Whisper: A High Capacity File Encrypting and Hiding Method in an Audio File

Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 6

Abstract

The advance of internet and multimedia allows for tremendous transferring of digital media data and the percentage of time that users spend in online activity and exchanging important information is increasing day by day. Besides that, the simplicity in editing and transmitting the files, makes them vulnerable for stealing or disrupting. Therefore, it is of utmost importance to find an effective way for sending the sensitive information without being noticed by the eavesdroppers or hackers. Cryptography and Steganography are considered the main protection techniques used against eavesdroppers or hackers. Securing the transmission of the sensitive information over the internet and the publicly available media is essential. Intercepting the transmitted information over internet in any form - text, data, voice, image or video should be denied or at least made it harder by encrypting them or hiding them within any cover media. The need for an innovative approach to secure the personal information is increasing dramatically especially by the organizations and governments as they exchange a highly sensitive information. In this work, beside using the most common used encryption methods for encrypting the hidden file and the key, a novel idea for hiding the required information is proposed. Unlike the proposed approaches in the literature, Whisper hide two bytes at a time. Whisper finds the unheard samples and hide two bytes in them where each byte is placed in a different channel.

Authors and Affiliations

Mohammed Aldarwbi, Talal Al-Kharobi

Keywords

Related Articles

Setting an Optimization Problem of Distributing Traffic Across Multiple Independent Paths

Communication network development is considered as an urgent need for the world. The proposed work in this paper is to solve the problem of the traffic engineering, using the multi-path routing mechanisms by applying a d...

Bandwidth Constrained Multipath Routing Protocol for QoS Provision in MANETs

Mobile Ad hoc NETworks (MANETs) are composed of mobile nodes with limited resources and unpredictable node movement. With the on-going evolution in MANETs, provision of Quality of Service (QoS) has become a challenging t...

Outlier Resistant Time Series Operations via Qualitative Robustness and Saddle‐Point Game Formalizations‐ A Review: Filtering and Smoothing

Time series operations are sought in numerous applications, while the observations used in such operations are generally contaminated by data outliers. The objective is thus to design outlier resistant or “robust” time s...

ZRSA Algorithm

Today, RSA algorithm is one of the encryption algorithm that is used widely. However, with the advances in computer power it is becoming susceptible to be cracked. It is become a necessity to develop a new algorithm that...

TPC Together with Overlapped Time Domain Multiplexing System Based on Turbo Structure

Overlapped time domain multiplexing (OvTDM) is a novel technique for utilizing inter-symbol interference (ISI) to benefit a communication system. We implement the OvTDM technique based on turbo structure and associate a...

Download PDF file
  • EP ID EP265968
  • DOI 10.14738/tnc.56.3766
  • Views 70
  • Downloads 0

How To Cite

Mohammed Aldarwbi, Talal Al-Kharobi (2017). Whisper: A High Capacity File Encrypting and Hiding Method in an Audio File. Transactions on Networks and Communications, 5(6), 1-8. https://europub.co.uk/articles/-A-265968