Author : G.Sudha 1
Date of Publication :10th July 2019
Abstract: In today’s internet world the data transmission should be fast and secured. The need for security in data communication is as long as mankind; since eavesdroppers often intercept such communication for malicious purposes. The secured signal may get hacked by breaking the password assigned to the system. Thus it is very important for designing a robust encrypted method for perfect data security. The objective of this project is to transmit an audio signal using digital image steganography technique to ensure security, integrity, robustness, ease of transmission. Audio file and cover image are encrypted using AES encryption algorithm. The encrypted file is converted into a stego file using steganography embedding algorithm. The encrypted and embedded audio file is de-embedded and decrypted at the receiver. The secret speech signal is obtained as it is at the receiver. While cryptography only encrypts the data, steganography ensures secured transmission of input by hiding the existence of data. Applications of steganography include government, military, banking, educational sectors, share market etc
Reference :
-
- Niharika Ramacharla, Sindhu Priya and Dr.E. Logashanmugam, A Secure Image Steganography for speech data hiding in digital images, International Journal of Pure and Applied Mathematics, Volume 118 No. 17 2018, 509-522.
- Altaay,J.S.Sahib and Mazdak Zamani, An Introduction to Image Steganography Techniques, International Conference on Advanced Computer Science Applications and Technologies, 2012, pp.122-126.
- Divya Sharma, Five level cryptography in speech processing using Multi hash and repositioning of speech elements, International Journal of Engineering Technology and Advanced Engineering, Vol. 2, No. 5, PP. 21- 26, 2012
- Harjinder Kaur, Gianetan Singh Sekhon, A four level speech signal encryption algorithm, IJCSC, Vol. 3, No. 1, PP. 151-153, January 2012.
- Joyshree Nath, Saima Ghosh, Asoke Nath, Advanced digital steganography using encrypted secret message and encrypted embedded cover file, International Journal of Computer Applications, Vol. 46,No.14, PP. 1- 7,May 2012
- Obaidah A. Rawashdeh and Dr. Nedhal A. M. AlSaiyed, A Novel Approach for Integrating Image Steganography and Encryption, Int.J.Computer Technology & Applications,Vol 5 (6),1917-1923.
- Atee H., Ahmad R., and Noor N., Cryptography and Image Steganography using Dynamic Encryption on LSB and Color Image Based Data Hiding, Middle-East Journal of Scientific Research, vol. 23, no. 7, pp. 1450- 1460, 2015.
- Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi. A survey on Image steganography and steganalysis, Volume 2, Number 2, April 2011.
- Mr . Vikas Tyagi, Mr. Atul kumar, Image Steganography Using Least Significant Bit With Cryptography, Journal of Global Research in Computer Science, Volume 3, No. 3, March 2012.
- Jain, Nitin, Sachin Mesh ram, and Shikha Dubey, Image Steganography Using LSB and Edge–Detection Technique, International Journal of Soft Computing and Engineering (IJSCE) ISSN (2012): 2231-2307.