Performance Improvement of Threshold based Audio Steganography using Parallel Computation
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 10
Abstract
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security level. The existing techniques either focus on the payload or security, but none of them has ensured both security and payload at same time. Data Dependency in existing solution was reluctant for the execution of steganography mechanism serially. The audio data and secret data pre-processing were done and existing techniques were experimentally tested in Matlab that ensured the existence of problem in efficient execution. The efficient least significant bit steganography scheme removed the pipelining hazard and calculated Steganography parallel on distributed memory systems. This scheme ensures security, focuses on payload along with provisioning of efficient solution. The result depicts that it not only ensures adequate security level but also provides better and efficient solution.
Authors and Affiliations
Muhammad Shoaib, Zakir Khan, Danish Shehzad, Tamer Dag, Arif Umar, Noor Amin
Citizen Attention Web Application for the Municipality of Sabinas, Coahila, Mexico
The information systems are fundamental to perform the daily activities of any organization. There is an increasing dependence on organizations to use information technology to achieve their objectives. This article pres...
Building Trust In Cloud Using Public Key Infrastructure - A step towards cloud trust
Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. There are big security conc...
A Novel Expert System for Building House Cost Estimation: Design, Implementation, and Evaluation
This paper introduces an expert system which demonstrates a new method for accurate estimation of building house cost. This system is simple and decreases the time, the effort, and the money of its beneficiaries. In addi...
Enhancement in System Schedulability by Controlling Task Releases
In real-time systems fixed priority scheduling techniques are considered superior than the dynamic priority counterparts from implementation perspectives; however the dynamic priority assignments dominate the fixed prior...
Quantifying Integrity Impacts in Security Risk Scoring Models
Organizations are attacked daily by criminal hackers. Managers need to know what kinds of cyber-attacks they are exposed to, for taking defense activities. Attackers may cause several kinds of damages according to the kn...