Whisper: A High Capacity File Encrypting and Hiding Method in an Audio File
Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 6
Abstract
The advance of internet and multimedia allows for tremendous transferring of digital media data and the percentage of time that users spend in online activity and exchanging important information is increasing day by day. Besides that, the simplicity in editing and transmitting the files, makes them vulnerable for stealing or disrupting. Therefore, it is of utmost importance to find an effective way for sending the sensitive information without being noticed by the eavesdroppers or hackers. Cryptography and Steganography are considered the main protection techniques used against eavesdroppers or hackers. Securing the transmission of the sensitive information over the internet and the publicly available media is essential. Intercepting the transmitted information over internet in any form - text, data, voice, image or video should be denied or at least made it harder by encrypting them or hiding them within any cover media. The need for an innovative approach to secure the personal information is increasing dramatically especially by the organizations and governments as they exchange a highly sensitive information. In this work, beside using the most common used encryption methods for encrypting the hidden file and the key, a novel idea for hiding the required information is proposed. Unlike the proposed approaches in the literature, Whisper hide two bytes at a time. Whisper finds the unheard samples and hide two bytes in them where each byte is placed in a different channel.
Authors and Affiliations
Mohammed Aldarwbi, Talal Al-Kharobi
Seven Cool Number Patterns
Inspired by a number pattern found while reading an online newspaper seven number patterns are created. Behind each pattern there is a distinct algorithm. Some of these patterns are a sequence of a single or double digit...
Searching Isomorphic Graphs
To determine that two given undirected graphs are isomorphic, we construct for them auxiliary graphs, using the breadth-first search. This makes capability to position vertices in each digraph with respect to each other....
A 1-5Ghz, Hybrid Mic Wideband LNA utilizing Microstrip Geometric Structure Variety for Performance Improvement
A wideband LNA is design and developed utilizing Hybrid Microwave Integrated Circuit (HMIC) technology for the 1-5GHz bandwidth employing the microstrip line geometric variation. For the performance enhancements in the L...
Advances in Artificial Intelligence Are you sure, we are on the right track?
Over the past decade, AI has made a remarkable progress. It is agreed that this is due to the recently revived Deep Learning technology. Deep Learning enables to process large amounts of data using simplified neuron netw...
Exploiting Cryptocurrency Miners with OSINT Techniques
Collection of intelligence is one of the key elements to organize more sophisticated methods of attacks. Open Source Intelligence (OSINT) is a technique used by attackers for reconnaissance purposes to gather information...