Data Security using Audio-Video Steganography

Author(s):  
Srushti Save ◽  
Pracheta Raut ◽  
Prajakta Jadhav ◽  
Tejaswini Yadav ◽  
2018 ◽  
Vol 7 (2.20) ◽  
pp. 276
Author(s):  
Rambabu Mudusu ◽  
A Nagesh ◽  
M Sadanandam

Steganography may be a strategy for concealing any mystery information like content, picture, sound behind distinctive cowl document .In this paper we have a tendency to planned the mix of image steganography associated sound steganography with confront acknowledgment innovation as an instrument for verification. The purpose is to shroud the mystery information behind sound and therefore the beneficiary's face image of video, because it may be a use of various still casings of images and sound. During this technique we've chosen any casing of video to shroud beneficiary's face image and sound to hide the mystery data. Affordable calculation, maybe, increased LSB and RSA rule is been utilised to shroud mystery content and movie. PCA rule is employed for confront acknowledgment. The parameter for security and verification ar gotten at collector and transmitter facet that ar exactly indistinguishable, consequently the knowledge security is dilated. 


2018 ◽  
Vol 181 (6) ◽  
pp. 34-38
Author(s):  
Mandeep Kaur ◽  
Kanwalvir Singh

2021 ◽  
Vol 23 (06) ◽  
pp. 709-720
Author(s):  
Shivansh Bishen ◽  
◽  
Paurav Malik ◽  
Saloni Rao ◽  
Prakash Biswagar ◽  
...  

Data Transmission in network security is one of the foremost vital issues in today’s communication world. the end result of that’s that Data security has gained utmost importance because of the unprecedented increase within the data generated over the web, which could be a basic necessity of any application in information technology. The vigorous growth within the field of data communication has made information transmission much easier. But this kind of advancement has opened many possibilities of data being snooped. So, day-by-day maintaining of data security is becoming an inseparable part of computing and communication. In this report, we’ve got explored techniques that blend cryptography and steganography together. Steganography may be a specialty of science to manage and conceal a chunk of important information inside image, audio, video, or text documents. Steganography may be a method and study of composing a secret communication specified only the source and also the targeted beneficiary will realize the concealed information. the information concealed or covered process starts with the steganography method by identifying a network canopy and redundant parts, i.e. only permitted persons would be able to change without affecting the standard of that medium. The encoding method generates a Stego medium by substituting these redundant bits with the concealed message content. In this report, various approaches for information hiding using both cryptography and steganography is proposed keeping in mind two considerations-size of the encrypted object and degree of security. Here, signature image, text, audio information is kept hidden into a cover image using the private key of sender and receiver, which extracts the data from stego image employing a public key. This approach is often used for message authentication, message integrity, and non-repudiation purpose.


2018 ◽  
Vol 07 (02(02)) ◽  
pp. 53-62
Author(s):  
Samar Kamil ◽  
Masri Ayob ◽  
Siti Norul Huda Sheikh Abdullah ◽  
Zulkifli Ahmad

Sign in / Sign up

Export Citation Format

Share Document