LSB-based Audio Steganographical Framework for Securing Data in Transit

Author(s):  
Nuku Atta Kordzo Abiew ◽  
Maxwell Dorgbefu Jnr. ◽  
William Brown-Acquaye

The benefits that individuals and organizations derive from the digital era comes with its own challenges. Globally, data has become one of the greatest assets for decision making and operational improvements among businesses, government agencies and even individuals. Data on its own and at its source does not make so much contribution to business processes. Data is transmitted from one location to another towards attainment of its goal as a critical resource in decision making. However, data including sensitive or confidential ones are transmitted via public channels such as the Internet. The data so transmitted via the Internet is vulnerable to interception and unauthorized manipulation. This demands that data in transit is protected from the prying eyes of the malicious internet users. One of such strategies for transmitting data via public channels such as the Internet without attracting attention from intruders is steganography. In this paper, the least significant bit algorithm was used with an audio file for hiding data in transit. The algorithm used in this research proves to be one of the simplest ways of securing data using audio steganography. The method employed the LSB technique by using audio files as the stego object for the final implementation in the Java programming language. The experimental results proved to be one of the best methods of implementing steganography. The accuracy of the stego objects shows high quality, and similarity scores with an improved processing time.  

2019 ◽  
Vol 3 (2) ◽  
pp. 125
Author(s):  
Andri Veno ◽  
Tulus Prijanto ◽  
Nurkholis Nurkholis

E-Commerce is an affiliation of E-bisnis in electronic media era, which is fifth industry revolution era (digital era). It is shown by many companies using internet as the most effective means to advertise and promote products produced competing either nationally or globally. Indonesia is one of potential market in Asia even in the world with the fifth largest population in the world in 2017, which the population are more than 263 million people; while the internet users up to 30 June 2017 in Indonesia are more than 132 million people. Of 200 respondents, which the mean of age was 18-24 years old. The respondents consisted of 110 male and 90 female, thus the average gender in Solo was male. The result of analysis showed that Trust was positively and significantly influence Purchase intention, Website Quality was positively significantly influence the Purchase intention, and Percived Risk was positively and significantly influence the Purchase intention, so that each improvement of Percived Risk score would improve Purchase intention.


Author(s):  
Fargana J. Abdullayeva ◽  
◽  
Sabira S. Ojagverdiyeva

Modern children are active Internet users. However, in the context of information abundance, they have little knowledge of which information is useful and which is harmful. To make the Internet a safe place for children, various methods are used at the international and national levels, as well as by experts, and the ways to protect children from harmful information are sought. The article proposes an approach using a multi-criteria decision-making process to prevent children from encountering harmful content on the Internet and to make the Internet more secure environment for children. The article highlights the age characteristics of children as criteria. Harmless information, Training information, Entertainment information, News, and Harmful information are considered as alternatives. Here, a decision is made by comparing the alternatives according to the given criteria. According to the trials, harmful information is rated in the last position. There is no child protection issue on the Internet using the AHP method. This research is important to protect children from harmful information in the virtual space. In the protection of minors Internet users is a reliable approach for educational institutions, parents and other subjects related to child safety.


2019 ◽  
Vol 5 (2) ◽  
pp. 36-72
Author(s):  
Vasiliki Koniakou

The article focuses on the relationship between the Internet Governance and democracy on the governance of the logical layer of the Internet.Due to the impactful role and the normative effects of standards, protocols and technical decisions for the Internet and Internet users, and the centrality of the Internet in almost every aspect of thesocial, financial and political life, it argues thatwe ought to examine the ideologies, narratives and assumptions that have informed and shaped key governance arrangements.It explores the influence of technological determinism as a technocratic governing mentality, applying the argument of Taylor Dotson in the context of Internet Governance, and more specifically on the governance of the logical layer, focusing on standard-setting and technical decision-making by the Internet Engineering Task Force (IETF).It argues that technological determinism has been pervasive in Internet Governance discoursesince the early days of the Internet, while standard-setting and technical decision-making are technocratically organized and non-democratic procedures, considering also how the technical community takes decisions, as well as how itself frames its tasks and perceives standard-setting and technical decision-making.It concludes arguing that we need to review the way governance on the logical layer is organized, dispelling technological determinism, while introducing social considerations and democratic principles.


Author(s):  
Praveen Gujjar J ◽  
Prasanna Kumar H R

Evolution in the field of web technology has made an enormous amount of data available in the web for the internet users. These internet users give their useful feedback, comments, suggestion or opinion for the available product or service in the web. User generated data are very essential to analyze for business decision making. TextBlob is one of the simple API offered by python library to perform certain natural language processing task. This paper proposed a method for analyzing the opinion of the customer using TextBlob to understand the customer opinion for decision making. This paper, provide a result for aforesaid data using TextBlob API using python. The paper includes advantages of the proposed technique and concludes with the challenges for the marketers when using this technique in their decision-making.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3706-3710

In this advanced world with the growing technology, the demand for security of information is needed in any communication streams of data which is being conveyance from host to intended host over the internet. Obviously, a huge & numerous amount of the data or the information are transferred in our everyday. So, the demand for securing information has become the main concern. Image Steganography is one of the important areas in the field of Steganography. The main purpose of steganography is to protect the surreptitious information from others except from intended receiver & by increasing the security of the covert data in the significant way that information can’t be revealed although the intruder knows the methodology of the embedding process. In this paper, The aim is to propose a different yet, an innovative steganographical technique which provides the security on our digital image, and by using a quality measuring technique like Mean Square Error(MSE), Peak Signal Noise Ratio (PSNR) which assure the quality of image has been not degraded even after infusing the covert data inside the image. So to overcome these issues, this paper, suggests a new method to maintain the quality of the image. After embedding the authenticated information in the cover image using Region-Based Least Significant Bit (LSB) technique that provides security of digital image


2021 ◽  
Vol 1 (2) ◽  
Author(s):  
Elfi Ratna ◽  
Ika Ratna

Based on a survey conducted by the APJII (Indonesian Internet Service Providers Association) team in 2018 with a percentage of more than 64.8% using the internet. The highest percentage is at the age of 7-19 years, which is 91%, this shows that the number of internet users is getting higher every year. This study aims to help treat children who are addicted to the Internet and as advice or a reference for making decisions on how to deal with people who are addicted to the Internet. The method used was to collect data on the distribution of questionnaires or questions that were carried out directly on children aged 7-17 years in the blistering village. The results of external application testing with Likert scale calculations get a percentage result of 78.36% (very useful).


2019 ◽  
Vol 10 (2) ◽  
pp. 42-50 ◽  
Author(s):  
Martin Húdik ◽  
Gabriel Koman ◽  
Jorma Jaakko Imppola ◽  
Josef Vodák

Abstract The article discusses the use of Internet of Things (hereinafter as IoT) solutions in the social and business environment to support managerial decision-making in Smart businesses. The paper key objective is to assess the rate of increasing technological advancement of the IoT which already affects us all, so it is not possible to talk about the IoT as a matter of the future. Currently, modern technologies provide specific level of digitization of business processes. Due to the penetration of information and communication technologies (hereinafter as ICT) in all areas of social life and business processes, it is possible to implement decisions on product production based on customer needs and requirements. This trend is mainly due to technological advances in ICT and the Internet. Thanks to the internet and the phenomenon called Internet of Things, it is possible to achieve higher profits and improve the quality of life in society. The manuscript main findings can be summarized through a statement that all the businesses try to implement the concept of IoT in their processes, and thus they become smart businesses. Thanks to IoT, businesses can quickly process data and distribute the results to responsible people for decision-making in the enterprise.


Author(s):  
Helen Margetts

Digital government refers to the use by government of information and communication technology, including the Internet, both internally and to interact with citizens, businesses, and other governments. This chapter briefly outlines the development of digital government. It suggests three key ways in which digital government could be more transparent than government of the ‘pre-digital’ era and three ways in which it might become less transparent. The chapter goes on to identify some ways in which these ‘barriers’ to transparency might be overcome, such as the use of electronic tools like search engines and software. Finally, it discusses the strong variations in the potential for digitally aided transparency across countries, within countries, and within groups of Internet users and non-users. Some non-democratic states have resisted the potential of e-government to promote transparency, and have been more interested in trying to restrict usage of the Internet within their boundaries. This chapter investigates some of these variations in digitally aided transparency.


Author(s):  
Wilhelmina Djoleto

It stands with no contention that a society without virtues and values would be a muddled one, and etiquette is a systemic rectitude that helps shape society. The once eccentric Internet now epitomises regularized modern society and has paved way for new diverse business processes and operations that necessitate critical decision making. These proliferating business processes have been termed e-business or e-commerce, both of which have been used interchangeably in the literature. We consider two groups in the United States of America – business organisations and Higher Education Institutions; specifically the different higher education systems in the United States. Traditionally white institutions are of choice, as members of the Internet society in this chapter. A reconnoitring of the etiquettes of the Internet and e-business vis-à-vis decision making is presented and readers are driven through the elements of etiquettes that govern e-business and how these impact businesses as a whole. It would not be over-amplified to state that this component of e-business is important in ways that translate into institutions’ and organisations’ efficacies. The Higher Education Institutions and organisations vary in size and ownership, each institution or organisation deals with the essence of e-etiquette and the data show direct relationships between e-etiquette, decision making and the success of organisations and institutions and e-societal members.


2013 ◽  
Vol 9 (1) ◽  
pp. 976-984 ◽  
Author(s):  
Vijaya Lakshmi Paruchuri ◽  
Dr.R. Sridevi ◽  
K.S. SadaSiva Rao

Steganography is the science of invisible communication. Apart from the sender and intended recipient no one suspects the existence of the message. Using Steganography, information can be hidden in various mediums known as carriers. The carriers can be images, audio files, video files and text files. Image Steganography is a technique of using an image file as a carrier. Cryptography protects the information by applying the encryption and decryption techniques, so that the secret message can be understood only by the right person.This paper proposes a method, which combines the techniques of Steganography and cryptography, to hide the secret data in an image. In the first phase, the sender will embed the secret data in an image by using the Least Significant Bit (LSB) technique. The embedded image will be encrypted by using an encryption algorithm. At final, the encrypted image will be decrypted and the hidden data will be retrieved by supplying the valid secret key by the receiver. The process includes the phases of Data embedding, Image Encryption and recovery of both original image and secret data from the encrypted image.


Sign in / Sign up

Export Citation Format

Share Document