Audio Steganography

Authors

  • E. Arun Pravin Department of Information Technology, Dr. Mahalingam College of Engineering and Technology, Pollachi, India
  • S. Navaneethan Department of Information Technology, Dr. Mahalingam College of Engineering and Technology, Pollachi, India
  • K. Karthick Raja Department of Information Technology, Dr. Mahalingam College of Engineering and Technology, Pollachi, India
  • S. Ponni Department of Information Technology, Dr. Mahalingam College of Engineering and Technology, Pollachi, India

Keywords:

Audio steganography, Cryptography, Embedding

Abstract

Information Hiding in Audio records is the product created for concealing data. It is a technique similar to secret channels, and imperceptible connections, which add another progression in security. A message in figure text may stimulate doubt while an imperceptible message is not. Advanced transcription utilizes a host information or message known as a "Compartment" or "Cover" to conceal another information or message in it. The ordinary method of ensuring data was to utilize a standard symmetric or awry key framework in encryption. Steganography can likewise be utilized to put a covered up "brand name" in pictures, music, and programming, a method alluded to as watermarking. Steganography, if anyway utilized alongside cryptography, for instance, if a message is scrambled utilizing PBE (MD5) which requires a 128-bit key then the message has gotten very secure all things considered. Presently, if this code text is inserted in a picture, video, voice, and so forth, it is considerably safer. On the off chance that a scrambled message is blocked, the interceptor realizes the content is an encoded message. With Steganography, the interceptor may realize the item contains a message. When performing information covering up on sound, one should misuse the shortcoming of the Human Auditory System (HAS), while simultaneously monitoring the limit affectability of the human hear-able framework. To guarantee the security of the correspondence between two gatherings, different new techniques are being created. Notwithstanding, cryptography resembles an apparatus, it can do just as it is modified to do.

Downloads

Download data is not yet available.

Downloads

Published

22-05-2021

Issue

Section

Articles

How to Cite

[1]
E. A. Pravin, S. Navaneethan, K. K. Raja, and S. Ponni, “Audio Steganography”, IJRESM, vol. 4, no. 5, pp. 91–95, May 2021, Accessed: Apr. 26, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/735