Research Article

Encrypted Information Hiding using Audio Steganography and Audio Cryptography

by  Nishith Sinha, Anirban Bhowmick, B.Kishore
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Issue 5
Published: February 2015
Authors: Nishith Sinha, Anirban Bhowmick, B.Kishore
10.5120/19666-1387
PDF

Nishith Sinha, Anirban Bhowmick, B.Kishore . Encrypted Information Hiding using Audio Steganography and Audio Cryptography. International Journal of Computer Applications. 112, 5 (February 2015), 49-53. DOI=10.5120/19666-1387

                        @article{ 10.5120/19666-1387,
                        author  = { Nishith Sinha,Anirban Bhowmick,B.Kishore },
                        title   = { Encrypted Information Hiding using Audio Steganography and Audio Cryptography },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 112 },
                        number  = { 5 },
                        pages   = { 49-53 },
                        doi     = { 10.5120/19666-1387 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Nishith Sinha
                        %A Anirban Bhowmick
                        %A B.Kishore
                        %T Encrypted Information Hiding using Audio Steganography and Audio Cryptography%T 
                        %J International Journal of Computer Applications
                        %V 112
                        %N 5
                        %P 49-53
                        %R 10.5120/19666-1387
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

With the growing importance of the internet, secure transmission of information is crucial. Steganography and cryptography helps in providing this much needed data confidentiality. Steganography hides secret information into a cover medium and cryptography converts data into an unrecognizable form. In this paper, the authors proposed a novel approach for concealing data. The proposed algorithm is an amalgamation of text encryption, audio steganography and audio encryption. In the first step, the original text message is encrypted using modified Vigenère cipher algorithm. This cipher text gets embedded into the cover audio using LSB encoding, in the second step. Further, the audio file is then subjected to transposition making use of Blum Blum Shub pseudo random number generator. This scrambled stegno audio is transmitted to the receiver which carries the encrypted secret data.

References
  • Behrouz A. Forouzan, "Cryptography and Network Security" special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi.
  • S. Das, B. Bandyopadhyay and S. Sanyal, "Steganography and Steganalysis: different approaches", Cornell University Library, 2011.
  • Nigam Sangwan, "Text Encryption with Huffman Compression", International Journal of Computer Applications (0975 – 8887) Volume 54– No. 6, September 2012
  • Ayushi, "A Symmetric Key Cryptographic Algorithm" International Journal of Computer Applications (09758887) Volume 1 – No. 15
  • Wang H and Wang S, "Cyber warfare: Steganography vs. Steganalysis", Communications of the ACM, vol. 47, no. 10, 2004
  • Forman, Nishith Sinha, Kishore Bhamidipati, "Improving Security of Vigenère Cipher by Double Columnar Transposition", International Journal of Computer Applications (0975 – 8887) Volume 100 – No. 14, August 2014.
  • "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications", National Institute of Standards and Technology, Special Publication 800-22 Revision 1a.
  • Divyanjali, Ankur, Vikas Pareek, "An Overview of Cryptographically Secure Pseudorandom Number generators and BBS", International Journal of Computer Applications (0975 – 8887).
  • M U Bokhari, Shadab Alam, Faheem Syeed Masoodi, "Cryptanalysis techniques for Stream Cipher: A Survey", International Journal of Computer Applications (0975 – 8887) Volume 104 – No 15, October 2014
  • Andrew S Tanenbaum, "Computer Networks", 4th Edition
  • Yambem Jina Chanu, Kh. Manglem Singh, Themrichon Tuithung, "Image Steganography and Steganalysis: A Survey", International Journal of Computer Applications (0975 – 8887) Volume 52– No. 2, August 2012
  • Komal Patel, Sumit Utareja, Hitesh Gupta, "Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm", International Journal of Computer Applications (0975 – 8887) Volume 63– No. 13, February 2013
  • V. Lokeswara Reddy, A Subramanyam , P Chenna Reddy, "A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography", International Journal of Computer Applications (0975 – 8887) Volume 69– No. 15, May 2013
  • Unik Lokhande, A. K. Gulve, "Steganography using Cryptography and Pseudo Random Numbers", International Journal of Computer Applications (0975 – 8887) Volume 96– No. 19, June 2014
  • Md. Shafakhatullah Khan, V. Vijaya Bhasker, V. Shiva Nagaraju, "An Optimized Method for Concealing Data using Audio Steganography", International Journal of Computer Applications (0975 – 8887) Volume 33– No. 4, November 2011
  • H. B. Kekre, Archana Athawale, Swarnalata Rao, Uttara Athawale, "Information Hiding in Audio Signals", International Journal of Computer Applications (0975 – 8887) Volume 7– No. 9, October 2010
  • D R Stinson, "Cryptography Theory and Practice", 3rd Edition
  • William Stallings," Cryptography and Network Security", 5th Edition
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cryptography Audio Steganography Audio Encryption Modified Vigenère Cipher Blum Blum Shub Pseudo Random Number LSB Coding.

Powered by PhDFocusTM