CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

An Optimized Method for Concealing Data using Audio Steganography

by Md. Shafakhatullah Khan, V.Vijaya Bhasker, V. Shiva Nagaraju
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 33 - Number 4
Year of Publication: 2011
Authors: Md. Shafakhatullah Khan, V.Vijaya Bhasker, V. Shiva Nagaraju
10.5120/4009-5687

Md. Shafakhatullah Khan, V.Vijaya Bhasker, V. Shiva Nagaraju . An Optimized Method for Concealing Data using Audio Steganography. International Journal of Computer Applications. 33, 4 ( November 2011), 25-30. DOI=10.5120/4009-5687

@article{ 10.5120/4009-5687,
author = { Md. Shafakhatullah Khan, V.Vijaya Bhasker, V. Shiva Nagaraju },
title = { An Optimized Method for Concealing Data using Audio Steganography },
journal = { International Journal of Computer Applications },
issue_date = { November 2011 },
volume = { 33 },
number = { 4 },
month = { November },
year = { 2011 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume33/number4/4009-5687/ },
doi = { 10.5120/4009-5687 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:19:17.983890+05:30
%A Md. Shafakhatullah Khan
%A V.Vijaya Bhasker
%A V. Shiva Nagaraju
%T An Optimized Method for Concealing Data using Audio Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 33
%N 4
%P 25-30
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we propose a new approach which is sophisticated for concealing the data. We are using Audio Steganography to make the confidential data more secure, so that the data cannot be tracked and modified by the intruders. To make the confidential data secure we are using efficient and reliable algorithms. This paper describes how the data is secured form the intruders even though they trace the audio file which contains the confidential data.

References
  1. Ahmad Delforouzi, Mohammad Pooyan, “Adaptive Digital Audio Steganography Based on Integer Wavelet Transform”.
  2. N. Cvejic, T. Seppanen, “Increasing robustness of LSB audio steganography using a novel embedding method,” In Proc. IEEE Int. Conf. Info. Tech. : Coding and Computing, Vol. 2, pp. 533-537, April 2004.
  3. N. Cvejic, T. Seppanen, “Increasing the capacity of LSBbased audio steganography.” IEEE Workshop on Multimedia Signal Processing, pp. 336-338, 2002.
  4. S.S. Agaian, D. Akopian, O. Caglayan, S. A. D’Souza, “Lossless Adaptive Digital Audio Steganography,” In Proc. IEEE Int. Conf. Signals, Systems and Computers, pp. 903-906, November 2005.
  5. N. Cvejic, T. Seppanen, “A wavelet domain LSB insertion algorithm for high capacity audio steganography,” In Proc. IEEE Digital Signal Processing Workshop, Callaway Gardens, GA, p. 53–55, October 2002.
  6. K. Gopalan, “Audio steganography using bit modification,” Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Vol. 2, pp. 421-424, April 2003.
  7. P. Bao and X. Ma, “MP3-Resistant Music Steganography based on Dynamic Range Transform,” IEEE Int. Sym. Intelligent Signal Processing and Communication Systems, pp. 266-271, Nov. 18-19, 2004, Seoul, Korea.
  8. R. A. Santosa, P. Bao, “Audio-to-image wavelet transform based audio steganography,” IEEE Int. Symp. pp. 209-212, June 2005, Zadar, Croatia.
  9. H. Matsuka, “Spread Spectrum Audio Steganography using Sub-band Phase Shifting,” IEEE Int. conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP' 06), pp. 3-6, Dec. 2006 , Pasadena, CA, USA.
  10. R SRIDEVI, DR. A DAMODARAM, DR. SVL.NARASIMHAM “Efficient Method or Audio Steganography by modified LSB Algorithm and Strong Encryption Key with Enhanced Security”. In Proc. JATIT. PP: 768-771, 2005-2009.
  11. Sterling, M.; Titlebaum, E.L.; Xiaoxiao Dong; Bocko, M.F.; “An adaptive spread-spectrum data hiding technique for digital audio”. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). Publication Year: 2005 , Page(s): v/685 - v/688 Vol. 5
  12. Westlund, Harold B. (2002). "NIST reports measurable success of Advanced Encryption Standard". Journal of Research of the National Institute of Standards and Technology.
  13. 3 Hsiang H., and ShihW. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, doi: 10. 1016j. csi.2008.11.002.
  14. J.Johnston, “Transform Coding of Audio Signals Using Perceptual Noise Criteria”, IEEE Journal on Selected Areas in Communication, vol.6, pp.314-323, February, 1988.
  15. Ou, George (April 30, 2006). "Is encryption really crackable?". Ziff-Davis. Archived from the original on August 7, 2010. Retrieved August 7, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Audio Steganography Advanced Encryption Standard Security Spectrum Spread Key Management.