Security is as strong as the weakest link. Data
transmission in public communication system is not secure
because of interception and improper manipulation by
eavesdropper. This paper presents the technique for the above
requirement. In the proposed method, we use Steganography
technique where secret message is embedded within a carrier
audio file and the existence of message is hidden from the
intruder. To prevent disclosure of contents of the covered file
cryptography RSA algorithm is used with Steganography to
enhance the robustness of the system. In practice RSA public and
private exponents are chosen to be very large this makes
decryption slow. One way to speed things up is by using Chinese
Remainder Theorem which focuses on modulus calculation. This
paper proposes a faster RSA-CRT algorithm for decryption of
data. Differing from other approaches which try to detect
embedded data or perform time consuming computations as part
of their process we focus on a comprehensive Steganographic
prevention which works in real time on any audio data. In order
to testify our system we propose different attacks on the stegno
embedded file which justifies the robustness of our system.
Harshita Kapadia : is in final year of B.E. in Electronics and
telecommunication in Bharati Vidyapeeths college of engineering
,savitribhai phule pune university, pune .Her research interests are
in the area of the Communication and signal processing .
Harawane Sneha Haribhau : is in final year of B.E. in Electronics
and telecommunication in Bharati Vidyapeeths college of
engineering ,savitribhai phule pune university, pune .Her research
interests are in the area of the Wireless network.
Harsha Patil : is in final year of B.E. in Electronics and
telecommunication in Bharati Vidyapeeths college of engineering
,savitribhai phule pune university, pune .Her research interests are
in the area of Signal processing.
Audio Steganography
Protecting data from unauthorized access is major concern
in the today’s fast communication world. One of the most
effective techniques has been discussed in this paper
which shows the combination of the most effective
algorithm RSA and LSB results in the most secured and
robust systems. Hiding data in the audio cover file has an
greater advantage. Overcoming the decryption slow speed
by using faster RSA-CRT techniques and testifying the
entire system with the help of two attacks i.e. Brute force
and statistical attack.
[1] Eggers, J. J., and B. Girod, “Blind Watermarking
Applied to Image Authentication,” IEEE
International Conference on Acoustics, Speech and
Signal Processing (ICASSP), Salt Lake City, May
2001.
[2] Johann Großsch¨adl,” The Chinese Remainder Theorem
and its Application in a High-Speed RSA Crypto Chip,”
Graz University of Technology
Institute for Applied Information Processing and
Communications.
[3] N. Provos and P. Honeyman, "Hide and seek: An
introduction to Steganography", Security & Privacy,
IEEE 1, no. 3 (2003): 32-44.
[4] K.Sakthisudhan,P.Prabu and Dr.C.M.Marimuthu,”Dual
Steganograpghy Approach for Secure Data
Communication”, ELSEVIER International Conference
on Modelling, Optimization and Computing,2012.
[5] Gopalan,K.,”Audio Steganography using bit
modification’,2003 IEEE International Conference on
Acoustics ,speech and signal processing, page(s):II-421-4
vol 2.
[6] Muhammad Asad,JunaidGilani,Adam Khalid "An
enhanced Least Significant Bit Modification Technique
for Audio Steganography",2011 international conference
on Computer Networks and Information Technology
(iCCNIT),pages143-147.
[7] Zamani,M,Manaf,A, Ahmad ,R.B.Jaryani ,
F,Taherdoost,H,Zeki,AM, "A secure audio
Steganography approach", International Conference for
Internet Technology and Secured Transactions
2009,pages:1-6
[8] Shouchao Song,Jie Zhang,Xin Liao,Jiao Du,Qiaoyan
Wen,”A Novel Secure Communication Protocol
Combining Steganography and Cryptography”,
ELSEVIER International Conference on Advanced in
Control Engineering and Information Scienece.2011.
[9] G.N. Shinde and H.S. Fadewar,” Faster RSA Algorithm
for Decryption Using Chinese Remainder Theorem” ,
ICCES, vol.5, no.4, pp.255-261.
[10] S. Katzenbeisser and F. A.P. Petitcolas, Information
hiding techniques for steganography and digital
watermarking. Vol. 316. Norwood: Artech house, 2000.
[11] Shamim Ahmed Laskar and Kattamanchi Hemachandran
,” A Review on Image Steganalysis techniques for
attacking Steganography”, International Journal of
Engineering Research & Technology (IJERT). Vol. 3
Issue 1, January – 2014.
[12] M. Nutzinger,” Real-time Attacks on Audio
Steganography”, Journal of Information Hiding and
Multimedia Signal Processing, Volume 3, Number 1,
January2012