CFP last date
20 December 2024
Reseach Article

Data Hiding of Stream Cipher in Audio File using Random Permutation Technique

by Asmaa A. Jaber, Hameed A. Younis
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 172 - Number 10
Year of Publication: 2017
Authors: Asmaa A. Jaber, Hameed A. Younis
10.5120/ijca2017915214

Asmaa A. Jaber, Hameed A. Younis . Data Hiding of Stream Cipher in Audio File using Random Permutation Technique. International Journal of Computer Applications. 172, 10 ( Aug 2017), 24-29. DOI=10.5120/ijca2017915214

@article{ 10.5120/ijca2017915214,
author = { Asmaa A. Jaber, Hameed A. Younis },
title = { Data Hiding of Stream Cipher in Audio File using Random Permutation Technique },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 172 },
number = { 10 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume172/number10/28288-2017915214/ },
doi = { 10.5120/ijca2017915214 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:19:59.935990+05:30
%A Asmaa A. Jaber
%A Hameed A. Younis
%T Data Hiding of Stream Cipher in Audio File using Random Permutation Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 172
%N 10
%P 24-29
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The universal development of computer and communication technologies and the spread of network on a global scale, has led to the appearance of numerous techniques for the transmission of confidential information such as cryptography. Because of the hacking and breakthrough of these technologies, the need for more sophisticated and difficult techniques and methods to transfer confidential information in a secure manner. Steganography is where secret information is hidden in a way that does not allow the third party to know hidden information. It is added with stream cipher to increase the security of information transmission and uses media such as, image, audio, text or video as a transmission medium for that information. The aim of this paper is to use a method to hide confidential information (image or audio) into audio file as a cover in such a way as to certify that hacking does not reach that information by making the size of the cover equal to the size of the original file. The audio file resulting from the masking process is similar to the original file and the human ear can not sense the change between them. By splitting the original audio cover into frames and applying the random function to the clutter of the hiding locations after separating the layers of the color image in the case of the confidential information image or fragmentation of the audio to be hidden into frames and then applying this function to select hiding locations. In the case of retrieval, the process is reversed where the embedded audio file is fragmented stego-audio and apply the random function to select hiding locations. In the audio segmentation process, we use a key that represents the size of the image to be hidden, as well as frames, and serves as a cryptographic key for the original voice to increase security. The success rate of image recovery was obtianed. The sound retrieval process was also good.

References
  1. Alturki, F. , & Mersereau, R. 2001 A Novel Approach for Increasing Security and Data Embedding Capacity in Images for Data Hiding Applications.  In Information Technology: Coding and Computing, Proceedings. International Conference, PP. 228-233, IEEE.
  2. Djebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. 2012 Comparative Study Of Digital Audio Steganography Techniques.  EURASIP Journal on Audio, Speech, and Music Processing.
  3. Abdul-Lateef, A., 2005 Text Embedded in Audio Steg System Design. A Thesis Master, Dept. of Computer Science, College of Science, University of Basrah.
  4. Parmar, S. B., Pokharna, P. P., & Patil, A. B.2013. A Conceptual Study of Various Data Hiding Techniques – A Review. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 2.
  5. Bah, J., & Ramakishore, R., 2015. Audio Steganography Using Parity Method at Higher LSB Layer as a Variant of LSB Technique. International Journal of Innovative Research in Computer and Communication Engineering.
  6. Abdul-Kareem, H., &Y., Ahmed, I. A. 2016 Multimedia Data Hiding: Three-in-One. The Forth Scientific Conference of the College of Science University of Kerbala.
  7. Kekre, H. B., Athawale, A., Rao, S., & Athawale, U. 2010. Information Hiding in Audio Signals. International Journal of Computer Applications, Vol. 7, No. 9, PP. 0975 – 8887.
  8. Gupta, N., & Sharma, N. 2013. Hiding Image in Audio using DWT and LSB . International Journal of Computer Applications, Vol. 81, No. 2.‏ ‏
  9. Adul Kaream, H., 2000 Attacking Stream Cipher Systems Using Genetic Algorithm, A Thesis Of Master, Deptment. Computer Science, College Science, University Of Basrah.
  10. Chai1, T. , & Draxler, R. R. 2014. Root Mean Square Error (RMSE) or Mean Absolute Error (MAE)? – Arguments Against Avoiding RMSE in the Literature. Geosci. Model Dev., Vol. 7, PP. 1247–1250.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Stego-Audio PSNR SNR Stream Cipher.