Secure Data Transmission Using Audio Steganography

K. Sakthisudhan*, **
* Assistant Professor, Bannari Amman Institute of Technology, Anna University, India.
** Senior Lecturer, Bajrang Engineering College, Anna University, India.
*** P.G Scholar, Bannari Amman Institute of Technology, Anna University, India.
**** Professor & Head of CSE, Bannari Amman Institute of Technology, Anna University, India.
Periodicity:March - May'2012
DOI : https://doi.org/10.26634/jele.2.3.1763

Abstract

In present day to day life, effective data hiding methods are needed due to attack made on data communication. This paper presents the technique for the above requirement. In this proposed method, secret message in the form of audio file is embedded within another carrier audio file (. wav) .In the transmitter end the output will be similar to the carrier with a secret message embedded inside. The hacker will be blinded by the transmitted signal. At the receiver end the original message can be retrieved without any loss. The entire proposed system is simulated and their corresponding waveforms prove the effectiveness of this method.

Keywords

Dual steganography, LSB embedding, steganalysis, low complexity.

How to Cite this Article?

K. Sakthisudhan, S. Gayathri Priya, P. Prabhu and P. Thangaraj (2012). Secure Data Transmission Using Audio Steganography. i-manager’s Journal on Electronics Engineering, 2(3), 1-6. https://doi.org/10.26634/jele.2.3.1763

References

[1]. Gopalan, K., (2003). "Audio steganography using bit modification", IEEE International Conference on Acoustics, Speech and Signal Processing, Page(s): II - 421- 4 Vol.2.
[2]. Muhammad Asad, Junaid Gilani, Adnan Khalid (2011). “An Enhanced Least Significant Bit Modification Technique for Audio Steganography”, International Conference on Computer Networks and Information Technology (ICCNIT), pages 143-147.
[3]. Zamani, M., Manaf, A, Ahmad, R.B., Jaryani, F., Taherdoost, H., Zeki, AM., (2009). "A secure audio steganography approach", International Conference for Internet Technology and Secured Tmnsactions, Page(s): 1 -6.
[4]. Kaliappan Gopalan, (2009). "A Unified Audio and Image Steganography by Spectrum Modification", International Conference on Industrial Technology, Page(s): 1 – 5
[5]. Raja K B, Chowdary C R, Venugopal K R, Patnaik L M (2005). “A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images”IEEE International Conference on Session B-image Signal Processing.
[6]. Hossein Malekmohamadi and Shahrokh Ghaemmaghami (2009). ”Reduced Complexity Enhancement of Steganalysis Of LSB-Matching Image Steganography” IEEE/ACS, International Conference on Computer System and Applications.
[7]. Balagi R, Naveen G (2011). “Secure Data Transmission Using Video Steganography ”, IEEE International Conference on Electro/Information Technology (EIT).
[8]. Andrew D. Ker, (2007). “Steganalysis of Embedding in Two Least-Significant Bits” IEEE Transactions on Information Forensics and Security, Vol. 2, No. 1, march.
[9]. M.D. Swanson, M. Kobayashi, and A.H. Tewfik, (1998). “multimedia data embedding and watermarking technologies” Proc, IEEE Vol.86,pp. 1064-1087, June.
[10]. L.M. Marvel, C.G. Boncelet, Jr. and C.T. Retter, (1999). “spread spectrum image steganography” IEEE Trans Image Proc, Vol.8,pp. 1075-1083.
[11]. K. Gopalan, S. Wenndt and D. Haddad, (2007). “ Steganographic method for covert audio communications,” U.S. Patent 7 231 271, June 12.
[12]. Avcibas I., Memon N. and Sankur B. (2003). “Steganalysis using image quality metrics”. IEEE Transactions on Image Processing, Vol. 12, pp. 21- 229, Feb.
[13]. Voloshynovskiy, S. V., et al., (2002). “StegoWall: Blind Statistical Detection of Hidden Data,”, Proceedings of Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, CA, January , pp. 57–68.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.