Abstract

Steganography is the science of hiding secret data in such a way that its presence can't be noticed. Techniques which hide more secret data in cover files and which doesn't affect transparency of cover signal are better one for steganographic purpose. In the proposed technique which keyless randomization is provided to insert secret information in multiple and variable LSBs. Cover signal is converted into binary format and then with the proposed algorithm binary cover signal is divided into blocks of size 8x8 with 16 bits per sub block, and then checking each sub blocks first two MSBs to find how many LSBs will be used for insertion of secret data bits. PSNR values show that there is no noticeable difference between cover audio signal and stego audio signal. Security increases due to the use of variable number of LSBs for insertion and keyless randomization are provided by counting out technique.

Highlights

  • Now-a-days there are so many software‟s available which are cheap and easy to use and using these software‟s creation and modification of digital information becomes very easy

  • The main focus is on hiding message in cover file to obtain new file called stego file which is indistinguishable from cover file

  • Plotting of the cover audio signal is shown in figure 2 and plotting of the stego signal after applying the proposed algorithm is shown in figure 3

Read more

Summary

Introduction

Now-a-days there are so many software‟s available which are cheap and easy to use and using these software‟s creation and modification of digital information becomes very easy. This easiness and speed of widespread use of digital information pose a threat for security of information. Techniques for securing information from eavesdroppers are known as either cryptographic or steganographic techniques. On the other hand steganographic techniques are information hiding technique. In these techniques, the main focus is on hiding message in cover (audio or video) file to obtain new file called stego file which is indistinguishable from cover file

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.