Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Audio Steganography and Security Using Cryptography  
  Authors : Harshita Kapadia; Harawane Sneha Haribau; Harsha Patil
  Cite as:

 

Security is as strong as the weakest link. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. This paper presents the technique for the above requirement. In the proposed method, we use Steganography technique where secret message is embedded within a carrier audio file and the existence of message is hidden from the intruder. To prevent disclosure of contents of the covered file cryptography RSA algorithm is used with Steganography to enhance the robustness of the system. In practice RSA public and private exponents are chosen to be very large this makes decryption slow. One way to speed things up is by using Chinese Remainder Theorem which focuses on modulus calculation. This paper proposes a faster RSA-CRT algorithm for decryption of data. Differing from other approaches which try to detect embedded data or perform time consuming computations as part of their process we focus on a comprehensive Steganographic prevention which works in real time on any audio data. In order to testify our system we propose different attacks on the stegno embedded file which justifies the robustness of our system.

 

Published In : IJCSN Journal Volume 4, Issue 2

Date of Publication : April 2015

Pages : 285 - 288

Figures : 02

Tables : --

Publication Link : Audio Steganography and Security Using Cryptography

 

 

 

Harshita Kapadia : is in final year of B.E. in Electronics and telecommunication in Bharati Vidyapeeths college of engineering ,savitribhai phule pune university, pune .Her research interests are in the area of the Communication and signal processing .

Harawane Sneha Haribhau : is in final year of B.E. in Electronics and telecommunication in Bharati Vidyapeeths college of engineering ,savitribhai phule pune university, pune .Her research interests are in the area of the Wireless network.

Harsha Patil : is in final year of B.E. in Electronics and telecommunication in Bharati Vidyapeeths college of engineering ,savitribhai phule pune university, pune .Her research interests are in the area of Signal processing.

 

 

 

 

 

 

 

Audio Steganography

Protecting data from unauthorized access is major concern in the today’s fast communication world. One of the most effective techniques has been discussed in this paper which shows the combination of the most effective algorithm RSA and LSB results in the most secured and robust systems. Hiding data in the audio cover file has an greater advantage. Overcoming the decryption slow speed by using faster RSA-CRT techniques and testifying the entire system with the help of two attacks i.e. Brute force and statistical attack.

 

 

 

 

 

 

 

 

 

[1] Eggers, J. J., and B. Girod, “Blind Watermarking Applied to Image Authentication,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Salt Lake City, May 2001. [2] Johann Großsch¨adl,” The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip,” Graz University of Technology Institute for Applied Information Processing and Communications. [3] N. Provos and P. Honeyman, "Hide and seek: An introduction to Steganography", Security & Privacy, IEEE 1, no. 3 (2003): 32-44. [4] K.Sakthisudhan,P.Prabu and Dr.C.M.Marimuthu,”Dual Steganograpghy Approach for Secure Data Communication”, ELSEVIER International Conference on Modelling, Optimization and Computing,2012. [5] Gopalan,K.,”Audio Steganography using bit modification’,2003 IEEE International Conference on Acoustics ,speech and signal processing, page(s):II-421-4 vol 2. [6] Muhammad Asad,JunaidGilani,Adam Khalid "An enhanced Least Significant Bit Modification Technique for Audio Steganography",2011 international conference on Computer Networks and Information Technology (iCCNIT),pages143-147. [7] Zamani,M,Manaf,A, Ahmad ,R.B.Jaryani , F,Taherdoost,H,Zeki,AM, "A secure audio Steganography approach", International Conference for Internet Technology and Secured Transactions 2009,pages:1-6 [8] Shouchao Song,Jie Zhang,Xin Liao,Jiao Du,Qiaoyan Wen,”A Novel Secure Communication Protocol Combining Steganography and Cryptography”, ELSEVIER International Conference on Advanced in Control Engineering and Information Scienece.2011. [9] G.N. Shinde and H.S. Fadewar,” Faster RSA Algorithm for Decryption Using Chinese Remainder Theorem” , ICCES, vol.5, no.4, pp.255-261. [10] S. Katzenbeisser and F. A.P. Petitcolas, Information hiding techniques for steganography and digital watermarking. Vol. 316. Norwood: Artech house, 2000. [11] Shamim Ahmed Laskar and Kattamanchi Hemachandran ,” A Review on Image Steganalysis techniques for attacking Steganography”, International Journal of Engineering Research & Technology (IJERT). Vol. 3 Issue 1, January – 2014. [12] M. Nutzinger,” Real-time Attacks on Audio Steganography”, Journal of Information Hiding and Multimedia Signal Processing, Volume 3, Number 1, January2012