Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT)

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2

Abstract

 Abstract: Steganography is an art and a science of communicating in a way, which hides the existence of thecommunication. It is also called as “covered writing”, because it uses a “cover” of a message for sending anyimportant secret message. In the steganographic scenario, the secret data is first concealed within anotherobject which is called “cover object”, to form “stego-object” and then this new object can be transmitted orsaved. Using different techniques, we can send secret data in the form of an image, a music file or even a videofile by embedding it into the carrier, forming a stego-signal. At the receiver’s end, the secret data can berecovered from the stego-signal using different algorithms. The main goal of Steganography is to communicatesecurely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hiddendata. It is not only prevents others from knowing the hidden information, but it also prevents others fromthinking that the information even exists. If a Steganography method causes someone to suspect there is secretinformation in a carrier medium, then the method has failed.

Authors and Affiliations

Sumeet Gupta , Dr. Namrata Dhanda

Keywords

Related Articles

 Content Based Image Retrieval for Unlabelled Images

 Recently, content-based image retrieval has become hot topic and the techniques of content-based image retrieval have been achieved good development. Content-based image retrieval systems were introduced  to...

 A review of the existing state of Personality prediction of Twitterusers with Machine Learning Algorithms

Abstract: Twitter is a popular social media platform with millions of users. The tweets shared by these usershave recently attracted the attention of researchers from diverse fields. In this paper, we focus primarily onp...

 An Efficient implementation of PKI architecture based Digital  Signature using RSA and various hash functions (MD5 and SHA  variants

 Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....

 Analysis of Time Complexities and Accuracy of Depression FillingAlgorithms in DEM

Abstract: The recent development of digital representation has stimulated the development of automaticextraction of topographic and hydrologic information from Digital Elevation Model (DEM). A DEM is used tocreate hydrol...

 A Exploratory Review on Soft Computing SegmentationTechniques

Abstract: Segmentation is a process to divides the images into its regions or objects that have similar featuresor characteristics. Segmentation has no single standard procedure and it is very difficult in non-trivial im...

Download PDF file
  • EP ID EP94987
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

Sumeet Gupta, Dr. Namrata Dhanda (2015).  Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT). IOSR Journals (IOSR Journal of Computer Engineering), 17(2), 32-44. https://europub.co.uk/articles/-A-94987