CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Hiding Data in Wave Files

Published on February 2013 by Pushpa Aigal, Pramod Vasambekar
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 6
February 2013
Authors: Pushpa Aigal, Pramod Vasambekar
0c453c4d-2da9-459a-8df5-19982bafc91d

Pushpa Aigal, Pramod Vasambekar . Hiding Data in Wave Files. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 6 (February 2013), 20-24.

@article{
author = { Pushpa Aigal, Pramod Vasambekar },
title = { Hiding Data in Wave Files },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 6 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 20-24 },
numpages = 5,
url = { /proceedings/icrtitcs2012/number6/10287-1391/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Pushpa Aigal
%A Pramod Vasambekar
%T Hiding Data in Wave Files
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 6
%P 20-24
%D 2013
%I International Journal of Computer Applications
Abstract

Hiding information is an art and science of communication technology. Using Steganography information can be hidden within other information that it cannot be detected, but only by its intended recipient. Now a days for hiding information there are different multimedia systems like audio etc. Embedding secret message in sound is a difficult process. There are varying techniques for embedding information in audio. In this paper we will attempt the general principles of hiding secret information using audio techniques and an overview of its functions.

References
  1. Shahreza S. S. and Shalmani M. T. M. , "Adaptive wavelet domain Audio Steganography with high capacity and low error rate", in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, pp: 1729 – 1732, 2008.
  2. Bethany Delman, 'Genetic Algorithms in Cryptography Published in July 2004. https://ritdml. rit. edu/handle/1850/263, Accessed on 22nd Jan 2012
  3. Darrell Whitley,'A Genetic Algorithm Tutorial', Computer Science Department, Colorado State University, Fort Collins, CO 80523.
  4. Gustavus J. Simmons, The Prisoners' Problem and the Subliminal Channel, Proceedings of CRYPTO ,83(1984)51-57.
  5. RJ Anderson, Stretching the Limits of Steganography, Information Hiding, Springer Lecture Notes in Computer Science, 1174 (1996) 39-48.
  6. Scott. Craver, On Public-key Steganography in the Presence of an Active Warden, Proceedings of 2nd International Workshop on Information Hiding. , (1998) 355-368.
  7. Ross J. Anderson. and Fabien A. P. Petitcolas, On the limits of Steganography, IEEE Journal on Selected Areas in Communications (J- SAC), Special Issue on Copyright and Privacy Protection,16(1998) 474- 481.
  8. Soumyendu Das, Subhendu Das, Bijoy Bandyopadhyay and Sugata Sanyal, "Steganography and Steganalysis:different_Steganograpy_Steganalysis_different_approaches. pdf.
  9. "Audio steg: methods", Internet publication on www. snotmonkey. com http://www. snotmonkey. com/work/school/405/methods. htm. Accessed on 22nd Jan 2012
  10. N. Cvejic, T. Seppanen, "Increasing Robustness of LSB Audio Steganography using a novel embedding method", in Proc. IEEE Int. Conf Info. tech. : Coding and Computing, Vol. 2, pp. 533-537, April 2004.
  11. Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee and Poulami Das, "A Tutorial Review on Steganography" http://www. jiit. ac. in/jiit/ic3/IC3_2008/IC32008/APP2_21. pdf, Accessed on 22nd Jan 2012
  12. K. Gopalan and S. Wenndt, "Audio Steganography for covert data transmission by imperceptible tone insertion ", Proceedings of Communications Systems and Application, IEEE, 2011.
  13. N. Cvejic, T. Seppanen, "A wavelet domain lsb Insertion algorithm for high capacity audio Steganography ", IEEE International Conference on Acoustics, speech and Signal Processing, ICASSP 2008.
  14. P. Ramesh Yadav, V. Usha Shree, K. Padmapriya, Hiding Data in Audio Using Audio Steganography, International Journal of Computer Applications in Engineering Sciences, ISSN: 2231-4946 .
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Encryption Decryption Audio Lsb Method