A Unique Approach for Data Hiding Using Audio Steganography

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 4

Abstract

 The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate rotation because of the significance, accuracy and sensitivity of the information. Steganography and Cryptography are considered as one of the techniques which are used to protect the important information, but both techniques have their pro’s and con’s. This paper aims to conquer their respective drawbacks and to achieve this we are using a double layer protection technique which is cryptography cum steganography approach.

Authors and Affiliations

Tanmaiy G. Verma

Keywords

Related Articles

 Cloud in the sky of Business Intelligence

 The Modern day business is highly information driven. At one side the volume of data is growing by leaps and bounds and at the other side it is becoming more and more unstructured. Information is not limited to tab...

 Modelling the Effect of Industrial Effluents on Water Quality: “A Case Study of River Challawa in Nigeria”

 The physicochemical characteristics associated with industrial effluents from the Challawa and Sharada Industrial Estate in Kumbotso Local Government Area of Kano State ad the effect on water quality of a 10.6 km s...

 HMM-Based Speech Synthesis

 This paper describes a approach to text-to-speech synthesis (TTS) based on HMM. In the proposing approach,speech spectral parameter sequences are generated from HMMs directly based on maximum likelihood criterion....

Automatic Discovery and Recognition of Activities in Smart Environment

The machine learning and pervasive sensing technologies found in smart homes offers opportunities for providing health monitoring and assistance to individuals experiencing difficulties living independently at hom...

 ris Segmentation: a survey

 The use of biometric systems has been increasingly encouraged by both government and private entities in order to replace or improve traditional security systems. Iris recognition biometric systems have proved to b...

Download PDF file
  • EP ID EP87711
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

Tanmaiy G. Verma (2013). A Unique Approach for Data Hiding Using Audio Steganography. International Journal of Modern Engineering Research (IJMER), 3(4), 2098-2101. https://europub.co.uk/articles/-A-87711