CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Enhancement in Security of LSB based Audio Steganography using Multiple Files

by Pooja Chandrakar, Minu Choudhary, Chandrakant Badgaiyan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 7
Year of Publication: 2013
Authors: Pooja Chandrakar, Minu Choudhary, Chandrakant Badgaiyan
10.5120/12754-9705

Pooja Chandrakar, Minu Choudhary, Chandrakant Badgaiyan . Enhancement in Security of LSB based Audio Steganography using Multiple Files. International Journal of Computer Applications. 73, 7 ( July 2013), 21-24. DOI=10.5120/12754-9705

@article{ 10.5120/12754-9705,
author = { Pooja Chandrakar, Minu Choudhary, Chandrakant Badgaiyan },
title = { Enhancement in Security of LSB based Audio Steganography using Multiple Files },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 7 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number7/12754-9705/ },
doi = { 10.5120/12754-9705 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:27.129673+05:30
%A Pooja Chandrakar
%A Minu Choudhary
%A Chandrakant Badgaiyan
%T Enhancement in Security of LSB based Audio Steganography using Multiple Files
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 7
%P 21-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is one of the best data hiding technique in the world which can be used to hide data without its presence felt. In today's digital world most of us communicate via use of electronic media or internet. Most people among us remain unaware about the data loss or data theft which can happen on online transmission of data or message. Valuable information including personal data, messages transmitted through internet is vulnerable to hackers who may steal or decrypt our data or messages. This paper is about enhancing the data or message security with use of Audio Steganography using LSB algorithm to hide the message into multiple audio files. The message hidden by this application is less vulnerable to be stolen than other similar applications. This is due to following reasons: Firstly multiple files are taken to hide high amount of message which enhance information hiding capacity. Secondly before being hidden, the message is broken into parts and shuffled randomly based on permutation generated at runtime so even if the LSB gets encountered the message is still unarranged and meaningless which enhances its security. This application is capable to carry large amount of information with greater security.

References
  1. Fatiha Djebbar_1 and Beghdad Ayad2and Karim Abed Meraim3and Habib Hamam4 "Comparitive Study of Digital Audio Steganography Techniques" Survey paper2011.
  2. Jayaram P1, Ranganatha H R2, Anupama H S3 "Information Hiding Using Audio Steganography-A Survey"IJMA 2011 Vol. 3, No. 3,August.
  3. Abdulaleem Z. Al-Othmani1, Azizah Abdul Manaf2 and Akram M. Zeki3 "A Survey on Steganography Techniques in Real Time Audio Signals and Evaluation"IJCSI,Vol. 9,Issuse 1,No 1, January 2012.
  4. Dr. H. B. Kekre, ArchanaAthawale, B. SwarnalataRao, UttaraAthawale, Increasing the capacity of the cover audio signal by using multiple LSBs for information hiding, IEEE Third International Conference on Emerging Trends in Engineering and Technology, 2010.
  5. Masahiro Wakiyama†, Yasunobu Hidaka†, Koichi Nozaki "An audio steganography by a low-bit coding method with wave files" IEEE 2010 Sixth International Conferene on Intelligent Information Hiding and Multimedia Signal Processing.
  6. Jisna Antony, Sobinc. c, Sherly A. P, "audio steganography in wavelet domain-a survey",International Journal of Computer Applications, Volume 52-No. 13, August 2012.
  7. M. L. Mat Kiah1, B. B. Zaidan2,3,4, A. A. Zaidan2,3,4*, A. Mohammed Ahmed1 and Sameer Hasan Al-bakri1, "A review of audio based steganography and digital Watermarking", International Journal of the Physical Sciences Vol. 6(16), pp. 3837-3850, 18 August, 2011.
  8. Parul Shah, PranaliChoudhari and Suresh Sivaraman, "Adaptive Wavelet Packet Based Audio Steganography using Data History" 2008 IEEE Region 10 Colloquium and the Third ICIIS, Kharagpur, INDIA December 8-10.
  9. Muhammad Asad, JunaidGilani Adnan Khalid, "An Enhanced Least Significant Bit Modification Technique for Audio Steganography", 978-1-61284-941-6/1112011 IEEE.
  10. Ashwini Mane, GajananGalshetwar, AmuthaJeyakumar, "Data Hiding Technique: Audio Steganography Using LSB Technique", International Journal of Engineering Research and Applications, Vol. 2, Issue 3, May-Jun 2012, pp. 1123-1125.
  11. Dalal, Khamael& Mohammed, "A New Steganographic Method for Embedded Image In Audio File", International Journal of Computer Science and Security(IJCSS), Volume(6) : Issue(2) : 2012.
Index Terms

Computer Science
Information Sciences

Keywords

LSB Random permutation Stego file Multiple audio file