Abstract

This paper presents a critical analysis on new and original proposed algorithm based on hiding any data has been used that overcomes the disadvantages of the existing algorithms and helps to provide less similarity between cover image and stego image and obtain accuracy upto 69.6 percentage and increases its robustness using metrics called mean square error and peak signal to noise ratio. In the wireless environment cryptography suffers from various spyware programs that shows corrupted secret information to innocent users who uses image steganography services from user. In our proposed prototype helps to authenticate the sender to make the unnoticeable image from original image. In our proposal work discovers a secure authentication communication model would able to cover multimedia data like first text to be hide, second image to be hide and third audio secret data to be hide in cover image without much noticed to any user in between network. In order to provide additional security to this model we incorporate AES encryption scheme where secret message is encrypted and hidden in the cover audio. The proposed approach uses DCT coefficient computation and AES encryption scheme. An extensive experimental study is carried based on different test cases and evaluated against state-of-art techniques. The experimental study shows that the proposed approach achieves better performance for audio steganography. Keywords: AES, steganography, cover image, hiding image, network, digital data.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.