Whisper: A High Capacity File Encrypting and Hiding Method in an Audio File
Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 6
Abstract
The advance of internet and multimedia allows for tremendous transferring of digital media data and the percentage of time that users spend in online activity and exchanging important information is increasing day by day. Besides that, the simplicity in editing and transmitting the files, makes them vulnerable for stealing or disrupting. Therefore, it is of utmost importance to find an effective way for sending the sensitive information without being noticed by the eavesdroppers or hackers. Cryptography and Steganography are considered the main protection techniques used against eavesdroppers or hackers. Securing the transmission of the sensitive information over the internet and the publicly available media is essential. Intercepting the transmitted information over internet in any form - text, data, voice, image or video should be denied or at least made it harder by encrypting them or hiding them within any cover media. The need for an innovative approach to secure the personal information is increasing dramatically especially by the organizations and governments as they exchange a highly sensitive information. In this work, beside using the most common used encryption methods for encrypting the hidden file and the key, a novel idea for hiding the required information is proposed. Unlike the proposed approaches in the literature, Whisper hide two bytes at a time. Whisper finds the unheard samples and hide two bytes in them where each byte is placed in a different channel.
Authors and Affiliations
Mohammed Aldarwbi, Talal Al-Kharobi
Stochastic Hybrid Dynamic Multicultural Social Networks
In this work, we investigate the cohesive properties of a stochastic hybrid dynamic multi-cultural network under random environmental perturbations. By considering a multi-agent dynamic network, we model a social structu...
Exploiting Cryptocurrency Miners with OSINT Techniques
Collection of intelligence is one of the key elements to organize more sophisticated methods of attacks. Open Source Intelligence (OSINT) is a technique used by attackers for reconnaissance purposes to gather information...
The Blockchain: Overview of “Past” and “Future”
Variety of network technologies deployed for ease of use and emerging technologies developed for better communication, enhanced security and faster delivery. The global financial crash of 2007-2008 created a lot of distr...
Bandwidth Constrained Multipath Routing Protocol for QoS Provision in MANETs
Mobile Ad hoc NETworks (MANETs) are composed of mobile nodes with limited resources and unpredictable node movement. With the on-going evolution in MANETs, provision of Quality of Service (QoS) has become a challenging t...
Optimal Routing Algorithm in Multilayer Octagon-Cell: A New Class of Octagon-Cell Interconnected Networks
In communication system of network routing algorithm acts an important role. The efficiency of a parallel system depends on the reliable and efficient routing algorithm which is used to route the messages between the fau...