Implementation of ISS - IHAS (Information Security System – Information Hiding in Audio Signal) model with reference to proposed e-cipher Method
نویسنده
چکیده
This paper shows the possibility of exploiting the features of Ecipher method by using both cryptography and Information hiding in Audio signal methods used to send and receive the message in more secured way. Proposed methodology shows that successfully using these Poly substitutions methods (Proposed E-Cipher) for Encode and decodes messages to evolve a new method for Encrypting and decrypting the messages. Embedding secret messages using audio signal in digital format is now the area in focus. There exist numerous steganography techniques for hiding information in audio medium. In our proposed theme, a new model ISS-IHAS Embedding Text in Audio Signal that embeds the text like the existing system but with strong encryption that gains the full advantages of cryptography. Using steganography it is possible to conceal the full existence of the original text and the results obtained from the proposed model is compared with other existing techniques and proved to be efficient for textual messages of minimum size as the size of the embedded text is essentially same as that of encrypted text size. This emphasis the fact that we are able to ensure secrecy without an additional cost of extra space consumed for the text to be communicated. KeywordsEncryption; Decryption; Audio data hiding; Mono Substitution; Poly Substitution. I. OBJECTIVES OF THE PROJECT The main purpose of Audio steganography is to hide a message in some cover media, to obtain new data, practically indistinguishable from the original message, by people, in such a way that an eavesdropper cannot detect the presence of original message in new data. With computers and Networks, there are many other ways of hiding information, such as Covert channels, Hidden text within WebPages Hiding files in “Plain sight”, Null ciphers. Today, the internet is filled with tons of programs that use steganography to hide the secret information. There are so many medias are used for digitally embedding message such as plaintext, hypertext, audio/video, still image and network traffic. There exists a large variety of steganographic techniques with varying complexity and possessing some strong and weak aspects. .. Hiding information in text is the most popular method of Steganography. It is used to hide a secret message in every nth character or altering the amount of white space after lines or between words of a text message [1]. It is used in initial decade of internet era. But it is not used frequently because the text files have a small amount of redundant data. But this technique lacks in payload capacity and robustness. To hide data in audio files, the secret message is embedded into digitized audio signal. Audio data hiding method provides the most effective way to protect privacy. Key aspect of embedding text in audio files is that, no extra bytes are generated for embedding. Hence it is more comfortable to transmit huge amount of data using audio signal. Embedding the secret messages in digital sound is usually a very difficult process [2]. II. PROPOSED ISS – IHAS MODEL The following IHAS Model provides a very basic description of the audio steganographic process in the sender side and receiver side.
منابع مشابه
A survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملCipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملOptimizing image steganography by combining the GA and ICA
In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...
متن کاملA new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...
متن کاملHigh capacity steganography tool for Arabic text using 'Kashida'
Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011