Enhancing Data Security Using Audio-Video Steganography

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Steganography may be a strategy for concealing any mystery information like content, picture, sound behind distinctive cowl document .In this paper we have a tendency to planned the mix of image steganography associated sound steganography with confront acknowledgment innovation as an instrument for verification. The purpose is to shroud the mystery information behind sound and therefore the beneficiary's face image of video, because it may be a use of various still casings of images and sound. During this technique we've chosen any casing of video to shroud beneficiary's face image and sound to hide the mystery data. Affordable calculation, maybe, increased LSB and RSA rule is been utilised to shroud mystery content and movie. PCA rule is employed for confront acknowledgment. The parameter for security and verification ar gotten at collector and transmitter facet that ar exactly indistinguishable, consequently the knowledge security is dilated.


  • Keywords

    Steganography, python, principle component analysis, least vital bit, RSA rule then forth.

  • References

      [1] Tayel M, Gamal A & Shawky H, “A proposed implementation method of an audio steganography technique”, 18th International Conference on Advanced Communication Technology (ICACT), (2016), pp.180-184.

      [2] Kakde Y, Gonnade P & Dahiwale P, “Audio-video steganography”, International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), (2015), pp.1-6.

      [3] Blue J, Condell J & Lunney T, “Identity Document Authentication using Steganographic Techniques”, Signal and System Conference (ISSC), (2017).

      [4] Gambhir A & Khara S, “Integrating RSA Cryptography & Audio Steganography”, International Conference on Computing, Communication and Automation (ICCCA), (2016).

      [5] Chowdhury R, Bhattacharyya D, Bandyopadhyay SK & Kim TH, “A view on LSB based audio steganography”, International Journal of Security and Its Applications, Vol.10, No.2 (2016), pp.51-62.

      [6] Santhi V & Govindaraju L, “Stego-audio Using Genetic Algorithm Approach”, Research Journal of Applied Sciences, Engineering and Technology, (2014).

      [7] Johri P & Kumar A, “Review paper on text and audio steganography using GA”, International Conference on Computing, Communication & Automation, (2015), pp. 190-192.

      [8] Bhowal K, “Audio Steganography using GA”, International Conference on Computational Intelligence and Communication Networks, (2010).

      Mahmud F, Haque ME, Zuhori ST& Pal B, “Human face recognition using PCA based Genetic Algorithm”, International Conference on Electrical Engineering and Information & Communication Technology (ICEEICT), (2014), pp.1-5




Article ID: 14777
DOI: 10.14419/ijet.v7i2.20.14777

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.