A study of different steganographic methods

Dr. Vijay Shrivastav

Abstract


Audio Steganography is a technique used to transmit hidden records by means of editing an audio signal in an imperceptible manner. it is a way that ensures secured records transfer among parties generally in internet network [2]. here we gift a novel technique for resolving the troubles related to the substitution method of audio steganography. inside the first degree of protection, we use an progressed RSA encryption algorithm (RPrime RSA) to encrypt message, which could be very complex to interrupt. Within the next level, the encrypted message is to be encoded into audio statistics for this we use a more powerful GA (Genetic set of rules) based totally Least huge Bit) algorithm. a good way to boom the robustness against intentional attacks wherein the hackers constantly strive to reveal the hidden message in addition to some unintended attacks together with noise addition, the encrypted message bits are embedded into random LSB layers. right here in order to reduce distortion, GA operators are used. The fundamental concept at the back of this paper is maintained randomness in message bit insertion into audio statistics for hiding the records from hackers and to provide a terrific, efficient technique for hiding the facts from hackers and dispatched to the vacation spot in a safer manner [5].


Full Text:

PDF

References


Zamani, M., Manaf, A.A., Ahmad, R.B., Zeki, A.M., &Abdullah, S. (2009) A genetic-set of rules-based technique for audio steganography. world Academy of science, Engineering and era, fifty four.

Krishna Bhowal, AnindyaJyoti friend, Geetam S. Tomar, P. P. Sarkar, “Audio Steganography the usage of GA”, IEEE complaints, 2010.

Krishna Bhowal, Debnath Bhattacharyya, AnindyaJyoti pal, Tai-Hoon Kim, “A GA based totally audio steganography with greater protection”, Springer technology, enterprise Media, LLC 2011.

MazdakZamani, HamedTaherdoost, Azizah A. Manaf, Rabiah B. Ahmad, and Akram M. Zeki, “sturdy Audio Steganography thru Genetic algorithm”, IEEE, 2009.

Sridevi, R., Damodaram, A., &Narasimham, S. V. L. green technique of audio steganography with the aid of changed LSB set of rules and strong encryption key with stronger security. magazine of Theoretical and applied data era, 2005–2009 JATIT.

Cvejic N. and Seppänen T. ”growing the potential ofLSB based totally audio steganography”, Proc. fifth IEEEglobal Workshop on Multimedia signal Processing, St. Thomas, VI, December 2002, pp. 336-338.

ElhamGhasemi, JamshidShanbehzadeh, NimaFassihi,“excessive potential photo Steganography usingWaveletrework and Genetic algorithm”, complaints of the global MultiConference of Engineers and pc Scientists Vol. 1, 2011.

Lee, Y. okay.,& Chen, L. H. (2000). high capability imagesteganographic model. In IEEE proceedings vision, photograph and signal processing (pp. 288–294).

palS.okay., Saxena P. k. and MuttoS.okay. “The destiny of Audio Steganography”. Pacific Rim Workshop on digital Steganography, Japan, 2002.

C. S. Shieh, H. C. Huang, F. H. Wang and J. S. Pan, ‘Genetic Watermarking based on remodel-areastrategies’, sample popularity, vol. 37, no. three, pp.555-565, 2004.

eleven. MazdakZamani, AzizahBt Abdul Manaf, RabiahBtAhmad3, FarhangJaryani, HamedTaherdoost, SamanShojaeChaeikar, and HosseinRouhaniZeidanloo, “a unique method for Genetic Audio Watermarking”, journal of information warranty and protection five, 2010,102-111.

MazdakZamani, AzizahBt Abdul Manaf, HosseinRouhaniZeidanloo and SamanShojaeChaeikar, “Genetic substitution-based totally audio steganography for high capability packages”, Int. J. internet era and Secured Transactions, Vol. three, No. 1, 2011,ninety seven-one hundred ten.

Westfeld A. and Pitzmann A. "attacks on Steganographic structures". Lecture Notes in pc science, vol. 1768, Springer-Verlag, Berlin, pp. 61-seventy five, 2000.

Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G.(1999). factshiding—a survey. court cases of IEEE, 87(7), 1062–1078.

Fridrich, J. et al. (2000) ‘Steganalysis of LSB encodingin colour photos’, court cases of the IEEE worldwide convention on Multimedia and Expo, IEEE Press, New York, pp.1279–1282.


Refbacks

  • There are currently no refbacks.