We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Audio based Secure Encryption and Decryption

Published on May 2015 by Priyanka Pitale, Anisha Pateria, Priya Singh, Nidhi Golchha
National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
Foundation of Computer Science USA
ACEWRM2015 - Number 1
May 2015
Authors: Priyanka Pitale, Anisha Pateria, Priya Singh, Nidhi Golchha
06c323fa-4355-4e6b-b8d7-17d81471509b

Priyanka Pitale, Anisha Pateria, Priya Singh, Nidhi Golchha . Audio based Secure Encryption and Decryption. National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering. ACEWRM2015, 1 (May 2015), 1-4.

@article{
author = { Priyanka Pitale, Anisha Pateria, Priya Singh, Nidhi Golchha },
title = { Audio based Secure Encryption and Decryption },
journal = { National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering },
issue_date = { May 2015 },
volume = { ACEWRM2015 },
number = { 1 },
month = { May },
year = { 2015 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/acewrm2015/number1/20891-6001/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
%A Priyanka Pitale
%A Anisha Pateria
%A Priya Singh
%A Nidhi Golchha
%T Audio based Secure Encryption and Decryption
%J National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
%@ 0975-8887
%V ACEWRM2015
%N 1
%P 1-4
%D 2015
%I International Journal of Computer Applications
Abstract

Steganography is a craft of sending shrouded information or mystery messages over an open channel so that an outsider can't identify the vicinity of the mystery messages. We propose methodologies of substitution method of sound steganography that enhances the limit of spread sound for inserting extra information. For more secure correspondence we are giving security by utilizing the RSA calculation which is focused around cryptography. By utilizing these techniques outsiders can't percept the presence of message implanted in the sound record. The properties of the sound document continue as before in the wake of concealing the mystery message.

References
  1. July 2013 Encryption of an Audio File on Lower Frequency Band for Secure Communication. Sheetal Sharma, Lucknesh Kumar, HimanshuSharma Dep. Of CSE GCET, Dep. Of ECE, M. U. Greater Noida India Aligarh, India.
  2. www. informit. com Cryptography with JAVA.
  3. B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994.
  4. B. Schneier, Description of a New Variable-Length Key, 64-Bit Block ciphers software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-204.
  5. www. arachnoid. com/signal_processing
  6. Meyer, J. and Gadegast, F. , "Security Mechanisms for Multimedia Data with the Example MPEG-1 Video,"Project Description of SECMPEG, Technical University of Berlin, Germany, May 1995.
  7. Spanos, G. A. and Maples, T. B. , "Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-time Video," Proceedings of 4th International Conference on Computer Communications and Networks, Las Vegas, NV, September 20-23, 1995.
  8. Kriti Saroha SOIT CDAC U. P. , INDIA Pradeep Kumar Singh, A Variant of LSB Steganography for Hiding Images in Audio, International Journal of Computer Applications (0975 – 8887) Volume 11– No. 6, December 2010
  9. Budda Lavanya, 2 Yangala Smruthi, 3 Srinivasa Rao Elisala. Data hiding in audio by using image steganography technique, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www. ijettcs. org Volume 2, Issue 6, November – December 2013
  10. Jayaram, Ranganatha H R2, Anupama H Department of Computer Science and Engineering, R V College of Engineering, INFORMATION HIDING USING AUDIO
  11. STEGANOGRAPHY – A SURVEY The International Journal of Multimedia & Its Applications (IJMA) Vol. 3, No. 3, August 2011
  12. Kamalpreet Kaur DeepankarVerma, Multi-Level Steganographic Algorithm for Audio Steganography using LSB, Parity Coding and Phase Coding Technique,International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 1, January 2014
  13. Tanmaiy G. Verma, Zohaib Hasan, Dr. Girish Verma, A Unique Approach for Data Hiding Using Audio Steganography, International Journal of Modern Engineering Research (IJMER) www. ijmer. com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2098-2101
  14. Linu Babu, Jais John S, Parameshachari B D,Muruganantham , HS DivakaraMurthy, Steganographic Method for Data Hiding inAudio Signals with LSB & DCT, International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information TechnologyISSN 2320–088X IJCSMC, Vol. 2, Issue. 8, August 2013.
  15. Ashwini Mane. , Gajanan Galshetwar. , Amutha Jeyakumar, DATA HIDING TECHNIQUE: AUDIO STEGANOGRAPHYUSING LSB TECHNIQUE, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 3, May-Jun 2012, pp. 1123-1125 1123
Index Terms

Computer Science
Information Sciences

Keywords

Steganography rsa lsb