3,346 research outputs found

    Speech Steganography System Using Lifting Wavelet Transform

    Get PDF
    This paper presents a new lossless speech steganography approach based on Integer-to-Integer Lifting Wavelet Transform (Int2Int LWT) and Least Significant Bits (LSBs) substitution. In order to increase the security level a simple encryption with chaotic key has been proposed. The proposed system has a high sensitivity in choosing keys because a small change in CKG causes a new secret key for transmitting. Speech steganography algorithm that based on (Int2IntLWT) can satisfy full recovery for the embedded secret messages in the receiver side. Keywords:Speech steganography, information hiding, Int2Int LWT, (LSB) technique, XOR operation

    Color image steganography in YCbCr space

    Get PDF
    Steganography is a best method for in secret communicating information during the transference of data. Images are an appropriate method that used in steganography can be used to protection the simple bits and pieces. Several systems, this one as color scale images steganography and grayscale images steganography, are used on color and store data in different techniques. These color images can have very big amounts of secret data, by using three main color modules. The different color modules, such as HSV-(hue, saturation, and value), RGB-(red, green, and blue), YCbCr-(luminance and chrominance), YUV, YIQ, etc. This paper uses unusual module to hide data: an adaptive procedure that can increase security ranks when hiding a top secret binary image in a RGB color image, which we implement the steganography in the YCbCr module space. We performed Exclusive-OR (XOR) procedures between the binary image and the RGB color image in the YCBCR module space. The converted byte stored in the 8-bit LSB is not the actual bytes; relatively, it is obtained by translation to another module space and applies the XOR procedure. This technique is practical to different groups of images. Moreover, we see that the adaptive technique ensures good results as the peak signal to noise ratio (PSNR) and stands for mean square error (MSE) are good. When the technique is compared with our previous works and other existing techniques, it is shown to be the best in both error and message capability. This technique is easy to model and simple to use and provides perfect security with unauthorized

    A novel steganography approach for audio files

    Get PDF
    We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are compressed by the GMPR technique which is based on the Discrete Cosine Transform (DCT) and high frequency minimization encoding algorithm. The method involves compression-encryption of an image file by the GMPR technique followed by hiding it into audio data by appropriate bit substitution. The maximum number of bits without significant effect on audio signal for LSB audio steganography is 6 LSBs. The encrypted image bits are hidden into variable and multiple LSB layers in the proposed method. Experimental results from observed listening tests show that there is no significant difference between the stego audio reconstructed from the novel technique and the original signal. A performance evaluation has been carried out according to quality measurement criteria of Signal-to-Noise Ratio (SNR) and Peak Signal-to-Noise Ratio (PSNR)

    An Android-based Image Steganography Approach to Data Communication Security using LSB and Password-based Encryption

    Get PDF
    The study's ultimate goal is to develop an Android app dedicated to Image Steganography, a technique for concealing sensitive information behind seemingly innocuous photographs. This information hiding technique is essential because of its many potential uses. Symmetric encryption, asymmetric encryption, and steganography are all brought together in this method. The initial picture is encrypted using a symmetric technique in this procedure. After that, the encrypted picture is quietly placed using a least significant bits Steganographic approach to conceal the secret key that was encrypted using an asymmetric algorithm. The steganography algorithm's simple but effective security mechanism is a major benefit. Integrating a secret message into a seemingly benign source makes it very difficult to detect the hidden message without prior knowledge of its existence and the appropriate decryption algorithm. The privacy of the concealed data is protected by this feature. The planned Android app would provide a user-friendly interface for using picture steganography methods, making it simple for anybody to choose commonplace photos and secret messages for obfuscation. Both the original picture and the concealed message will be kept secret thanks to the app's robust encryption methods. The hidden message will be seamlessly included into the regular picture using advanced steganographic methods like the least significant bits approach. The creation of this software is motivated by a desire to provide an easily accessible solution for people who want safe communication through hidden messages or encrypted photos. The robust encryption and steganographic technologies, paired with the straightforward interface, will enable users to effectively protect sensitive information. This work will strengthen the area of data security and highlight the need of sophisticated encryption and steganography in modern digital communication
    • …
    corecore