Whisper: A High Capacity File Encrypting and Hiding Method in an Audio File
Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 6
Abstract
The advance of internet and multimedia allows for tremendous transferring of digital media data and the percentage of time that users spend in online activity and exchanging important information is increasing day by day. Besides that, the simplicity in editing and transmitting the files, makes them vulnerable for stealing or disrupting. Therefore, it is of utmost importance to find an effective way for sending the sensitive information without being noticed by the eavesdroppers or hackers. Cryptography and Steganography are considered the main protection techniques used against eavesdroppers or hackers. Securing the transmission of the sensitive information over the internet and the publicly available media is essential. Intercepting the transmitted information over internet in any form - text, data, voice, image or video should be denied or at least made it harder by encrypting them or hiding them within any cover media. The need for an innovative approach to secure the personal information is increasing dramatically especially by the organizations and governments as they exchange a highly sensitive information. In this work, beside using the most common used encryption methods for encrypting the hidden file and the key, a novel idea for hiding the required information is proposed. Unlike the proposed approaches in the literature, Whisper hide two bytes at a time. Whisper finds the unheard samples and hide two bytes in them where each byte is placed in a different channel.
Authors and Affiliations
Mohammed Aldarwbi, Talal Al-Kharobi
Setting an Optimization Problem of Distributing Traffic Across Multiple Independent Paths
Communication network development is considered as an urgent need for the world. The proposed work in this paper is to solve the problem of the traffic engineering, using the multi-path routing mechanisms by applying a d...
Bandwidth Constrained Multipath Routing Protocol for QoS Provision in MANETs
Mobile Ad hoc NETworks (MANETs) are composed of mobile nodes with limited resources and unpredictable node movement. With the on-going evolution in MANETs, provision of Quality of Service (QoS) has become a challenging t...
Outlier Resistant Time Series Operations via Qualitative Robustness and Saddle‐Point Game Formalizations‐ A Review: Filtering and Smoothing
Time series operations are sought in numerous applications, while the observations used in such operations are generally contaminated by data outliers. The objective is thus to design outlier resistant or “robust” time s...
ZRSA Algorithm
Today, RSA algorithm is one of the encryption algorithm that is used widely. However, with the advances in computer power it is becoming susceptible to be cracked. It is become a necessity to develop a new algorithm that...
TPC Together with Overlapped Time Domain Multiplexing System Based on Turbo Structure
Overlapped time domain multiplexing (OvTDM) is a novel technique for utilizing inter-symbol interference (ISI) to benefit a communication system. We implement the OvTDM technique based on turbo structure and associate a...