Result Analysis of DWT and LSB based Audio Steganography

  • Amit Kumar
  • Kamal Niwaria
Keywords: Audio Steganography, DWT, PSNR, LSB

Abstract

Information security, Steganography is a vast field of computer science that develops numerous intelligent systems for secret communication. Image steganography is the most popular dimension due to its frequency on the internet in this field. The goal of this research work is to provide high level of security, maximum embedding capacity, efficiency and reliability for secret communication using image processing and steganographic techniques. Same work has been done before through cryptographic techniques but with time steganography emerges as a more secure and power full technique, where as cryptography lacks in many ways. Now in modern era, steganography has come up with all the deficiencies of cryptography. In this research work, preprocessing, enhancement is applied on image. After that audio file is taken as secret information and on that sound file Discrete Cosine Transform (DCT) will be applied for compressing audio message .for Enhancing the security Advance encryption standard (AES) is used for the encryption of audio file and this encryption technique is more securing then other encryption techniques. Finally using Least Significant Bit (LSB) secret msg will be embedded in that image. The purpose of this work is to provide an intelligent system for secure communication within different security agencies as well as for institutes and to reduce the statistical attacks.

Downloads

Download data is not yet available.

References

Mansour Sheikhan, Kazem Asadollahi & Reza Shahnazi. (2015). Improvement of embedding capacity and quality of dwt-based audio steganography systems. World Applied Sciences Journal, 13(3), 507-516.

Ankit Chadha, Neha Satam, Rakshak Sood, & Dattatray Bade. (2013). An efficient method for image and audio steganography using least significant bit (LSB) substitution. International Journal of Computer Applications, 77(13), 37-45.

N F. Johnson. (2005). Steganography tools. Available at: http://ww w.jjtc.com/Security/stegtools.htm

R.Anderson & F.Petitcolas. (1998). On the limits of the steganography. IEEE Journal Selected Areas in Communications, 16(4), 474-481.

Sumeet Gupta & Dr. Namrata Dhanda. (2015). Audio steganography using discrete wavelet transformation (DWT) & discrete cosine transformation (DCT). IOSR Journal of Computer Engineering, 17(2), 32-44.

Published
2018-02-28
How to Cite
Amit Kumar, & Kamal Niwaria. (2018). Result Analysis of DWT and LSB based Audio Steganography. International Journal of Engineering and Management Research, 8(1), 79-81. Retrieved from https://www.ijemr.net/ojs/index.php/ojs/article/view/405