A Secure Approach to Audio Steganography

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-44 Number-1
Year of Publication : 2017
Authors : Nisha Kundu, Dr. Amadeep Kaur
DOI :  10.14445/22315381/IJETT-V44P201

Citation 

Nisha Kundu, Dr. Amadeep Kaur "Experimental Study on Properties of Concrete by Using Ceramic Materials", International Journal of Engineering Trends and Technology (IJETT), V44(1),1-7 February 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
As the internet growing day by day secure transmission of information is crucial. Steganography and cryptography both techniques provide data confidentiality and help us to protect data from day by day attacks. Digital communication has become an essential part of infrastructure now a days and also lots of applications are internet based. So the communication made must be secret. Steganography is a process of hiding the information of secret messages or one can say that it is an art of sending the hidden data or message over a public network. In the proposed approach message is first encrypted through using The Vigenere Square Encryption Algorithm and then ASCII conversion of data takes place. After those characters of information or data is embedded into deeper layers through modified LSB method. After that further audio transposition encryption technique is used for audio.

 References

[1] Behrouz A. Forouzan, “Cryptography and Network Security” special Indian Edition 2007, Tata McGraw-Hill Publishing Company Limited, New Delhi.
[2] S. Das, B. Bandyopadhyay and S. Sanyal, “Steganography and Steganalysis: different approaches”, Cornell University Library, 2011.
[3] Nigam Sangwan, “Text Encryption with Huffman Compression”, International Journal of Computer Applications (0975 – 8887) Volume 54– No.6, September 2012
[4] Ayushi, “A Symmetric Key Cryptographic Algorithm”
International Journal of Computer Applications (09758887) Volume 1 – No. 15
[5] Wang H and Wang S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, vol. 47, no. 10, 2004
[6] K.P.Adhiya and S.A. Patil, Hiding Text in Audio Using LSB Based Steganography.: Information and Knowledge Management, 2012.
[7] J. Gilani, and A. Khalid M. Asad, "”An enhanced least significant bit modification technique for audio steganography”, 2011 International Conference on Computer Networks and Information Technology (ICCNIT)," IEEE, 2011.
[8] T Seppanen N Cvejic, "Increasing Robustness of, LSB Audio Steganography Using a Novel Embedding Method," in , Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC04). vol. 2 , Washington, DC, USA, 2004, p. 553.
[9] Kamred Udham Singh, "A Survey on Audio Steganography Approaches," International Journal of Computer Applications (0975 – 8887), p. 9, 2014.
[10] WBender D Gruhl, "Echo hiding," in proceeding of the 1st Information Hiding Workshop, England, 1996, pp. 295-315.
[11] M Shirali-Shahreza S Shirali-Shahreza, "Steganography in Silence Intervals of Speech," in , proceedings of the Fourth IEEE International Conference on Intelligent Information Hiding and Multimedia Signal (IIH-MSP 2008), Harbin , china, 2008.
[12] S Wenndt Gopalan, "Audio Steganography for Covert Data Transmissionby Imperceptible Tone Insertion," in WOC, Banff , Canada, july 8-10,2004.
[13] and Tapio Seppben Nedeljko Cvejic, "Increasing The Capacity of LSB-Based Audio Steganography," IEEE, 2002.
[14] Kriti, and Pradeep Kumar Singh. Saroha, "A variant of LSB steganography for hiding images in audio.," International Journal of Computer Applications, pp. 21-27, 2010.
[15] Haider Ismael Shahadi and Razali Jidin, "High capacity and inaudibility audio steganography scheme," in 7th International Conference n Information Assurance and Security (IAS), IEEE, 2011.
[16] V.Vijaya Bhasker, V. Shiva Md. Shafakhatullah Khan, "An Optimized Method for Concealing Data using Audio Steganography," International Journal of Computer Applications, pp. 0975-8887, 2011.
[17] Junaid Gilani, Adnan Khalid Muhammad Asad, "Three Layered Model," in International Conference on Emerging, 2012.
[18] D. M. Ballesteros L and J. M. Moreno, "Highly transparent steganography model of speech signals using Efficient Wavelet Masking," 2012.
[19] Katariya Vrushabh R, Patil Komal K Bankar Priyanka R., "Audio Steganography using LSB," nternational Journal of Electronics, pp. 90-92, 2012.
[20] R. A., Al-Anani, A. M., Al-Khalid, R. I., & Massadeh Al-Dallah, "An Efficient technique for data hiding in audio signals.," American Academic & Scholarly Research Journal, pp. 10-16, 2012.
[21] Gajanan Galshetwar, Amutha Jeyakumar Ashwini Mane, "Data Hiding Technique: Audio Steganography using LSB Technique," International Journal of Engineering Research and Applications, pp. 1123-1125, 2012.
[22] M. Ram Mohan Reddy S.S. Divya, "Hiding Text In Audio Using Multiple LSB Steganography And Provide Security Using Cryptography," International Journal of Scientific & Technology, pp. 68-70, 2012.
[23] Gunjan Nehru and Puja Dhar, "A Detailed Look Of Audio Steganography Techniques Using LSB And Genetic Algorithm," International Journal of Computer Science (IJCSI), Vol. 9, pp. 402-406, 2012.
[24] Saikat Banerjee Lovey Rana, "Dual Layer Randomization in Audio Steganography Using Random Byte Position Encoding," International Journal of Engineering and Innovative Technology, p. 8, 2013.
[25] J. John S, B.D, C. Muruganantham and H. S. DivakaraMurthy L. Babu, "Steganographic Method for Data Hiding in Audio Signals with LSB & DCT," International Journal of Computer Science and Mobile Computing, p. vol.2, August 2013.
[26] Prof.V. Trivedi M. P. Jain, "Effective Audio Steganography by using Coefficient Comparison in DCT Domain," International Journal of Engineering Research & Technology (IJERT), 2013.
[27] Mohammed M. Nasef and Fatma T. Eid Ali M. Meligy, "An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys," I. J. Computer Netwok and Information Security, pp. 24-29, 2015.
[28] Anirban Bhowmick, B. Kishore Nishith Sinha, "Encrypted Information Hiding using Audio Steganography and Audio Cryptography," International Journal of Computer Applications, pp. 0975-8123, 2015.

Keywords
Audio Steganography, Encryption, Audio Encryption, Modified LSB, Vigenere Square Encryption Algorithm, LSB Coding , PSNR-Peak signal to noise ratio, MSE-mean square error.