Full Paper View Go Back

Analysis of Various Techniques for Audio Steganography in Data Security

Manisha Verma1 , Hardeep Singh Saini2

Section:Research Paper, Product Type: Journal
Vol.7 , Issue.2 , pp.1-5, Apr-2019

Online published on Apr 30, 2019


Copyright © Manisha Verma, Hardeep Singh Saini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Manisha Verma, Hardeep Singh Saini, “Analysis of Various Techniques for Audio Steganography in Data Security,” International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.2, pp.1-5, 2019.

MLA Style Citation: Manisha Verma, Hardeep Singh Saini "Analysis of Various Techniques for Audio Steganography in Data Security." International Journal of Scientific Research in Network Security and Communication 7.2 (2019): 1-5.

APA Style Citation: Manisha Verma, Hardeep Singh Saini, (2019). Analysis of Various Techniques for Audio Steganography in Data Security. International Journal of Scientific Research in Network Security and Communication, 7(2), 1-5.

BibTex Style Citation:
@article{Verma_2019,
author = {Manisha Verma, Hardeep Singh Saini},
title = {Analysis of Various Techniques for Audio Steganography in Data Security},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2019},
volume = {7},
Issue = {2},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {1-5},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=359},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=359
TI - Analysis of Various Techniques for Audio Steganography in Data Security
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Manisha Verma, Hardeep Singh Saini
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 1-5
IS - 2
VL - 7
SN - 2347-2693
ER -

808 Views    468 Downloads    298 Downloads
  
  

Abstract :
In today’s digital world one is concerned with the secrecy of data and focused on copyright-dependent individuals and organizations, specifically in the domain of the entertainment industry. The variations in the human voice lead to the difficulties to generate the watermark to the audio signals in order to preserve them from unauthenticated access. The major objective of the steganography process is to enhance the security of the transmitted data. The unauthorized user can not access or misuse the steganographic file. Audio steganography is also applicable to the non-technical fields in order to keep the privacy and security of the data. This paper presents a review of recent research on audio steganography. The major focus of the study is to address various types of audio steganographic techniques along with their pros and cons. There is a need to find technique so that the data hiding is done more securely and it is not possible for the third parties to detect the data in bits.

Key-Words / Index Term :
Audio Steganography, Bit, LSB, Security, Watermarking

References :
[1] N. Gupta, N. Sharma, “Hiding Image in Audio Using DWT and LSB”, International Journal of Computer Applications, Vol.81, No.2, pp. 11-14, 2013.
[2] R. Kaur, J. Bhatia, H.S. Saini, R. Kumar, “Multilevel Technique to Improve PSNR and MSE in Audio Steganography”, International Journal of Computer Applications. Vol.103. pp.1-4, 2014.
10.5120/18067-9008
[3] R. Kaur, A. Thakur, H.S. Saini, R. Kumar, "Enhanced Steganographic Method Preserving Base Quality of Information Using LSB, Parity and Spread Spectrum Technique", 2015 Fifth International Conference on Advanced Computing & Communication Technologies IEEE, pp.148 – 152, ISBN:978-1-4799-8487-9, 2015. DOI: 10.1109/ACCT.2015.139
[4] M. Nosrati, R. Karimi, M. Hariri, “Audio Steganography: A Survey on Recent Approaches”, World Applied Programming, Vol.2, No.3, pp.202-205, 2012.
[5] Sheelu, “Enhancement of Data Hiding Capacity in Audio Steganography”, IOSR Journal of Computer Engineering (IOSR- JCE), Vol.13, No.3, pp.30-35, 2013.
[6] N. Cvejic, T. Seppanen, “ Digital Audio Watermarking Technique and Technologies: Applications and Benchmarks”, Book 2007.
doi: 10.4018/978-1-59904-513-9
[7] F. E. M. Al-Obaid, A.J.M. Ali, “Which Bit is Better in the least Significant Bit”, Journal of information security (Scientific research publishing), Vol.6, No.3, pp.161-165, 2015.
doi: 10.4236/jis.2015.63017
[8] A. Singh, “ Self Study Seminar Report Steganography”, Department of Computer Technology, Delhi Technological University, Delhi
[9] C. R. Nagrecha, P. B. Swadas, “Audio Steganography with Various Compression Algorithms to Improve Robustness and Capacity”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol. 4, Issue 5, 243-247, 2014.
[10] T.H. Hiralal, N. Gopal, V.V. Sasikumar, “Audio Steganographic Approaches: A Review”, International Journal of Engineering and Innovative Technology (IJEIT), Vol. 4, Issue 11, pp.199-203, 2015
[11] P. Dutta, D. Bhattacharyya, T. H. Kim, “Data Hiding in Audio Signal: A Review”, International Journal of Database Theory and Applications, Vol.2, No.2, 2009.
[12] G. Nehru, P. Dhar, “A Detailed Look of Audio Steganography Techniques Using LSB and Genetic Algorithm Approach”, IJCSI International Journal of Computer Science Issues, Vol.9, No.2, pp. 402-406, 2012.
[13] P. Jayaram, H. R. Ranganatha, H.S. Anupama, “Information Hiding Using Audio Steganography –A Survey”, International Journal of Multimedia & Its Application, Vol.3, No.3, pp.86-96, 2011.
[14] S. Kumar, “LSB Modification and phase encoding technique of audio steganography revisited”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.1, No.4, pp.1-4, 2012.
[15] A.Binny, M. Koilakuntla, “Hiding secret information using LSB based audio steganography”, IEEE International Conference on Soft Computing & Machine Intelligence, pp.56-59, 2014.
doi: 10.1109/ISCMI.2014.24
[16] K. Kaur, D. Verma, “Multi-Level steganographic algorithm for audio steganography using LSB, parity coding and phase coding technique”, International Journal of Advanced Research In Computer Science and Software Engineering, Vol.4, No.1, 2014.
[17] P. Chandrakar, M. Choudhary, C. Badgaiyan, "Enhancement in the security of LSB based audio steganography using multiple files", International Journal of Computer Applications, Vol.73, No.7, pp.21-24, 2013.
[18] S. Divya, M. R. M. Reddy, “Hiding text in audio using multiple LSB steganography and provide security using cryptography”, International Journal of Science and Technology Research, Vol.1, No.6, 2012.
[19] A. Nagarajan, K.Alagarsamy, “An Enhanced Approach in Run Length Encoding Scheme (EARLE)”, International Journal of Engineering Trends and Technology, pp.43-48, 2011.
[20] S. Joseph , N. Srikanth , J. E. N. Abhilash, “A Novel Approach of Modified Run Length Encoding Scheme for High Speed Data Communication Application”, International Journal of Science and Research (IJSR), Vol.2, No.12, 2013.
[21] A. Ramachandran, A. K. Rajamohan, “Integrating Run Length Encoding and Column oriented database execution using Binary Search Tree”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 9, 2013.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation