scholarly journals Hiding Voice Message using Both Cryptography and Steganography

Author(s):  
Huda Najeeb

The goal of encryption voice is to ensure the preservation of the conversation details and not to allow anyone to tamper with or see it. This conversation is either secret or very private; no one can understand the substance of that information or messages only authorized persons who have own secret key. The best method to protect the voice message from unauthorized persons is to use both cryptography and steganography. This paper reviews the Advanced Encryption Standard (AES) algorithm used for encrypting voice message and  the Least Signification Bit steganography (LSB) used for embedding encrypted voice message with related key in color image without impacting the content and quality of it. After hiding a secret voice in an image, Stego image is created then is sent to the recipient. The mean square error (MSE) and the signal-to-noise ratio (PSNR) is calculated to measure the quality of the sent image. The findings of the research are that the stego image cannot be distinguished by the naked eye from the original cover image when the bit value is 1 or 2 and thus we reach the goal to cover the presence of a hidden sound inside.

2021 ◽  
Vol 39 (1B) ◽  
pp. 231-242
Author(s):  
Sally A. Mahdi ◽  
Maisa’a A. Khodher

Image steganography is the art of hiding data into an image by using the secret key. This paper presents two techniques that combine the most significant bit (MSB) as well as the least significant bit (LSB) based on a color image (24bit for RGB). The presented study proposes a novel method to combine (LSB and MSB) bits based on check MSB values and replace bits from LSB with a secret message. The result of this proposed method that made not affect quality stego -image based on the resulting histogram that shows a match between the cover image and stego- image and more secure because not hidden in all image. The factors were used Mean Square Error (MSE), Compute Payload, in addition to Peak Signal to Noise Ratio (PSNR). The PSNR’s rate is high and MSE is less. The result of this paper when applying on the different image gives high PSNR of 87.141 and less MSE of 0.00012 when inserting message 80 bits and reduction value PSNR of 72.023 and MSE of 0.0040 when inserting message 1200 bits and measure entropy is the same value for cover image and stego –image then this method is more security for the attacker.


2020 ◽  
Vol 1 (1) ◽  
pp. 11-22
Author(s):  
Asaad A. Hani

There is a great research in the field of data security these days. Storing information digitally in the cloud and transferring it over the internet proposes risks of disclosure and unauthorized access; thus, users, organizations, and businesses are adapting new technology and methods to protect their data from breaches. In this paper, we introduce a method to provide higher security for data transferred over the internet, or information based in the cloud. The introduced method for the most part depends on the Advanced Encryption Standard (AES) algorithm, which is currently the standard for secret key encryption. A standardized version of the algorithm was used by The Federal Information Processing Standard 197 called Rijndael for the AES. The AES algorithm processes data through a combination of exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and MixColumn operations. The fact that the algorithm could be easily implemented and run on a regular computer in a reasonable amount of time made it highly favorable and successful. In this paper, the proposed method provides a new dimension of security to the AES algorithm by securing the key itself such that even when the key is disclosed; the text cannot be deciphered. This is done by enciphering the key using Output Feedback Block Mode Operation. This introduces a new level of security to the key in a way, in which deciphering the data requires prior knowledge of the key and the algorithm used to encipher the key for the purpose of deciphering the transferred text.


Author(s):  
SOFIA SAIDAH ◽  
NUR IBRAHIM ◽  
MOCHAMMAD HALDI WIDIANTO

ABSTRAKPada studi ini, dilakukan penggabungan metode - metode untuk memperkuat dan meningkatkan sisi keamanan proses pertukaran informasi atau pesan digital. Metode yang digunakan diantaranya adalah metode kriptografi dan metode steganografi. Implementasi pada sistem yang dibangun dilakukan dengan menyandikan pesan pada penerapan metode steganografi citra dalam menyembunyikan pesan tersandi yang dihasilkan ke dalam sebuah citra warna (RGB) dalam domain Discrete Cosine Transform dengan teknik penyisipan Spread Spectrum. Hasil penelitian menunjukan bahwa kualitas dari stego image sangat mirip dengan cover citra yang digunakan, berdasarkan perolehan nilai performansi objektif PSNR diatas 30 db dan subjektif MOS di atas nilai 4.Kata kunci: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR ABSTRACTIn this study, a combination of methods was used to strengthen and enhance the security side of the process of exchanging information or digital messages. The methods used include cryptographic methods and steganography methods. The implementation of the system built is done by encoding the message on the application of the image steganography method in hiding the encrypted message generated into a color image (RGB) in the Discrete Cosine Transform domain with the Spread Spectrum insertion technique. The results of the study show that the quality of the stego image is very similar to the cover image used, based on the acquisition of an objective performance value of PSNR above 30 db and subjective MOS above a value of 4.Keywords: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR


Author(s):  
Oladunni Abosede Daramola

Voice over Internet Protocol (VoIP) is a significant application of the converged network principle where the voice traffic is routed over Internet Protocol shared traffic networks. VoIP traffic was modelled over wireless network and a simulation of the traffic was transmitted over the network. E-model technique was used to analyze the traffic data and also to rate VoIP QoS parameters.  The result achieved was mapped to the Mean Opinion Scale to determine the Quality of Service of VoIP over wireless networks. The results shows that QoS in the VoIP communications is significantly impacted by these parameters and the impact varies according to the parameters and also the communication aspects selected for the VoIP traffic analysis.Keywords: VoIP, QoS, E-Model and Mean Opinion Scale  


Geophysics ◽  
1964 ◽  
Vol 29 (6) ◽  
pp. 922-925 ◽  
Author(s):  
Arne Junger

The appearance of a seismic record is a function of the signal‐to‐noise ratio. This ratio is expressed quantitatively, but it can not be measured on the record. The quality of the record is expressed by the lineup of events and constancy of character across the record, but is generally not expressed numerically. The appearance of the record is here expressed numerically by the mean phase shift from perfect lineup of various events. A statistical relationship is established between this mean phase shift and the signal‐to‐noise ratio. A seismic record may be approximated by considering the signal to have a sinusoidal waveform and the noise to be a continuous sine wave with the same frequency as the signal and with random phase shift with respect to the signal on various traces. The resulting record will show a random phase shift, the mean value of which is a function of the signal‐to‐noise ratio. A plot of these two values shows that with increasing signal‐to‐noise ratio there is very little change in the mean phase shift, and thus of the quality of the record, until a value of one‐half for the signal‐to‐noise ratio is reached, showing that the noise dominates the record up to this point. For values of the signal‐to‐noise ratio between one‐half and two, there is a large change in the mean phase shift, indicating a strong visual improvement for this range. For a signal‐to‐noise ratio larger than two, the signal predominates visually, and only a slight improvement in quality can be obtained with additional improvements in the signal‐to‐noise ratio. These conclusions are in agreement with experimental data published elsewhere.


2018 ◽  
Vol 8 (11) ◽  
pp. 2199 ◽  
Author(s):  
Abdul Zakaria ◽  
Mehdi Hussain ◽  
Ainuddin Wahab ◽  
Mohd Idris ◽  
Norli Abdullah ◽  
...  

Steganography is the art and practice of communication using hidden messages. The least significant bits (LSB) based method is the well-known type of steganography in the spatial domain. Usually, achieving the larger embedding capacity in LSB-based methods requires a large number of LSB bits modification which indirectly reduces the visual quality of stego-image and increases the risk of steganalysis detection attacks. In this study, we propose a novel steganography method with data mapping strategy which can reduce the number of bits modification per pixel. In the proposed method, four secret data bits are mapped with the four most significant bits of a cover pixel. Furthermore, the only two LSBs of a pixel are modified to indicate the mapping strategy. Experimental results show that the proposed method is able to achieve 3.48% larger embedding capacity while enhancing the visual quality (i.e., peak signal to noise ratio (PSNR) 3.73 dB) and reducing the modification of 0.76 bits per pixel. Moreover, the proposed method provides security against basic Regular and Singular groups (RS) steganalysis and histogram steganalysis detection attacks.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Alexander DeTrano ◽  
Naghmeh Karimi ◽  
Ramesh Karri ◽  
Xiaofei Guo ◽  
Claude Carlet ◽  
...  

Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.


Author(s):  
Ahmed Nagm ◽  
Mohammed Safy

<p>Integrated healthcare systems require the transmission of medical images between medical centres. The presence of watermarks in such images has become important for patient privacy protection. However, some important issues should be considered while watermarking an image. Among these issues, the watermark should be robust against attacks and does not affect the quality of the image. In this paper, a watermarking approach employing a robust dynamic secret code is proposed. This approach is to process every pixel of the digital image and not only the pixels of the regions of non-interest at the same time it preserves the image details. The performance of the proposed approach is evaluated using several performance measures such as the Mean Square Error (MSE), the Mean Absolute Error (MAE), the Peak Signal to Noise Ratio (PSNR), the Universal Image Quality Index (UIQI) and the Structural Similarity Index (SSIM). The proposed approach has been tested and shown robustness in detecting the intentional attacks that change image, specifically the most important diagnostic information.</p>


Author(s):  
Indu Devi ◽  
Kuldeep Dudi ◽  
Ranjana Sinha ◽  
R. Vikram

Background: Bio-acoustic features of animal’s voice can provide meaningful information about their biological and physical characteristics. The present study was conducted to get indicators of age from voice analysis and explore the relationship between voice features and seminal parameters in Sahiwal bulls. Methods: Voice samples were collected from healthy bulls (n=20), maintained at ICAR-NDRI, Karnal. Bulls were classified into two groups i.e. young bulls and adult bulls. The voice signals were analyzed by Adobe Premium software and acoustic features were extracted by using PRAAT software. Result: The mean of acoustic features viz. call duration (sec), mean intensity (dB), total energy (P2S), amplitude (P), pitch (Hz), unvoiced frame (%), jitter (%), bandwidth (Hz) mean N/H ratio (%) have been found significantly different while mean H/N ratio (dB), shimmer (%) and pulses were not found statistically (P greater than 0.05) different between adult and young bulls. The seminal parameters viz mass activity (0-5 scale), individual progressive motility (%), live sperm count (%) and total sperm abnormality (%) were found significantly different between adult and young bulls. No significant association between voice features and semen quality of bulls was observed. Hence, voice signals of male might provide some clues about their age but for semen quality, there is further need to explore the interesting relationship between voice features and fertility of breeding bulls.


2017 ◽  
Vol 28 (5) ◽  
pp. 749-758 ◽  
Author(s):  
Vijay Kumar ◽  
Dinesh Kumar

Abstract Steganography is the foremost influential approach to hide data. Images serve as the most appropriate cover media for steganography. This paper intends to do a performance evaluation of color images and its comparison with the recently proposed approaches, using the modified technique already proposed for grayscale images, by the authors. This approach hides large data in color image using the blocking concept. The blocking process is applied on approximation coefficients of secret image and detail coefficients of red, green and blue components of cover image. The blocks of detail coefficients are replaced with approximation coefficients of secret image using root mean square error method. The key is used to store the position of best matching blocks. It is being predicated that the work will be able to hide large data in a single image. The stego image (ST) has better visual quality based on the peak signal to noise ratio values.


Sign in / Sign up

Export Citation Format

Share Document