Layer Randomization in Audio Steganography Using Random Byte Position Encoding," International Journal of Engineering and Innovative Technology, vol. 3,pp. 8, 2013.
[25] John S., B.D, Muruganantham C. and Murthy D., Babu L., "Steganographic Method for Data Hiding in Audio Signals with LSB & DCT," International Journal of Computer Science and Mobile Computing, vol.2, pp. 89-93, August 2013.
[26] Prof. Trivedi.V., Jain M., "Effective Audio Steganography by using Coefficient Comparison in DCT Domain," International Journal of Engineering Research & Technology (IJERT), vol 2 pp. 45-51, 2013.
[27] Nasef M. and Fatma T. , Eid Meligy A., "An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys," I. J. Computer Netwok and Information Security, vol .4, pp. 24-29, 2015.
[28] Bhowmick A., Kishore B., Sinha N., "Encrypted Information Hiding using Audio Steganography and Audio Cryptography," International Journal of Computer Applications, vol. 2 , pp. 0975-8123, 2015.