Abstract
The MPEG Layer-III File or MP3 can contain the ID3v2 tag which able to store information not only the song and singer’s name but also song lyric and alblum cover figure. The steganography technique on audio generally only make use of the main body of the audio file, but has not ever use the part of the ID3v2 to hide an message. This study an steganography technique which make use of this ID3v2 tag space where message is encrypted using McEliece cryptosystem method which applying the public key in the form of matrix then inserted into the MP3 file applying Before All Frames (BAF) method, whereas the public key is inserted into album cover figure which is stored in the ID3v2 tag.
Highlights
This study an steganography technique which make use of this ID3v2 tag space where message is encrypted using McEliece cryptosystem method which applying the public key in the form of matrix inserted into the MP3 file applying Before All Frames (BAF) method, whereas the public key is inserted into album cover figure which is stored in the ID3v2 tag
The message concealment in the audio file use the Before All Frames (BAF) method where the message partition is hidden before each the MP3frame so that the mesaage can be hidden without spoil the sound quality,therefor this method selected to be used in this design (Atoum et al, 2011)
The encrypted message is inserted to the MP3 file by using the Before All Frames (BAF) method where message partition stored in each before the MP3 file frame MP3, whereas the public key is inserted into the album cover figure stored in the ID3v2 tag by using Least Significant Bit (LSB) method (Krenn, 2004)
Summary
Experimental research aspect, this designed audio steganography shows that this algorithm is more accurate and reliable programme make use of Android mobile platform than the conventional methods (Anitha, 2012). This journal would show an alternative method to run steganography program. Afan Galih Salman et al / Journal of Computer Science 10 (7): 1249-1252, 2014 by Google and Open Handset Alliance (Burnette, 2010) Mobile platform such as android can be used to run steganography programs (Shahreza, 2005)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.