Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Call For Paper : Vol. 9, Issue 6 , 2022
Audio Cryptography

Author : M Sai Chandrahasa 1 T S Srinivas 2 Prasad B 3

Date of Publication :7th March 2016

Abstract: Cryptography secures information by protecting its confidentiality. It can also be used to protect information about the integrity and authenticity of data. Stronger cryptographic techniques are needed to ensure the integrity of data stored on a machine that may be infected or under attack. So far Cryptography is used in many forms but using it with Audio files is another Stronger Techniques. The process of Cryptography happens with Audio File for transferring more secure sensitive data. The Sensitive Data is Encoded with an Audio File and Passed over Insecure Channels to other end of Systems. Here we are using .wav file Format for Encryption and Decryption of Message. The given message will be encrypted with a given audio file using a secret key. The System will then embed the secret message into the audio file. The result will be a new audio file, which has the secret message in it. While decrypting the same key should be given for encrypted audio file to get the secret message from it.

Reference :

    1. m.ram mohan reddy s.s divya. Hiding text in audio using multiple LSB steganography and provide security using cryptography. International journal of scientic technology research, 1(6):68-70, 2012 shobha lokhande. 2012.
    2. tanmay bhowmik pramatha nath basu. On embedding of text in audio a case of steganography.ieee publication. Pages 203-206, 2010.
    3. k. Gopalan. Audio steganography using bit modication. Proc. Ieee int.conf. Acoustics, speech, and signal processing, 2(2):421-424, 2009.
    4. teoh suk kuan rosziati ibrahim.steganography algorithm to hide secret message inside an image.computer technology and application, 2:102- 108, 2011.

Recent Article