Call for Paper - November 2018 Edition
IJCA solicits original research papers for the November 2018 Edition. Last date of manuscript submission is October 22, 2018. Read More

Audio in Image Steganography based on Wavelet Transform

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 79 - Number 3
Year of Publication: 2013
Authors:
Nitin Kaul
Nikesh Bajaj
10.5120/13719-1502

Nitin Kaul and Nikesh Bajaj. Article: Audio in Image Steganography based on Wavelet Transform. International Journal of Computer Applications 79(3):7-10, October 2013. Full text available. BibTeX

@article{key:article,
	author = {Nitin Kaul and Nikesh Bajaj},
	title = {Article: Audio in Image Steganography based on Wavelet Transform},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {79},
	number = {3},
	pages = {7-10},
	month = {October},
	note = {Full text available}
}

Abstract

Security of data is very important in data communication. Everyday a lot of information is transferred form one user to another on internet and so the possibility of data theft also increases. Steganography provides a solution for the security of information during data transmission. Steganography is the science which makes the valuable information invisible to prevent it from unauthorized user. In this paper an audio message has been embedded in an image using the LSB (Least Significant Bit) technique and the wavelet transform. To hide a speech in an image is challenging as size of speech is larger than size of image. Number of bits in 1kb of speech is almost equal to an image. This paper describes how maximum speech can be embed in an image.

References

  • K. P. Soman, K. I. Ramachandran, N. G. Resmi, Insight into WAVELETS, 3rd edition, PHI publications.
  • Robi Polikar, The Wavelet Tutorial, 2nd edition, part 1.
  • Sajad Shirali-Shahreza, M. T. Maznzuri-Shalmani, "Adaptive Wavelet Domain Audio Steganography with High Capacity and Low Error Rate".
  • International Conference on Information and Emerging Technologies. ICIET 2007.
  • Steve Beaullieu, Jon Crissey, Ian Smith, "BPCS Steganography", University of Texas at San Antonio, 2003.
  • Donovan Artz, "Digital Steganography-Hiding Data within Data", Los Alamos National Laboratory, IEEE internet computing, May 2001.
  • Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly and Swarnendu Mukherjee, Poulami Das, "A tutorial review on Steganography", International Conference on Contemporary Computing (IC3-¬2008), Noida, India, August 7¬9, 2008, pp. 105¬114.
  • T. Morkel, J. H. P. Eloff, M. S. Olivier," An Overview of Image Steganography", Information and Computer Architecture Research Group.