Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT)

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2

Abstract

 Abstract: Steganography is an art and a science of communicating in a way, which hides the existence of thecommunication. It is also called as “covered writing”, because it uses a “cover” of a message for sending anyimportant secret message. In the steganographic scenario, the secret data is first concealed within anotherobject which is called “cover object”, to form “stego-object” and then this new object can be transmitted orsaved. Using different techniques, we can send secret data in the form of an image, a music file or even a videofile by embedding it into the carrier, forming a stego-signal. At the receiver’s end, the secret data can berecovered from the stego-signal using different algorithms. The main goal of Steganography is to communicatesecurely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hiddendata. It is not only prevents others from knowing the hidden information, but it also prevents others fromthinking that the information even exists. If a Steganography method causes someone to suspect there is secretinformation in a carrier medium, then the method has failed.

Authors and Affiliations

Sumeet Gupta , Dr. Namrata Dhanda

Keywords

Related Articles

 Handwritten Devanagari Character Recognition using Neural Network

 Abstract: In this digital era, most important thing is to deal with digital documents, organizations using handwritten documents for storing their information can use handwritten character recognition to convert th...

 Implementation of AES Algorithm in MicroController Using  PIC18F452

 Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the  encr...

 A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion

Abstract: This paper describes a technique of applying Genetic Algorithm (GA) and fuzzy to network Intrusion Detection Systems (IDSs). A brief overview of a hybrid approach of genetic algorithm and fuzzy to improve anoma...

 A Survey of Weight-Based Clustering Algorithms in MANET

 As MANETs haven't any mounted infrastructure, all messages have to be routed through the nodes within the network. several clustering and routing algorithms are developed for MANETs. Moreover, most of the prevail...

 Security Measures in Aodv for Ad Hoc Network

 Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move a...

Download PDF file
  • EP ID EP94987
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Sumeet Gupta, Dr. Namrata Dhanda (2015).  Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT). IOSR Journals (IOSR Journal of Computer Engineering), 17(2), 32-44. https://europub.co.uk/articles/-A-94987