We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Technique of Hiding Secrete Text in Wave File

by Ashraf Abu-Ein, Ziad A. A. Alqadi, Jihad Nader
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Number 4
Year of Publication: 2016
Authors: Ashraf Abu-Ein, Ziad A. A. Alqadi, Jihad Nader
10.5120/ijca2016911732

Ashraf Abu-Ein, Ziad A. A. Alqadi, Jihad Nader . A Technique of Hiding Secrete Text in Wave File. International Journal of Computer Applications. 151, 4 ( Oct 2016), 15-18. DOI=10.5120/ijca2016911732

@article{ 10.5120/ijca2016911732,
author = { Ashraf Abu-Ein, Ziad A. A. Alqadi, Jihad Nader },
title = { A Technique of Hiding Secrete Text in Wave File },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 151 },
number = { 4 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume151/number4/26220-2016911732/ },
doi = { 10.5120/ijca2016911732 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:56:11.722748+05:30
%A Ashraf Abu-Ein
%A Ziad A. A. Alqadi
%A Jihad Nader
%T A Technique of Hiding Secrete Text in Wave File
%J International Journal of Computer Applications
%@ 0975-8887
%V 151
%N 4
%P 15-18
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art of hiding secret data within other information (such as wave file) that it cannot be detected, but only by its intended recipient. Embedding secret text in wave file is a difficult process. There are varying techniques for embedding information in wave files. In this research a new simple technique of hiding secret information using wave files were produced, regardless the simplicity this technique it will be accurate and high confident. This paper features a new technique that suggests that the secrete text is encoded through the use position vector into wave file. The position vector (PV) is to be initialized randomly and to be kept confidential between the sender and the receiver. The security level of this technique will be high and it can be increased by encrypting the secrete text or/and encrypt the wave file including the text.

References
  1. K. Matrouk, A. A. Hasanat and H. Alashalary, Prof.Ziad Al-Qadi and Prof. Hasan Al-Shalabi, "Speech fingerprint to identify isolated word person", World Appl. Sci. J., vol. 31, no. 10, pp. 1767-1771, 2014.
  2. Pushpa Aigal, Pramod Vasambekar, Hiding Data in Wave Files, International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS - 2012) Proceedings published in International Journal of Computer Applications® (IJCA) (0975 – 8887).
  3. Adel A. Sewisy and others, Hidden Text into Audio Files, International Journal of Research Studies in Science, Engineering and Technology Volume 2, Issue 5, May 2015, PP 33-39 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online)
  4. R. Kaur, Jagriti, H.Singh and R.Kumar, Multilevel Technique to improve PSNR and MSE in Audio Stegsnography. International Journal of Computer Applications, Vol.103, No.5, 1-4, (2014).
  5. K.U. Singh, A Survey on Audio Steganography Approaches. International Journal of Computer Applications, Vol.95, No.14, 7-14, (2014).
  6. F.A. Sabir, Hiding Encrypted Data in Audio Wave File. International Journal of Computer Applications, International Journal of Computer Applications, Vol.91, No.4, 6-9, (2014).
  7. T. Sandhya, A Novel Audio Steganography Scheme using Double Density lauD Tree Complex Wavelet Transform Secured with Modified Blow Fish Encryption. International Journal of Emerging Technology and Advanced Engineering, Vol.3, No.1, 63-72,( 2014).
  8. Taruna and Dinesh, "Message Guided Random Audio Steganography using deifidoM LSB Technique", International Journal of Computers & Technology, Vol.86, No.7, 3464-3469, (2014).
  9. R. Valarmathi, M.SC. and M. Phil, A Novel Approach for Autography- AnoitanibmoC of Audio Steganography and Cryptography. International Journal of Emerging Technology and Advanced Engineering, Vol.4, No.1, 55-61, (2014).
  10. A. Chadha, N. Satam and R .Sood, An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution. International Journal of Computer Applications, Vol.77, No. 13, 37-45, (2013).
  11. N. Kaul and N. Bajaj, Audio in Image Steganography based on Wavelet Transform. International Journal of Computer Applications, Vol.79, .oN 3,7-10,( 2013).
  12. Burate D. J, Performance Improving LSB Audio Steganography Technique. , Vol.4, No.1, 67-75, (2013).
Index Terms

Computer Science
Information Sciences

Keywords

Steganography wave file parameters: PSNR and MSE position vector encryption decryption hacking.