A Novel Approach to Secure Communication Using Audio Steganography

2011 ◽  
Vol 403-408 ◽  
pp. 963-969 ◽  
Author(s):  
Mayank Srivastava ◽  
Mohd Qasim Rafiq

The digital information revolution has brought important changes in our society and life. Nowadays, large amount of data is transmitted over the network and if the data that is being transmitted is important, one should use secure technique like steganography to transmit it. Steganography is a method of hiding a secret message in a cover media such as text, image, audio etc. in a way that hides the existence of the secret data. This paper introduces new method for audio steganography. The proposed method works on the basis of low bit blind encoding scheme which is used to embed secret data into non-silent samples of wav audio file. Robustness and performance of the proposed scheme is investigated by performing experiments on different audio signals.

Author(s):  
Rajput G ◽  
◽  
Ramesh Chavan ◽  

The purpose of steganography is to communicate secret messages between the sender and intended recipient in such a way that no one suspects the very existence of the message. The techniques aim to protect the secret information from third parties by embedding them into other information such as text, audio signals, images, and video frames. In this paper we propose a novel approach of hiding secret messages in multiple images (a cover image)using run length encoding and LSB techniques and communicate the message to intended person over the communication channel by transmitting individual images.Experiments are performed on a set of color images and performance of the proposed system is presented.


2019 ◽  
Vol 8 (3) ◽  
pp. 1732-1738

Recently, security has become the prime concern for any organization and other civil and military applications. In this field of security, the data security during communication over an insecure wireless channel is the most important task which can be done by performing cryptography, watermarking and steganography. However, cryptography and watermarking schemes can be identified easily because of change in the data structure hence attackers can focus on that particular part to hack the secret information whereas steganography is a hiding mechanism in which secret message can be concealed into the cover and it can be retrieved at the receiver end. Several techniques have been introduced during last decade which are focused on image-image steganography and audio steganography. In the proposed work, we concentrate on audio steganography and develop a novel approach where secret message can be in the form of plain text or image, whereas cover message is in the form of audio. In order to provide additional security to this model we incorporate AES encryption scheme where secret message is encrypted and hidden in the cover audio. The proposed approach uses DCT coefficient computation and AES encryption scheme. An extensive experimental study is carried based on different test cases and evaluated against state-of-art techniques. The experimental study shows that the proposed approach achieves better performance for audio steganography.


2015 ◽  
Vol 44 (3) ◽  
pp. 315-328 ◽  
Author(s):  
Khalid Darabkh ◽  
Iyad F. Jafar ◽  
Raed T. Al-Zubi ◽  
Mohammed Hawa

With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of current researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. Unlike cryptography that focuses on scrambling the secret message so that it cannot be understood, the main objective of steganography and watermarking is to communicate securely in such a way that the hidden data are not visible to the observer. In other words, it seeks for the imperceptibility of stego-images quality to an unintended party through embedding efficiently the secret message in a digital media such as image, video, or audio. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape that is constructed according to well-analyzed geometric equations. The dimensions of the geometric shape are determined pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR) and payload. The contribution of our approach was immensely impressive.DOI: http://dx.doi.org/10.5755/j01.itc.44.3.8949


Author(s):  
Mark O Sullivan ◽  
Carl T Woods ◽  
James Vaughan ◽  
Keith Davids

As it is appreciated that learning is a non-linear process – implying that coaching methodologies in sport should be accommodative – it is reasonable to suggest that player development pathways should also account for this non-linearity. A constraints-led approach (CLA), predicated on the theory of ecological dynamics, has been suggested as a viable framework for capturing the non-linearity of learning, development and performance in sport. The CLA articulates how skills emerge through the interaction of different constraints (task-environment-performer). However, despite its well-established theoretical roots, there are challenges to implementing it in practice. Accordingly, to help practitioners navigate such challenges, this paper proposes a user-friendly framework that demonstrates the benefits of a CLA. Specifically, to conceptualize the non-linear and individualized nature of learning, and how it can inform player development, we apply Adolph’s notion of learning IN development to explain the fundamental ideas of a CLA. We then exemplify a learning IN development framework, based on a CLA, brought to life in a high-level youth football organization. We contend that this framework can provide a novel approach for presenting the key ideas of a CLA and its powerful pedagogic concepts to practitioners at all levels, informing coach education programs, player development frameworks and learning environment designs in sport.


2021 ◽  
pp. 188-198

The innovations in advanced information technologies has led to rapid delivery and sharing of multimedia data like images and videos. The digital steganography offers ability to secure communication and imperative for internet. The image steganography is essential to preserve confidential information of security applications. The secret image is embedded within pixels. The embedding of secret message is done by applied with S-UNIWARD and WOW steganography. Hidden messages are reveled using steganalysis. The exploration of research interests focused on conventional fields and recent technological fields of steganalysis. This paper devises Convolutional neural network models for steganalysis. Convolutional neural network (CNN) is one of the most frequently used deep learning techniques. The Convolutional neural network is used to extract spatio-temporal information or features and classification. We have compared steganalysis outcome with AlexNet and SRNeT with same dataset. The stegnalytic error rates are compared with different payloads.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nathan Moles

PurposeConventional approaches to digital preservation posit that archives should define a Designated Community, or future user group, for whom they preserve digital information. Archivists can then use their knowledge of these users as a reference to help them deliver digital information that is intelligible and usable. However, this approach is challenging for archives with mandates to serve wide and diverse audiences; these archives risk undermining their efforts by focusing on the interests of a narrow user group.Design/methodology/approachA unique approach to this challenge was developed in the context of a project to build a digital preservation program at the Ontario Jewish Archives (OJA). It draws from previous research on this topic and is based on a combination of practical and theoretical considerations.FindingsThe approach described here replaces the reference of a Designated Community with three core components: a re-articulation of the Open Archival Information System (OAIS) mandatory responsibilities; the identification of three distinct tiers of access for digital records; and the implementation of an access portal that allows digital records to be accessed and rendered online. Together with supplemental shifts in reference points, they provide an alternative to the concept of a Designated Community in the determination of preservation requirements, the identification of significant properties, the creation of Representation Information and in the evaluation of success.Originality/valueThis article contributes a novel approach to the ongoing conversation about the Designated Community in digital preservation, its application and its limitations in an archival context.


2021 ◽  
Vol 48 (4) ◽  
Author(s):  
Zainab N. Sultani ◽  
◽  
Ban N. Dhannoon ◽  

Hiding the presence of data during communication has become a pressing concern in this overly digitalized world as a consequence of illegitimate access. These concerns have led to cryptography and steganography techniques as methods for securing data. This paper presents a modified information hiding technique based on an indirect least significant bit. Instead of saving each bit of the secret message in the least significant bit (LSB) of the cover media, each bit of the secret message is compared to a mask bit in the cover media. The result is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance


2021 ◽  
pp. 1-45
Author(s):  
Benjamin Leard ◽  
Joshua Linn ◽  
Yichen Christy Zhou

Abstract During historical periods in which US fuel economy standards were unchanging, automakers increased performance but not fuel economy, contrasting with recent periods of tightening standards and rising fuel economy. This paper evaluates the welfare consequences of automakers forgoing performance increases to raise fuel economy as standards have tightened since 2012. Using a unique data set and a novel approach to account for fuel economy and performance endogeneity, we find undervaluation of fuel cost savings and high valuation of performance. Welfare costs of forgone performance approximately equal expected fuel savings benefits, suggesting approximately zero net private consumer benefit from tightened standards.


2021 ◽  
Vol 26 (1) ◽  
pp. 1-11
Author(s):  
Marvin Chandra Wijaya ◽  
Zulisman Maksom ◽  
Muhammad Haziq Lim Abdullah

Multimedia authoring is the process of assembling various types of media content such as audio, video, text, images, and animation into a multimedia presentation using tools. Multimedia Authoring Tool is a useful tool that helps authors to create multimedia presentations. Multimedia presentations are very widely used in various fields, such as broadcast digital information delivery, digital visual communication in smart cars, and others. The Multimedia Authoring tool attributes are the factors that determine the quality of a multimedia authoring tool. A multimedia authoring tool needs to have several attributes so that these tools can be used properly. The purpose of this literature review study is to find the advantages of the multimedia authoring tool attribute in each of the existing studies to produce knowledge on how to create a good quality multimedia authoring tool. These attributes are Editing, Services, Performance, and the Formal Verification Model. Editing attribute is an attribute for interfacing with the author. Followed by Service attribute and performance attribute to check and achieve proper multimedia documents. Since 1998, a multimedia modeling tool has been studied, and up to now, there have been many studies that have focused on one or more of these attributes. This article discusses the existing studies to examine the attributes generated from the studies. Multimedia authoring attributes are very important to study because they are the benchmarks of the software requirement specifications of Multimedia Authoring tools. The use of the Petri net model, the Hoare Logic, and the Simple Interactive Multimedia Model as a formal verification model can improve the performance of the Multimedia Authoring Tool. In the questionnaire that was submitted to the users, it was assessed positively by the users with the improvements in the Multimedia Authoring Tool.


Sign in / Sign up

Export Citation Format

Share Document