Secure Transmission of Information by LSB Encoding Technique using Audio Steganography and Cryptography
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 6
Abstract
In this paper, we deal with Steganography where Steganography is the art and science of communicating in a way which hides the existence of the communication. [1]The goal of steganography is to hide messages inside other harmless message in a way that doesn’t allow enemy to even detect that there is second message present. In an audio Steganographic method [2], we can adjust the bits in such a way so that the stego audio signal resulting from embedding data in higher LSB layer is perceptually indistinguishable from the host audio signal. In addition with Steganography, Cryptography has been added to provide more security for the message.
Authors and Affiliations
Preeti Singh
Note on lexicographical ordering
Farhadinia (2016) developed a lexicographical ordering with respect to hesitant fuzzy elements. In this article, we will demonstrate that his novel approach fails to satisfy the following three issues: (i) His ranking is...
NFC Enabled Smartphone Applicationfor Mundane Activities
People persistently attempt to enhance their personal satisfaction and advances, have an imperative part on it. Money transactions between mobile phones is exhausted and a troublesome operation to perform following there...
Consciousness: A rapidly moving Scientific Discipline?
Is consciousness a discipline of Philosophy/Theology or Science? Since time immemorial, consciousness has baffled us, bewildered us and sometimes even mystified us. The question still remains that can consciousness be re...
Big-Data Gathering Using Mobile Collector in Densely Deployed Wireless Sensor Network
With tremendous growth of Information and Communication Technology (ICT) Wireless sensor network has major contribution in big data gathering. Even if data generated by individual sensor is not significant, the overall d...
Improving Cluster-Based Certificate Revocation and Integral Component CCRVC Scheme for Authentication in Mobile Adhoc Network
Certificate revocation is a crucial integral element to secure network communications. During this paper, we tend to specialize in the problem of certificate revocation to isolate attackers from any collaborating in netw...