Implementation of ISS - IHAS (Information Security System-Information Hiding in Audio Signal) model with reference to proposed e-cipher Method
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 6
Abstract
This paper shows the possibility of exploiting the features of E- cipher method by using both cryptography and Information hiding in Audio signal methods used to send and receive the message in more secured way. Proposed methodology shows that successfully using these Poly substitutions methods (Proposed E-Cipher) for Encode and decodes messages to evolve a new method for Encrypting and decrypting the messages. Embedding secret messages using audio signal in digital format is now the area in focus. There exist numerous steganography techniques for hiding information in audio medium. In our proposed theme, a new model ISS-IHAS - Embedding Text in Audio Signal that embeds the text like the existing system but with strong encryption that gains the full advantages of cryptography. Using steganography it is possible to conceal the full existence of the original text and the results obtained from the proposed model is compared with other existing techniques and proved to be efficient for textual messages of minimum size as the size of the embedded text is essentially same as that of encrypted text size. This emphasis the fact that we are able to ensure secrecy without an additional cost of extra space consumed for the text to be communicated.
Authors and Affiliations
Prof. R. Venkateswaran , Dr. V. Sundaram , Director
Cyclic Redundancy Checking (CRC) Accelerator for Embedded Processor Datapaths
We present the integration of a multimode Cyclic Redundancy Checking (CRC) accelerator unit with an embedded processor datapath to enhance the processor performance in terms of execution time and energy efficiency. We in...
A Comprehensive Collaborating Filtering Approach using Extended Matrix Factorization and Autoencoder in Recommender System
Recommender system is an approach where users get suggestions based on their previous preferences. Nowadays, people are overwhelmed by the huge amount of information that is being present in any system. Sometimes, it is...
Product Feature Ranking and Popularity Model based on Sentiment Comments
This paper proposes the development of a model to determine feature popularity ranking for products in the market. Each feature that is reviewed by a customer has a relation to sentiment words present in the sentences wi...
Estimation of Trajectory and Location for Mobile Sound Source
In this paper, we present an approach to estimate mobile sound source trajectory. An artificially created sound source signal is used in this work. The main aim of this paper is to estimate the mobile object trajectory v...
Towards a Context-Dependent Approach for Evaluating Data Quality Cost
Data-related expertise is a central and determining factor in the success of many organizations. Big Tech companies have developed an operational environment that extracts benefit from collected data to increase the effi...