##plugins.themes.academic_pro.article.main##

Abstract

In this paper, we deal with Steganography where Steganography is the art and science of communicating in a way which hides the existence of the communication. [1]The goal of steganography is to hide messages inside other harmless message in a way that doesn’t allow enemy to even detect that there is second message present. In an audio Steganographic method [2], we can adjust the bits in such a way so that the stego audio signal resulting from embedding data in higher LSB layer is perceptually indistinguishable from the host audio signal. In addition with Steganography, Cryptography has been added to provide more security for the message.

Keywords: Auditory System (HAS), LSB encoding, Cover Audio, Stego Audio

##plugins.themes.academic_pro.article.details##

Author Biographies

Preeti Singh, Rungta College of Engineering and Technology, CSVTU, Bhilai, Chhattisgarh, India

Department of Electronics and Telecommunication

Praveen Yadav, Rungta College of Engineering and Technology, CSVTU, Bhilai, Chhattisgarh, India

Department of Electronics and Telecommunication
How to Cite
Singh, P., & Yadav, P. (2014). Secure Transmission of Information by LSB Encoding Technique using Audio Steganography and Cryptography. International Journal of Emerging Trends in Science and Technology, 1(06). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/253

References

[1] Jangra, Taruna, and Dinesh Singh. "Message guided random Audio Steganography using Modified LSB Technique” INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12.5 (2014): 3464-3469.
[2] Anderson and Petitcolas 2001 Anderson, R; Petitcolas, F.: On the limits of the steganography, IEEE Journal Selected Areas in Communications, Volume 16(4), Page(s) 4,474-481.
[3] Bassia June 2001 Bassia; P., Pitas, I; Nikolaidis, N.: Robust audio watermarking in the time domain, IEEE Transactions on Multimedia, Volume 3, Issue 2, Page(s):232 – 241.
[4] Cedric 2000 Cedric, T.; Adi, R.,Mcloughlin, I.: Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion, Proc. IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, pp 275-278
[5] Dumitrescu 2002 Dumitrescu, S.; Wu, W; Memon, N.: On steganalysis of random LSB embedding in continuous-tone images, Proc. International Conference on Image Processing, Rochester, NY, pp 641-644.
[6] Fridrich 2002 Fridrich; J., Goljan; M., Du, R.:Lossless Data Embedding New Paradigm in Digital Watermarking, Applied Signal Processing, 2002, 2, pp 185-196
[7] Lee and Chen 2000 Lee; Y., Chen : High capacity image steganographic model, IEEE Proceedings on Vision, Image and Signal Processing, 147, 3, pp 288-294.
[8] Mintzerl ; Mintzer, F.; Goertzil, G.; Thompson, G.; “Display of images with calibrated colour on a system featuring monitors with limited colour palettes”, Proceeding. SID International Symposium, pp 377-380;1988.
[9] Mobasseri 1998] Mobasseri, B.: Direct sequence watermarking of digital video using m-frames, Proceeding International Conference on Image Processing, Chicago, IL, pp 399- 403.
[10] [Yeh and Kuo 1999] Yeh, C., Kuo, C.: Digital Watermarking through Quasi m-Arrays, Proc. IEEE Workshop on Signal Processing Systems, Taipei, Taiwan, 456-461. [Zwicker 1982] Zwicker, E.: Psychoacoustics, Springer Verlag, Berlin, Germany.
[11] Ahuja, B.; Kaur, M., “High Capacity Filter Based Steganography”, International Journal of Recent Trends in Engineering, Vol. 1, No. 1, 2009
[12] Maitra, I. K.; Nag, S.; Datta, B.; Bandyopadhyay, S. K., “Digital Steganalysis: Review on Recent Approaches”, Journal of Global Research in Computer Science, Vol. 2, No. 1, 2011
[13] Mohammed, A. F., “Image Steganography by Mapping Pixels to Letters”, Journal of Computer Science 5 (1): pp. 33-38, 2009
[14] David, K., “The History of Steganography”, Proc. of First Int. Workshop on Information Hiding, Cambridge,UK, May30-June1 1996, Lecture notes in Computer Science, Vol.1174, Ross Anderson (Ed.), pp.1-7
[15] Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A., “Techniques for data hiding”, IBM Systems Journal, vol. 35, Issues 3&4, 1996, pp. 313-336.
[16] Kharrazi, M.; Sencar, H. T.; Memon, N., “Image Steganography: Concepts and Practice”, WSPC, April 22, 2004