Abstract

The technique of information hiding is very important in achieving security of important and sensitive data, especially those that are transmitted through various digital communication channels because it has robust characteristics that distinguish it from encryption techniques, the most important of which is that it is not perceived by protrusive and hackers, as it is based on the principle of hiding those data inside other digital media as a carrier cover. On the other hand, with the development of hiding techniques, techniques developed to try extracting its hiding to hacking its contents, for this reason and to increase the efficiency of these methods, the encryption and hiding techniques was combined together.The proposed method depends on distributing secret data on several digital audio files of type WAV in random way depends on circular secret key values that is generated in random order that be agreed upon between the sender and the receiver. This technique has achieved high durability, and in the event of suspicion of the existence of secret content within any WAV file, the multiplicity of carrier files and their different length, as well as random distribution of data in them, all these characteristic eliminates the suspicion of any confidential content, as well as complicates the file retrieved process if the suspicion be occurs.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call