Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography


Affiliations
1 Deptt. of Engineering, Dr. C. V. Raman University, Bilaspur (C.G), India
2 Dr. C. V. Raman University, Bilaspur (C.G), India
     

   Subscribe/Renew Journal


In this paper, the proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points The first to employ hidden communications techniques -with radio transmissions- were the armies, because of the strategic importance of secure communication and the need to conceal the source as much as possible. Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This problem has become more and more important just in these days, with which around thirty of the major - with respect to technology - countries in the world methods are discussed and analyzed based on the ratio between the number of the identical and the non identical bits between the pixel color values and the secret message values This property is used for proposed image encryption and for steganography to increase the security level of the encoded image and to make it less visible.

Keywords

Surveillance Information, Segmenting, Object Tracking, Significant Percentage, Auto-Calibration.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 156

PDF Views: 2




  • Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography

Abstract Views: 156  |  PDF Views: 2

Authors

Tarun Dhar Diwan
Deptt. of Engineering, Dr. C. V. Raman University, Bilaspur (C.G), India
Aaqib Rshid
Dr. C. V. Raman University, Bilaspur (C.G), India
Vinay Sahu
Dr. C. V. Raman University, Bilaspur (C.G), India

Abstract


In this paper, the proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points The first to employ hidden communications techniques -with radio transmissions- were the armies, because of the strategic importance of secure communication and the need to conceal the source as much as possible. Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This problem has become more and more important just in these days, with which around thirty of the major - with respect to technology - countries in the world methods are discussed and analyzed based on the ratio between the number of the identical and the non identical bits between the pixel color values and the secret message values This property is used for proposed image encryption and for steganography to increase the security level of the encoded image and to make it less visible.

Keywords


Surveillance Information, Segmenting, Object Tracking, Significant Percentage, Auto-Calibration.