CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

An Approach for Data Quality Improvement in Audio Steganography

Published on February 2013 by Parvathy. T, K. Vaitheki
National Conference on Future Computing 2013
Foundation of Computer Science USA
NCFC - Number 1
February 2013
Authors: Parvathy. T, K. Vaitheki
ef41a914-5458-4d36-98f2-afd965b692dc

Parvathy. T, K. Vaitheki . An Approach for Data Quality Improvement in Audio Steganography. National Conference on Future Computing 2013. NCFC, 1 (February 2013), 34-37.

@article{
author = { Parvathy. T, K. Vaitheki },
title = { An Approach for Data Quality Improvement in Audio Steganography },
journal = { National Conference on Future Computing 2013 },
issue_date = { February 2013 },
volume = { NCFC },
number = { 1 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 34-37 },
numpages = 4,
url = { /proceedings/ncfc/number1/10407-1009/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Future Computing 2013
%A Parvathy. T
%A K. Vaitheki
%T An Approach for Data Quality Improvement in Audio Steganography
%J National Conference on Future Computing 2013
%@ 0975-8887
%V NCFC
%N 1
%P 34-37
%D 2013
%I International Journal of Computer Applications
Abstract

Covert communication by embedding a message or data file in a cover medium has been increasingly gaining importance in the all-encompassing field of information technology. Audio steganography is concerned with embedding information in a bland cover speech in a secure and robust manner. Communication, transmission security and robustness are essential for transmitting vital information to intended sources while denying access to unauthorized persons. By hiding the information using a cover or host audio, the information even exist is concealed during transmission. The proposed work provides high bit rate improved LSB audio watermarking method. The improved quality of watermarked audio is found to be better on implementation of the proposed algorithm than in the standard LSB method.

References
  1. Cvejic, N. Seppanen, T. Increasing robustness of LSB Audio Steganography by Reduced Distortion LSB coding, Media Team Oulu Group, Oulu Univ. ,Finland.
  2. Cvejic N. and Seppänen T. Increasing the capacity of LSB based audio steganography, Proc. 5th IEEE St. International Workshop on Multimedia Signal Processing,Thomas,VI,Dec 2002, pp. 336-338.
  3. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuh Information Hiding—A Survey Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062–1078.
  4. S. S. Divya , M. Ram Mohan Reddy, Hiding Text In Audio using multiple LSB steganography and provide security using steganography.
  5. Ming Chen; Ru Zhang; Xinxin Niu; Yixian Yan Intelligent Information Hiding and Multimedia signal processing,2006. IIH-MSP '06. International Conference on Dec 2006.
  6. Samir Kumar Bandyopadhyay,Biswajita Datta Higher LSB layer based Audio Steganography Technique. IJECT, Vol. 2, issue 4. Oct- Dec2011.
  7. R. A. Santosa , P. Bao, Audio to image wavlet Transform based audio steganography,Proc. of 47th Int. Symposium ELMAR ,June 2005,pp. 209-212.
  8. C. C. Chang, T. S. Chen and H. S. Hsia,An Effective Image Steganographic Schema Based on Wavlet Transform and Pattern –Based Modification,IEEE Proceedings of the 2003 Int Conference On Computer Networks and Mobile computing,2003.
  9. K. Gopalan, Audio Steganography using Bit Modification ,Proc. IEEE, Int ,Accoustics,Speech, And Signal Processing,Vol. 2,pp421-424,April 09.
  10. W. Bender ,D. Gruhl,N. Morimoto and A. Lu, Techniques for data hiding,IBM systems Journal,Vol. 35,Issues 3&4,1996,pp313-336.
  11. Anderson, R. , Petitcolas, F. On the limits of the Steganography ,IEEE Journal Selected Areas in Communications,16,4,474-481.
  12. Lee, Y. , Chen, L. , High capacity image steganographic model, IEE Proceedings on Vision, Image and Signal Processing, 147, 3, 288-294.
Index Terms

Computer Science
Information Sciences

Keywords

Audio Steganography Lsb Rsa Has