Implementation of ETAS (Embedding Text in Audio Signal) Model to Ensure Secrecy
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
Steganography is the art of hiding information that evolves as a new secret communication technology. For a long period time, information hiding was done using plain text, still images, video and IP datagram. Embedding secret messages using audio signal in digital format is now the area of focus. There exists numerous steganography techniques for hiding information in audio medium. In this work we propose a new model ETAS - Embedding Text in Audio Signal that embeds the text like the existing system but with encryption that gains the full advantages of cryptography. Using steganography it is possible to conceal the full existence of the original text and the results obtained from the proposed model is compared with ther existing techniques and proved to be efficient for textual messages of size beyond 12 KB as the size of the embedded text is approximately same as that of encrypted text size. This mphasis the fact that we are able to ensure secrecy without an additional cost of extra space consumed for the text to be communicated.
Authors and Affiliations
K. GEETHA , P. VANITHA MUTHU
Modified route-maintenance in AODV Routing protocol using static nodes in realistic mobility model
One of the popular wireless network architectures is Mobile Ad Hoc Network (MANET). It can be easily deployed in every environment, without any underlying backbone and infrastructure support. MANET is a wireless network...
Q-Value Based Particle Swarm Optimization for Reinforcement Neuro-Fuzzy System Design
This paper proposes a combination of particle swarm optimization (PSO) and Q-value based safe reinforcement learning scheme for neuro-fuzzy systems (NFS). The proposed Q-value based particle swarm optimization (QPSO) ful...
Automating the computation of optimal solutions to transportation problems
Transportation problems arise each time there is a need to distribute a commodity from several sources to several destinations, where the management is focused on identifying the distribution route that will optimize som...
PDPKDES ( Pre Distributed Powerful Key for Data Encryption Standard)
Data encryption standard in spite of being a great algorithm in terms of a good combination of confusion and diffusion steps, doesn’t largely used because of a weak key concept. The key used in DES is only 64 bits (or 56...
The Role and Issues of Clustering Technique in Designing Maintainable Object Oriented System
Object Oriented Software development technique has become very popular and is being used by most of the software development companies. Although maintenance may be turn out to be easier for Object Oriented System. But it...