CFP last date
20 May 2024
Reseach Article

Steganography in Audio/Video files using Modified F5 Algorithm

Published on May 2015 by Amol Khedekar, Aakash Ilag, Pooja More, Tatwadarshi P N
National Conference on Role of Engineers in Nation Building
Foundation of Computer Science USA
NCRENB2015 - Number 1
May 2015
Authors: Amol Khedekar, Aakash Ilag, Pooja More, Tatwadarshi P N
b1f6cff6-337a-4bf2-8166-133a218b800f

Amol Khedekar, Aakash Ilag, Pooja More, Tatwadarshi P N . Steganography in Audio/Video files using Modified F5 Algorithm. National Conference on Role of Engineers in Nation Building. NCRENB2015, 1 (May 2015), 9-12.

@article{
author = { Amol Khedekar, Aakash Ilag, Pooja More, Tatwadarshi P N },
title = { Steganography in Audio/Video files using Modified F5 Algorithm },
journal = { National Conference on Role of Engineers in Nation Building },
issue_date = { May 2015 },
volume = { NCRENB2015 },
number = { 1 },
month = { May },
year = { 2015 },
issn = 0975-8887,
pages = { 9-12 },
numpages = 4,
url = { /proceedings/ncrenb2015/number1/20967-7008/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Role of Engineers in Nation Building
%A Amol Khedekar
%A Aakash Ilag
%A Pooja More
%A Tatwadarshi P N
%T Steganography in Audio/Video files using Modified F5 Algorithm
%J National Conference on Role of Engineers in Nation Building
%@ 0975-8887
%V NCRENB2015
%N 1
%P 9-12
%D 2015
%I International Journal of Computer Applications
Abstract

Today's large demand of internet applications requires data to be transmitted in a more secure way. The transmission of data in public communication system is not secure because of been used throughout history. Audio steganography is the scheme of hiding the existence of secret information by suppressing it into another medium such as audio file. The first input is an audio/video files whose audio/video samples, which are used to suppress the hidden data. Whereas, the second input is a grammatically interception and improper manipulation by attacker. So the best solution for this problem is Steganography. Steganography is an effective method of hiding data that has correct text. Then it encodes the location of the random audio samples in the audio file. The proposed technique of modified F5 algorithm provides a secure way for data transmission that it is difficult for unauthorized user to detect the presence of and recover the secret data. It will also help in the transfer of the information from one machine to another machine.

References
  1. Adriansyah, Y. 2010 "Simple Audio Cryptography", Bandung, Indonesia: Department of Informatics Engineering, Schools of Electronics and Informatics Engineering, Bandung Institute of Technology
  2. Cvejic, N. Seppiinen, T. 2002, Increasing the capacity of LSB-based audio steganography, IEEE Workshop on Multimedia Signal processing, pp. 336 -338
  3. Cvejic, N. Seppanen, T. 2004, Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method, Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC04), vol. 2, pp. 533
  4. Cvejic, N. and Seppnen, T. 2005 Reduced distortion bit- modification for LSB audio steganography, Journal of Universal Computer Science, vol. 11, no. 1, pp. 56-65
  5. Amin, M. M. Salleh, M. Ibrahim, S. et. al, Information Hiding using Steganography, 4th National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia, IEEE, Oct 2012.
  6. Sullivan, K. Bi, Z. Madhow, U. et. al. , Steganalysis of quantization index modulation data hiding, Proc. of 2004 IEEE International Conference on Image Processing, vol. 2, pp. 1165-1168
  7. Jar no Mielikainen, 2006 LSB Matching Revisited, Signal Processing Letters, IEEE, Publication Volume : 13, Issue : 5, pp. 285- 287
  8. Chen and Womell, G. W. 2001, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, Vol. 47, No. 4, pp. 1423-1443
  9. Chen, B. 2010, Design and analysis of digital watermarking, information embedding, and data hiding systems," Ph. D. dissertation, MIT, Cambridge, MA
  10. Amin, M. M. Salleh, M. Ibrahim, S. et. al. , 2012 Information Hiding using Steganography, 4th National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia, IEEE
  11. Gunjan. Nehru, Puja. Dhar, A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012.
  12. Patel, H. Dave, P. 2012, Steganography Technique Based on DCT Coefficients
  13. Jessica. Fridrich, Miroslav. Goljan, Dorin. Hogea, Steganalysis of JPEG Images: Breaking the F5 Algorithm, Department of Electrical and Computer Engineering, SUNY Binghamton, NY 13902-6000, USA, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Messaging Secure Communication Audio/video Files Modified F5 Algorithm.