CFP last date
20 December 2024
Reseach Article

Encrypted Information Hiding using Audio Steganography and Audio Cryptography

by Nishith Sinha, Anirban Bhowmick, B.kishore
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 5
Year of Publication: 2015
Authors: Nishith Sinha, Anirban Bhowmick, B.kishore
10.5120/19666-1387

Nishith Sinha, Anirban Bhowmick, B.kishore . Encrypted Information Hiding using Audio Steganography and Audio Cryptography. International Journal of Computer Applications. 112, 5 ( February 2015), 49-53. DOI=10.5120/19666-1387

@article{ 10.5120/19666-1387,
author = { Nishith Sinha, Anirban Bhowmick, B.kishore },
title = { Encrypted Information Hiding using Audio Steganography and Audio Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 5 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 49-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number5/19666-1387/ },
doi = { 10.5120/19666-1387 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:41.418483+05:30
%A Nishith Sinha
%A Anirban Bhowmick
%A B.kishore
%T Encrypted Information Hiding using Audio Steganography and Audio Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 5
%P 49-53
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the growing importance of the internet, secure transmission of information is crucial. Steganography and cryptography helps in providing this much needed data confidentiality. Steganography hides secret information into a cover medium and cryptography converts data into an unrecognizable form. In this paper, the authors proposed a novel approach for concealing data. The proposed algorithm is an amalgamation of text encryption, audio steganography and audio encryption. In the first step, the original text message is encrypted using modified Vigenère cipher algorithm. This cipher text gets embedded into the cover audio using LSB encoding, in the second step. Further, the audio file is then subjected to transposition making use of Blum Blum Shub pseudo random number generator. This scrambled stegno audio is transmitted to the receiver which carries the encrypted secret data.

References
  1. Behrouz A. Forouzan, "Cryptography and Network Security" special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi.
  2. S. Das, B. Bandyopadhyay and S. Sanyal, "Steganography and Steganalysis: different approaches", Cornell University Library, 2011.
  3. Nigam Sangwan, "Text Encryption with Huffman Compression", International Journal of Computer Applications (0975 – 8887) Volume 54– No. 6, September 2012
  4. Ayushi, "A Symmetric Key Cryptographic Algorithm" International Journal of Computer Applications (09758887) Volume 1 – No. 15
  5. Wang H and Wang S, "Cyber warfare: Steganography vs. Steganalysis", Communications of the ACM, vol. 47, no. 10, 2004
  6. Forman, Nishith Sinha, Kishore Bhamidipati, "Improving Security of Vigenère Cipher by Double Columnar Transposition", International Journal of Computer Applications (0975 – 8887) Volume 100 – No. 14, August 2014.
  7. "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications", National Institute of Standards and Technology, Special Publication 800-22 Revision 1a.
  8. Divyanjali, Ankur, Vikas Pareek, "An Overview of Cryptographically Secure Pseudorandom Number generators and BBS", International Journal of Computer Applications (0975 – 8887).
  9. M U Bokhari, Shadab Alam, Faheem Syeed Masoodi, "Cryptanalysis techniques for Stream Cipher: A Survey", International Journal of Computer Applications (0975 – 8887) Volume 104 – No 15, October 2014
  10. Andrew S Tanenbaum, "Computer Networks", 4th Edition
  11. Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung, "Image Steganography and Steganalysis: A Survey", International Journal of Computer Applications (0975 – 8887) Volume 52– No. 2, August 2012
  12. Komal Patel, Sumit Utareja, Hitesh Gupta, "Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm", International Journal of Computer Applications (0975 – 8887) Volume 63– No. 13, February 2013
  13. V. Lokeswara Reddy, A Subramanyam , P Chenna Reddy, "A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography", International Journal of Computer Applications (0975 – 8887) Volume 69– No. 15, May 2013
  14. Unik Lokhande, A. K. Gulve, "Steganography using Cryptography and Pseudo Random Numbers", International Journal of Computer Applications (0975 – 8887) Volume 96– No. 19, June 2014
  15. Md. Shafakhatullah Khan, V. Vijaya Bhasker, V. Shiva Nagaraju, "An Optimized Method for Concealing Data using Audio Steganography", International Journal of Computer Applications (0975 – 8887) Volume 33– No. 4, November 2011
  16. H. B. Kekre, Archana Athawale, Swarnalata Rao, Uttara Athawale, "Information Hiding in Audio Signals", International Journal of Computer Applications (0975 – 8887) Volume 7– No. 9, October 2010
  17. D R Stinson, "Cryptography Theory and Practice", 3rd Edition
  18. William Stallings," Cryptography and Network Security", 5th Edition
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Audio Steganography Audio Encryption Modified Vigenère Cipher Blum Blum Shub Pseudo Random Number LSB Coding.