Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system
نویسندگان
چکیده
Although variety in hiding methods used to protect data and information transmitted via channels but still need more robustness difficulty improve protection level of the secret messages from hacking or attacking. Moreover, several medias one media reduce transmission time band channel is important task define as a gain channel. This calls find other ways be complexity detecting message. Therefore, this paper proposes cryptography/steganography method hide an audio/voice message (secret message) two different cover medias: audio video. use least significant bits (LSB) algorithm combined with 4D grid multi-wing hyper-chaotic (GMWH) system. Shuffling using key generated by GMWH system then LSB will provide extracting original hackers attackers. According analyses obtained results receiver peak signal-to-noise ratio (PSNR)/mean square error (MSE) sensitivity encryption key, proposed has security robustness. Finally, work extra mixture base crypto-steganographic methods.
منابع مشابه
Efficient Least-significant-bits Steganography for VoIP
For the instantaneity of real-time applications such as voice over Internet protocol (VoIP), the processing delay and efficiency need to be carefully considered. Matrix coding is a widely used coding scheme for steganography to improve the embedding efficiency which means the average hiding bits per covering bit change. In order to take full advantage of it, a classifying least-significant-bits...
متن کاملEnhancing the Least Significant Bit (LSB) Algorithm for Steganography
Various Steganography algorithms have been proposed and implemented for hiding the existence of data in a cover object starting from the algorithms that work in transform domain to the ones that work in spatial domain, such as Least Significant Bit (LSB), which uses the three colours (RED, GREEN and BLUE) present in an image. Three colours are present in the pixel of an image, therefore, this p...
متن کاملInformation Hiding using Least Significant Bit Steganography and Blowfish Algorithm
Security is the most challenging aspects in the World Wide Web. In present time information sharing and transfer has increased exponentially. So to find out best solution this is providing necessary protection of our data against malicious attacks from intruders. Cryptography and Steganography are the two major techniques for secret communication. Cryptography converts information from its orig...
متن کاملAn Efficient Steganography Algorithm Based on Visual Cryptography and Least Significant Bit Embedding
Steganography is the process of concealing data within another data. The data may be in any form such as file, image, audio or video. The data to be concealed into another data is called secret data. The original data is called as cover data that hides the secret data. In this paper, an efficient steganography technique is presented which combine the visual cryptography with Least Significant B...
متن کاملAn Enhanced Least Significant Bit Steganography Technique
Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are becoming more relevant than earlier. This necessitates for a secure communication method to transmit messages via internet. Steganography is the science of communicating secret data in several multimedia carriers like audio, text, video or image. A modified technique to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Power Electronics and Drive Systems
سال: 2022
ISSN: ['2722-2578', '2722-256X']
DOI: https://doi.org/10.11591/ijece.v12i1.pp320-330