Enhanced Audio LSB Steganography for Secure Communication

The ease with which data can be remitted across the globe via Internet has made it an obvious (as medium) choice for on line data transmission and communication. This salient trait, however, is constraint with akin issues of privacy, veracity of the information being exchanged over it, and legitimacy of its sender together with its availability when needed. Although cryptography is being used to confront confidentiality concern yet for many is slightly limited in scope because of discernibility of encrypted information. Further, due to restrictions imposed on the use of cryptography by its citizens for personal doings, various Governments have also coxswained the research arena to explore another discipline of information hiding called steganography – whose sole purpose is to make the information being exchanged inaudible. This research is focused on evolution of model based secure LSB Steganographic scheme for digital audio wave file format to withstand passive attack by Warden Wendy.

[1]  Gautam Sanyal,et al.  A Novel Audio Steganography Technique by M16MA , 2011 .

[2]  Muhammad Sher,et al.  On The Limits Of Perfect Security For Steganographic System , 2013, ArXiv.

[3]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[4]  Vrishali A. Chakkarwar,et al.  Review of an Improved Audio Steganographic Technique over LSB through Random Based Approach , 2013 .

[5]  Steganography Steganography,et al.  An Analysis of Steganographic Techniques , 1998 .

[6]  Behrouz A. Forouzan,et al.  Data Communications and Networking 2nd Edition , 2000 .

[7]  Donald E. Eastlake,et al.  US Secure Hash Algorithms (SHA and HMAC-SHA) , 2006, RFC.

[8]  Fatiha Djebbar,et al.  Comparative study of digital audio steganography techniques , 2012, EURASIP J. Audio Speech Music. Process..

[9]  V. Sundaram,et al.  Implementation of ISS - IHAS (Information Security System - Information Hiding in Audio Signal) mode , 2011 .

[10]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .

[11]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[12]  Youssef Bassil,et al.  Journal of Emerging Trends in Computing and Information Sciences a Two Intermediates Audio Steganography Technique , 2022 .

[13]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[14]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[15]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[16]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[17]  Muhammad Sher,et al.  Innocuous Communication via HTML Hiding Data in Plain Sight , 2013, Arabian Journal for Science and Engineering.

[18]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[19]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.