Enhanced Audio LSB Steganography for Secure Communication
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
The ease with which data can be remitted across the globe via Internet has made it an obvious (as medium) choice for on line data transmission and communication. This salient trait, however, is constraint with akin issues of privacy, veracity of the information being exchanged over it, and legitimacy of its sender together with its availability when needed. Although cryptography is being used to confront confidentiality concern yet for many is slightly limited in scope because of discernibility of encrypted information. Further, due to restrictions imposed on the use of cryptography by its citizens for personal doings, various Governments have also coxswained the research arena to explore another discipline of information hiding called steganography – whose sole purpose is to make the information being exchanged inaudible. This research is focused on evolution of model based secure LSB Steganographic scheme for digital audio wave file format to withstand passive attack by Warden Wendy.
Authors and Affiliations
Muhammad Hussain, Khan Rafat
Algorithms for Content Distribution in Networks
In this paper an algorithm is presented which helps us to optimize the performance of content distribution servers in a network. If it is following the pay-as-you-use model then this algorithm will result in significant...
Towards a Classification View of Personalized e-Learning with Social Collaboration Support
With the emergence of Web 2.0 technologies, interaction and collaboration support in the educational field have been augmented. These types of support embrace researchers to enrich the e-learning environment with persona...
Using an Integrated Framework for Conceptual Modeling
The Integrated Framework for Conceptual Modeling (IFCMod) is created to contribute to the quality of the information system through the integration of the functional and non-functional requirements. This paper attempts t...
Validation Policy Statement on the Digital Evidence Storage using First Applicable Algorithm
Digital Evidence Storage is placed to store digital evidence files. Digital evidence is very vulnerable to damage. Therefore, making digital evidence storage need access control. Access control has several models, one o...
Model Driven Development Transformations using Inductive Logic Programming
Model transformation by example is a novel approach in model-driven software engineering. The rationale behind the approach is to derive transformation rules from an initial set of interrelated source and target models;...