Information Trouncing Via Slightest Momentous Spot System Procedure

Authors

  • D Saravanan
  • N Sivaprasad
  • Dennis Joseph

DOI:

https://doi.org/10.14419/ijet.v7i3.27.18002

Published:

2018-08-15

Keywords:

Steganography, Audio Data, Encryption, Decryption, Stegno Audios

Abstract

The least-significant-bit based approach is a popular type of stenographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover audio mainly depends on a pseudorandom number generator without considering the relationship between the audio content itself and the size of the secret message. In this paper, we expand the least significant bit matching revisited audio stegnography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover audio. For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters. New scheme can enhance the security significantly compared with typical least significant bit-based approaches as well as their edge adaptive ones, such as pixel-value-differencing-based approaches, while preserving higher visual quality of stegno audios at the same time.

 

 


References

[1] Andreas Westfeld and Andreas P.tzmann “ Attacks on Steganographic SystemsBreaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools—and Some Lessons Learned

[2] Andrew D. Ker “A Fusion of Maximum Likelihood and Structural Steganalysisâ€

[3] Andrew D. Ker “Steganalysis of Least significant bit Matching in Grayscale Imagesâ€,2005.

[4] D.Saravanan, “Video data image retrieval using – BRICHâ€, World journal of Engineering, Vol.14, Issuu 4, Pages 318-323, Aug 2017.

[5] D.Saravanan ,â€An Secret Two fold image using flow code procedureâ€, Int. journal of pharmacy & Technologyâ€, Vol 09, Issue 03, Pages 30628-30636, Sep 2017.

[6] Xiaolong Li, Tieyong Zeng, Bin Yang “Detecting Least significant bit Matching by Applying Calibration Technique for Difference Imageâ€

[7] Mehdi Kharrazi , Husrev T. Sencar , Nasir Memon “Cover selection for steganographic embeddingâ€

[8] R.Sridevi, Dr. A. Damodaram , Dr.Narasimham “ Efficient Mehthod of Audio Steganography By modified Least significant bit Algorithm and Strong Encrypitonâ€2005.

[9] D.Saravanan,†Image frame mining Using indexing technique†Data Engineering and Intelligent Computing , SPRINGER Book series, Chapter 12 , Pages 127-137, ISBN:978-981-10-3223-3,July 2017.

[10] D.Saravanan,†Persive initiated peer distribution multiplexing “,Pak. J. Biotechnology, Vol 13(Special Issue) ,(2016), Pages 347-350.

[11] G Abilbakieva, M Knissarina, K Adanov, S Seitenova, G Bekeshova (2018). Managerial competence of future specialists of the education system (Preschool education and upbringing) and medicine in the comparative aspect. Opción, Año 33, No. 85. 44-62.

[12] G Ainabekova, Z Bayanbayeva, B Joldasbekova, A Zhaksylykov (2018). The author in esthetic activity and the functional text (on the basis of V. Mikhaylov’s narrative (“The chronicle of the great juteâ€). Opción, Año 33. 63-80.

View Full Article: