Enhancing Data Security Using Audio-Video Steganography

  • Authors

    • Rambabu Mudusu
    • A Nagesh
    • M Sadanandam
    2018-04-18
    https://doi.org/10.14419/ijet.v7i2.20.14777
  • Steganography, python, principle component analysis, least vital bit, RSA rule then forth.
  • Steganography may be a strategy for concealing any mystery information like content, picture, sound behind distinctive cowl document .In this paper we have a tendency to planned the mix of image steganography associated sound steganography with confront acknowledgment innovation as an instrument for verification. The purpose is to shroud the mystery information behind sound and therefore the beneficiary's face image of video, because it may be a use of various still casings of images and sound. During this technique we've chosen any casing of video to shroud beneficiary's face image and sound to hide the mystery data. Affordable calculation, maybe, increased LSB and RSA rule is been utilised to shroud mystery content and movie. PCA rule is employed for confront acknowledgment. The parameter for security and verification ar gotten at collector and transmitter facet that ar exactly indistinguishable, consequently the knowledge security is dilated.

     

  • References

    1. [1] Tayel M, Gamal A & Shawky H, “A proposed implementation method of an audio steganography techniqueâ€, 18th International Conference on Advanced Communication Technology (ICACT), (2016), pp.180-184.

      [2] Kakde Y, Gonnade P & Dahiwale P, “Audio-video steganographyâ€, International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), (2015), pp.1-6.

      [3] Blue J, Condell J & Lunney T, “Identity Document Authentication using Steganographic Techniquesâ€, Signal and System Conference (ISSC), (2017).

      [4] Gambhir A & Khara S, “Integrating RSA Cryptography & Audio Steganographyâ€, International Conference on Computing, Communication and Automation (ICCCA), (2016).

      [5] Chowdhury R, Bhattacharyya D, Bandyopadhyay SK & Kim TH, “A view on LSB based audio steganographyâ€, International Journal of Security and Its Applications, Vol.10, No.2 (2016), pp.51-62.

      [6] Santhi V & Govindaraju L, “Stego-audio Using Genetic Algorithm Approachâ€, Research Journal of Applied Sciences, Engineering and Technology, (2014).

      [7] Johri P & Kumar A, “Review paper on text and audio steganography using GAâ€, International Conference on Computing, Communication & Automation, (2015), pp. 190-192.

      [8] Bhowal K, “Audio Steganography using GAâ€, International Conference on Computational Intelligence and Communication Networks, (2010).

      Mahmud F, Haque ME, Zuhori ST& Pal B, “Human face recognition using PCA based Genetic Algorithmâ€, International Conference on Electrical Engineering and Information & Communication Technology (ICEEICT), (2014), pp.1-5
  • Downloads

  • How to Cite

    Mudusu, R., Nagesh, A., & Sadanandam, M. (2018). Enhancing Data Security Using Audio-Video Steganography. International Journal of Engineering & Technology, 7(2.20), 276-279. https://doi.org/10.14419/ijet.v7i2.20.14777