Genetic Algorithm Based Audio Steganography
Citation
Akshay Tharmia, Niketan Kudtarkar, Nishant Mishra, SarthakBhingarde,Prof.Rohini Patil "Genetic Algorithm Based Audio Steganography", International Journal of Engineering Trends and Technology (IJETT), V46(3),174-177 April 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Data encryption is suitable method to protect data, whereas steganography is the process of hiding secret information inside some carrier. In the proposed method encrypting message with ECC key using AES and GA based LSB Algorithm to encode the encrypted message into audio data. It gives a high level of authentication, security and resistance against extraction by attacker.
References
[1] Rohit Tanwar, Sunil Kumar, Narender Gautam, Ravinder Gautam,” A Spatial Domain Steganography Technique Based on Optimal Solution Using Genetic
[2] IEEE :-Robust audio steganography along with genetic algorithm by: Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad , Akram M. Zeki
[3]National Security Agency. “The Case for Elliptic Curve Cryptography,”www.nsa.gov/business/programs/elliptic_curve.shtml. 2009
[4] 2011 7th International Workshop on Systems, Signal Processing and their Application(WOSSPA)By moncef Amara and Amar Siad
[5] mazadak Zamani et.al,”A Secure Audio Steganography approach”
[6] Mazdak Zamani et.al , “A Secure Audio Steganography Approach”, International Conference for Internet Technology and Secured Transactions 2009.
[7] Bankar Priyanka ., Katariya Vrushabh R, Patil Komal K, “Audio Steganography using LSB’’, International Journal of Electronics, Communication and Soft Computing Science and Engineering, March 2012, pp 90-92
[8] Ajay.B.Gadicha, “Audio wave Steganography”, International Journal of Soft Computing and Engineering (IJSCE), Vol. 1, pp. 174-177, Nov. 2011
[9]Nedeljko, C. and S. Tapio, 2002. Increasing robustness of LSB audio steganography by reduced distortion LSB coding. Proceeding of the 5th IEEE International Workshop on Multimedia Signal Processing. St. Thomas, pp: 336-338.
[10] Samir, K.B., B. Debnath, G. Debashis, M. Swarnendu and D. Poulami, 2008. A tutorial review on steganography. Proceeding of the International Conference on Contemporary Computing (IC3-2008). Noida, India, August 7-9, pp: 105-114.
Keywords
Genetic algorithm, ECC, Message encryption.