CFP last date
20 May 2024
Reseach Article

Hiding Encrypted Data in Audio Wave File

by Firas Ali Sabir
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 4
Year of Publication: 2014
Authors: Firas Ali Sabir
10.5120/15867-4809

Firas Ali Sabir . Hiding Encrypted Data in Audio Wave File. International Journal of Computer Applications. 91, 4 ( April 2014), 6-9. DOI=10.5120/15867-4809

@article{ 10.5120/15867-4809,
author = { Firas Ali Sabir },
title = { Hiding Encrypted Data in Audio Wave File },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 4 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number4/15867-4809/ },
doi = { 10.5120/15867-4809 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:51.991730+05:30
%A Firas Ali Sabir
%T Hiding Encrypted Data in Audio Wave File
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 4
%P 6-9
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today at a time of globalization in which the whole planet become look like a small village and transport information through it with a push button in keyboard and at a time of huge evaluation in the digital world and for the millions of users to international net and some application importance, let us to use both cryptography and steganography as a means to protect the information from hacking and interlopers. Combinations of steganography and cryptography have been made in this paper to increase the level of security and to make the system more complex to be defeated by attackers. This paper presents a method of ciphering and hiding information into a cover of audio wave file. In the first step, the text is converted to its equivalent ASCII code. Text is scrambled using DES (Data Encryption Standard) technique according to secret key then the cipher text is embedded inside a cover audio wave file using time and frequency domain. The modeled system builds of a secret key steganographic system, which embeds certain text after scrambling into random positions inside audio wave file and the other technique used in this paper to analyze the cover audio into its frequency components is wavelet transform using Haar filter as a basis function. Tests were carried out to evaluate the performance of the modeled algorithm and results in successful hiding. From the simulation results on the time domain, it is noticed that value of Signal to Noise Ratio (SNR) will decrease as the number of bits in the audio wave file to be replaced by the message increase and noticed that the value of SNR in frequency domain is higher than in time domain, so hiding in frequency domain is better than hiding in time domain.

References
  1. D. E. R. Denning, "Cryptography and Data Security", Addison-Wesly Publishing Company, 1983.
  2. S. Katzenbeisser and F. A. Petitcolas, "Information Hiding Techniques for Steganography and Digital Watermarking", Artech House, ISBN 1580530354, USA, 2000.
  3. W. Stallings, "Network Security Essentials: Applications and Standards", Fifth Edition, Prentice Hall, March, 2013.
  4. ALTERA, "Gold Code Generator Reference Design Application Note 295", VER. 10, March, 2003.
  5. M. Majeed, "Hiding Audio in Audio Using DCT", M. Sc. Thesis, Computer Science Dept. , College of Science, Al-Nahrain University, Baghdad, Iraq, 2004.
  6. P. Dutta, D. Bhattacharyya and T. Kim, "Data Hiding in Audio Signal: A Review", International Journal of Database Theory and Application, Vol. 2, No. 2, June, 2009.
  7. K. Saroha and P. K. Singh, "A Variant of LSB Steganography for Hiding Images in Audio", International Journal of Computer Applications, Vol. 11, No. 6, December, 2010.
  8. P. Aigal and P. Vasambekar, "Hiding Data in Wave Files", International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS ), 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Hiding Cryptography Data Encryption Standard Time Domain Frequency Domain.