300 research outputs found

    A novel steganography approach for audio files

    Get PDF
    We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are compressed by the GMPR technique which is based on the Discrete Cosine Transform (DCT) and high frequency minimization encoding algorithm. The method involves compression-encryption of an image file by the GMPR technique followed by hiding it into audio data by appropriate bit substitution. The maximum number of bits without significant effect on audio signal for LSB audio steganography is 6 LSBs. The encrypted image bits are hidden into variable and multiple LSB layers in the proposed method. Experimental results from observed listening tests show that there is no significant difference between the stego audio reconstructed from the novel technique and the original signal. A performance evaluation has been carried out according to quality measurement criteria of Signal-to-Noise Ratio (SNR) and Peak Signal-to-Noise Ratio (PSNR)

    Transparent authentication methodology in electronic education

    No full text
    In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for signing digital content as it is being produced in a computerized environment. Our proposed solution is to digitally sign the participant’s work by embedding voice samples in the transcript paper at regular intervals. In this investigation, we have demonstrated that a transparent stenographic methodology will provide an innovative and practical solution for achieving continuous authentication in an online educational environment by successful insertion and extraction of audio digital signatures

    Advanced Steganography for Hiding Data and Image using Audio-Video

    Get PDF
    Steganography is an art of hiding the secrete message that is being send in the other non secret text. The benefit of steganography is that the expected mystery message does not pull in thoughtfulness regarding itself as an object of investigation. Our point is to conceal mystery data and picture behind the sound and feature document individually with. Sound records are generally compacted for capacity or speedier transmission. Sound records can be sent in short remain solitary portions. 4LSB is used for video steganography and cryptographic algorithm for encryption and decryption. Parity coding is used for Audio Steganography

    Steganography on Multi-media Elements

    Get PDF
    Stegnography is method to make the communication of secret data hiding through a media. A perfect Steganographic in media enables to embedding data in an media, robust and secure way and then extracting it by authorized people. In this paper we introduces a new approach for Least Significant Bit (LSB) based on image and audio steganography that increases the existing LSB substitution techniques to improve the security level of hidden information by introducing secret key technique. The new security method hides secret information within the LSB using secret key combined with LSB to protect data from unauthorized users. In original LSB methods, secret data is present to a specific position of selected media. Because of this, knowing the extracting methods, anyone can extract the hidden information. In our method, we use secret key which is embedded with LSB and the according to selected media the data will be hidden therefore, it is difficult to extract the hidden information knowing the retrieval methods. DOI: 10.17762/ijritcc2321-8169.15069

    A Review: Video Steganography for Hiding Data

    Get PDF
    Steganography is an art of hiding the secrete message that is being send in the other non secret text. The benefit of steganography is that the expected mystery message does not pull in thoughtfulness regarding itself as an object of investigation. Our point is to conceal mystery data and picture behind the sound and feature document individually. Sound records are generally compacted for capacity or speedier transmission. Sound records can be sent in short remain solitary portions

    A review and open issues of multifarious image steganography techniques in spatial domain

    Get PDF
    Nowadays, information hiding is becoming a helpful technique and fetch more attention due fast growth of using internet, it is applied for sending secret information by using different techniques. Steganography is one of major important technique in information hiding. Steganography is science of concealing the secure information within a carrier object to provide the secure communication though the internet, so that no one can recognize and detect it’s except the sender & receiver. In steganography, many various carrier formats can be used such as an image, video, protocol, audio. The digital image is most popular used as a carrier file due its frequency on internet. There are many techniques variable for image steganography, each has own strong and weak points. In this study, we conducted a review of image steganography in spatial domain to explore the term image steganography by reviewing, collecting, synthesizing and analyze the challenges of different studies which related to this area published from 2014 to 2017. The aims of this review is provides an overview of image steganography and comparison between approved studies are discussed according to the pixel selection, payload capacity and embedding algorithm to open important research issues in the future works and obtain a robust method

    Encryption of Text Message on Audio Steganography Using Combination Vigenere Cipher and LSB (Least Significant Bit)

    Get PDF
     The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography, process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096

    Review on DNA Cryptography

    Get PDF
    Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods. In the modern era of e-business and e-commerce the protection of confidentiality, integrity and availability (CIA triad) of stored information as well as of transmitted data is very crucial. DNA molecules, having the capacity to store, process and transmit information, inspires the idea of DNA cryptography. This combination of the chemical characteristics of biological DNA sequences and classical cryptography ensures the non-vulnerable transmission of data. In this paper we have reviewed the present state of art of DNA cryptography.Comment: 31 pages, 12 figures, 6 table
    corecore