We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

by V. Lokeswara Reddy, A. Subramanyam, P. Chenna Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 15
Year of Publication: 2013
Authors: V. Lokeswara Reddy, A. Subramanyam, P. Chenna Reddy
10.5120/11922-8131

V. Lokeswara Reddy, A. Subramanyam, P. Chenna Reddy . A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography. International Journal of Computer Applications. 69, 15 ( May 2013), 37-44. DOI=10.5120/11922-8131

@article{ 10.5120/11922-8131,
author = { V. Lokeswara Reddy, A. Subramanyam, P. Chenna Reddy },
title = { A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 15 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number15/11922-8131/ },
doi = { 10.5120/11922-8131 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:30:24.002077+05:30
%A V. Lokeswara Reddy
%A A. Subramanyam
%A P. Chenna Reddy
%T A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 15
%P 37-44
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today's large demand for internet applications requires data to be transmitted in a safe and secure manner. Data transmission in public communication system insecure because of interception and improper manipulation by eavesdropper. So the solution for this problem is Steganography, Steganography is the art of hiding one medium of information into another medium. There are many approaches for hiding textual information in multimedia file such as image, audio and video. Hiding textual information in multimedia file provides the most effective way to guard privacy. Key aspect of embedding text in multimedia file is that, after embedding text in multimedia file the size of the multimedia file remains same. The existing system can't provide more security and message length is restricted to few characters only. The proposed technique alters the data of lower bit in a cover object to embed textual information. The main goal of this paper is to embed textual information into multimedia file and the text message is encrypted before embedding to get advantage of cryptography.

References
  1. Soum. yendu Das, Bijoy Bandyopadhyay and sugata sanyal, "Steganography and steganalysis: Different Approaches", an article.
  2. Data Hiding in Images Part 1- Fundamental Issues and Solutions, IEEE Transaction on Image Processing, Vol. 12, No. 6, June 2003. p. p 685-695.
  3. W. Bender, W. Butera, D. Gruhl, F. J. Paiz, S. Pogreb, "Techniques for data hiding", IBM Systems Journal, vol. 39, Issue 3-4, July 2000, pp 547-568.
  4. Pramatha Nath Basu and Tanmay Bhowmik, "On Embedding of Text in Audio-A case of Steganography", International Conference on Recent Trends in Information, Telecommunication and Computing. 2010. p. p 203-206.
  5. Jayaram p, Ranganatha H R, Anupama H S, "Information Hiding using Audio Steganography- A Survey", The International Journal of Multimedia & Its Applications(IJMA), Vol. 03, No. 03, August 2011, p. p 86-96.
  6. Aravind Kumar, Km. Pooja, "International Journal of Computer Applications", Vol. 9, No. 7, November 2010, p. p 19-23.
  7. Steganographic Techniques and their use in an Open-Systems Environment- Bret Dunbar, The information Security reading Room, SANS Institute.
  8. Silman, J. , "Steganography and Steganalysis: An Overview", SANS Institute, 2001.
  9. Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee and Poulami Das, "A Tutorial Review on Steganography", International Conference on Comtemporary Computing (IC3'09), June 2009, p. p 105-114.
  10. Kousik Dasgupta, J. K. Mandal, Paramartha Dutta, "Hash Based Least Significant Bit Technique for Video Steganography (HSLB)", International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 01,No 02,April 2012, p. p 1-11.
  11. Asoke Nath, Sankar Das and Amlan Chakrabarthi, " Data Hiding and Retrieval", IEEE International conference on Computational Intelligence and Communication Networks,26-28, Nov 2010 , p. p. 392-397.
  12. K. Geetha and P. Vanitha Muthu, "Implementation of ETAS (Embedding Text in Audio Signal) Model to Ensure Secrecy" International Journal on Computer Science and Engineering Vol. 02, No. 04, 2010,p. p 1308-1313.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Data Hiding Extraction Cover Object Stego object