CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Hiding Confidential File using Audio Steganography

by Md. Rasedur Rahman, Partha Chakraborty, Md. Zahidur Rahman, Md. Golam Moazzam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 50
Year of Publication: 2019
Authors: Md. Rasedur Rahman, Partha Chakraborty, Md. Zahidur Rahman, Md. Golam Moazzam
10.5120/ijca2019919422

Md. Rasedur Rahman, Partha Chakraborty, Md. Zahidur Rahman, Md. Golam Moazzam . Hiding Confidential File using Audio Steganography. International Journal of Computer Applications. 178, 50 ( Sep 2019), 30-35. DOI=10.5120/ijca2019919422

@article{ 10.5120/ijca2019919422,
author = { Md. Rasedur Rahman, Partha Chakraborty, Md. Zahidur Rahman, Md. Golam Moazzam },
title = { Hiding Confidential File using Audio Steganography },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2019 },
volume = { 178 },
number = { 50 },
month = { Sep },
year = { 2019 },
issn = { 0975-8887 },
pages = { 30-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number50/30893-2019919422/ },
doi = { 10.5120/ijca2019919422 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:53:40.090980+05:30
%A Md. Rasedur Rahman
%A Partha Chakraborty
%A Md. Zahidur Rahman
%A Md. Golam Moazzam
%T Hiding Confidential File using Audio Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 50
%P 30-35
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message’s very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. In this research we have proposed a simple and effective way to hide data in audio file with 256 bit AES encryption based on Least Significant Bits technique. This approach can hide not only text message but also any type of files currently used e.g. .jpg, .pdf, .mp3, mpeg4 etc in a wav audio file.

References
  1. Khare, P., Singh, J. and Tiwari, M., “Digital Image Steganography”, Journal of Engineering Research and Studies, Vol. II, Issue III, pp. 101-104, 2011, ISSN: 0976-7916.
  2. Ghoshal N., Mandal, J. K., “Masking based Data Hiding and Image Authentication Technique (MDHIAT)”, Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM-2008, ISBN: 978-1-4244-2962-2, December 14-17th, Anna University.
  3. S. Pavan, S. Gangadharpalli and V. Sridhar, “Multivariate entropy detector based hybrid image registration algorithm”, IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, pp. 18-23, March 2005.
  4. P. Moulin and J. A. O’Sullivan, “Information-theoretic analysis of information Hiding”, IEEE Trans. On Info. Theory, Vol. 49, No. 3, pp. 563-593, March 2003.
  5. C. Rechberger, V. Rijman and N. Sklavos, “The NIST cryptographic Workshop on Hash Functions”, IEEE Security & Privacy, Vol. 4, pp. 54-56, Austria, Jan-Feb 2006.
  6. C.Y. Lin and S. F. Chang, “A robust image authentication method surviving JPEG lossy compression”, Proc. SPIE, Vol. 3312, San Jose, pp. 296-307, Jan. 1998.
  7. S. Dumitrescu, W. Xiaolin and Z. Wang, “Detection of LSB steganography via sample pair analysis”, IEEE Trans. on Signal processing, Vol. 51, No. 7, pp. 1995-2007, 2003
  8. R., Chandramouli, and Nasir Memon., "Analysis of LSB based image steganography techniques." International Conference on Image Processing, 2001, IEEE, Vol. 3, pp. 1019-1022.
  9. Rabah, K., “Steganography – The Art of Hiding Data”, Information Technology Journal, Vol.3, no.3, 2004, pp. 245-269.
  10. Curran, K. and Bailey, K., “An Evaluation of Image Based Steganography Methods”, International Journal of Digital Evidence Fall 2003, Volume 2, Issue 2.
  11. Laskar, S.A. and Hemachandran, K., “An Analysis of Steganography and Steganalysis Techniques”, Assam University Journal of Science and Technology, Vol.9, No.II, 2012, pp.83-103, ISSN: 0975-2773.
  12. M. Warkentin, M.B. Schmidt, E. Bekering, Steganography and steganalysis, Premier reference Source-Intellectual Property Protection for Multimedia Informaiton technology, Chapter XIX, 2008, pp. 374-380.
  13. N.N. El-Emam, Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science 3 (2007) 223-232.
  14. P.Y. Chen, W.E. Wu, A modified side match scheme for image steganography, International Journal of Applied Science & Engineering 7 (2009) 53-60.
  15. Rosziati Ibrahim, Teo Suk Kuan, Steganography Algorithm to Hide Secret Message inside an Image, Computer Technology and Application 2 (2011) 102-108.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Decryption Encryption LSB Secret key Steganography Stego-image