Abstract

The MPEG Layer-III File or MP3 can contain the ID3v2 tag which able to store information not only the song and singer’s name but also song lyric and alblum cover figure. The steganography technique on audio generally only make use of the main body of the audio file, but has not ever use the part of the ID3v2 to hide an message. This study an steganography technique which make use of this ID3v2 tag space where message is encrypted using McEliece cryptosystem method which applying the public key in the form of matrix then inserted into the MP3 file applying Before All Frames (BAF) method, whereas the public key is inserted into album cover figure which is stored in the ID3v2 tag.

Highlights

  • This study an steganography technique which make use of this ID3v2 tag space where message is encrypted using McEliece cryptosystem method which applying the public key in the form of matrix inserted into the MP3 file applying Before All Frames (BAF) method, whereas the public key is inserted into album cover figure which is stored in the ID3v2 tag

  • The message concealment in the audio file use the Before All Frames (BAF) method where the message partition is hidden before each the MP3frame so that the mesaage can be hidden without spoil the sound quality,therefor this method selected to be used in this design (Atoum et al, 2011)

  • The encrypted message is inserted to the MP3 file by using the Before All Frames (BAF) method where message partition stored in each before the MP3 file frame MP3, whereas the public key is inserted into the album cover figure stored in the ID3v2 tag by using Least Significant Bit (LSB) method (Krenn, 2004)

Read more

Summary

INTRODUCTION

Experimental research aspect, this designed audio steganography shows that this algorithm is more accurate and reliable programme make use of Android mobile platform than the conventional methods (Anitha, 2012). This journal would show an alternative method to run steganography program. Afan Galih Salman et al / Journal of Computer Science 10 (7): 1249-1252, 2014 by Google and Open Handset Alliance (Burnette, 2010) Mobile platform such as android can be used to run steganography programs (Shahreza, 2005)

THE ARCHITECTURE SYSTEM
THE DESIGN
RESULTS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call