Abstract

In the advancement of high-speed internet technology and vast use of social media, people are sending audio and video message for their daily communication in case of textual information. Due to unprotected nature of communication channel and increasing unauthorized users or adversary, it is essential to measure some protection of valuable multimedia messages which is one of a popular research issue for various human centric applications, especially in law enforcement and military applications. In this context, an effective audio authentication scheme has been proposed using (11,7) Hamming codes which are employed on an audio file. Now, for the first round, any arbitrary position (say nth position) bit will be considered as a secret key, and for rest of the cases data embedded position will be treated as a secret key position for the immediate round. For the first round, secret message bit will be embedded in the LSB position (if possible), otherwise next bit will be checked and for the remaining cases message bit will be embedded in a position where (LSB position bit ! = secret message bit) and (secret key position bit ! = secret message bit). Continue this process to embed all secret data bits within the cover audio file and produce stego audio. Various private, public and government sector will be benefited from this scheme.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.