By Topic

A double layered additive space sequenced Audio Steganography Technique for mobile network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Saswati Ghosh ; Dept. of Comput. Sci. & Eng., West Bengal Univ. of Technol., Kolkata, India ; Debashis De ; Debdatta Kandar

This paper presents a double layered secure data transfer technique using Cryptography and Audio Steganography for mobile network. Firstly, the characters of secret text message are converted to bit values and are encrypted by XOR operation using a Symmetric key. Then using a secret key-box, it is again scrambled and then divided into 2bit blocks. These blocks from MSB are replaced by the Left Significant two bits of each byte of cover audio bit stream. The main trick for this steganography method hides behind logic of selecting the next byte of the cover audio. And additive method with a key constraint is used as the proposed algorithm. After replacing by the secret bit blocks, the byte of the cover audio is divided into two nibbles and added overlooking the carry and is converted to decimal values. The second and third bits are taken together and the decimal value is considered as key constraint. Both the values are added and next byte is chose after counting that numbers of byte positions. The technique presented in this paper has overcome many of the limitations like selection of secret text size and cover audio format, noise removal etc. that helps the user to transfer data through mobile network in a more secured and efficient way.

Published in:

Radar, Communication and Computing (ICRCC), 2012 International Conference on

Date of Conference:

21-22 Dec. 2012