A View on LSB Based Audio Steganography

In this paper the concept of cryptography and steganography are combined to perform a powerful encryption. Here we propose a novel approach where a duel encryption methodology has been implemented. In the first level of encryption a pattern matching algorithm has been employed to encrypt the text message in terms of their positional value. In second level, the conventional LSB method has been used to embed the positional value in the cover file. Such a duel encryption method will ensure data security in an efficient manner. Finally the performance of the proposed method is evaluated in terms of means square error (MSE) and signal to noise ratio (SNR). A comparison has been carried out with conventional LSB method. The experimental results and the comparisons demonstrated that our algorithm is highly efficient in terms of encryption and the capacity size of the text.

[1]  Regunathan Radhakrishnan,et al.  Data Masking: A New Approach for Steganography? , 2005, J. VLSI Signal Process..

[2]  Asha Vijayan,et al.  Audio steganography using modified LSB and PVD , 2011 .

[3]  Akram M. Zeki,et al.  A secure audio steganography approach , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[4]  Sonal K. Jagtap,et al.  Audio Steganography Used for Secure Data Transmission , 2013 .

[5]  Debnath Bhattacharyya,et al.  A GA based audio steganography with enhanced security , 2013, Telecommun. Syst..

[6]  Soumya Banerjee,et al.  A variable higher bit approach to audio steganography , 2013, 2013 International Conference on Recent Trends in Information Technology (ICRTIT).

[7]  Arun Kumar,et al.  Review paper on text and audio steganography using GA , 2015, International Conference on Computing, Communication & Automation.

[8]  Samir Kumar Bandyopadhyay,et al.  Robust high capacity audio steganography using modulo operator , 2015, Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT).

[9]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[10]  K. T. Talele,et al.  Audio Steganography Using Spectrum Manipulation , 2011 .

[11]  Manish Saxena,et al.  Audio Steganography by Different Methods , 2012 .

[12]  Jithu Vimal,et al.  Audio steganography using dual randomness LSB method , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[13]  Pandurangappa C,et al.  International Journal of Emerging Technology and Advanced Engineering , 2022 .

[14]  Shiladitya Bhattacharjee,et al.  An Audio Steganography Technique to Maximize Data Hiding Capacity along with Least Modification of Host , 2013, DaEng.