A novel audio steganography technique integrated with a symmetric cryptography: a protection mechanism for secure data outsourcing Online publication date: Tue, 12-Oct-2021
by Shirole Rashmi PrakashRao; K. Jyothi
International Journal of Computational Science and Engineering (IJCSE), Vol. 24, No. 5, 2021
Abstract: Data transfer over the internet is a very common process and security of this data is everyone's responsibility. Many techniques are available to secure such confidential data. Among them, cryptography and steganography are two major sub disciplines of information security. The aim of this paper is to maintain the imperceptibility and provide better security. The goals of this paper are to be acknowledged through: the use of variable sample selection method for audio samples - which enhances the security with better audio quality; and deploying one of the most secure algorithms - blowfish. It is used to secure data from eavesdropping. Performance of proposed work is compared with the traditional LSB algorithm for audio. The proposed system is the best approach for enhancing the security and retaining the good quality of the cover object.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Computational Science and Engineering (IJCSE):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com