InternationaleJournals

EFFICIENT METHOD OF AUDIO STEGANOGRAPHY BY SYMMETRIC ENCRYPTION KEY WITH ENHANCED SECURITY

1Tarun Dhar Diwan, 2Bhoopendra Dhar Diwan and 3Aaqib Rashid

1,3 Department of Engineering, 2Department of Basic Sciences, Dr. C. V. Raman University, Bilaspur (C.G), India. Email: tarunctech@gmail.com, bddiwan@gmail.com, jahangeer.lone@gmail.com

ABSTRACT

In this paper In this paper, the proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. The performed computer simulation demonstrates the high efficiency of the proposed technique and the analytical comparative analysis indicates a number of advantages in comparison with the existed steganography software. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points The first to employ hidden communications techniques -with radio transmissions- were the armies, because of the strategic importance of secure communication and the need to conceal the source as much as possible. Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This steganography application software provided for the purpose to how to use any type of image formats to hiding any type of files inside their. The master work of this application is in supporting any type of pictures without need to convert to bitmap, and lower limitation on file size to hide, because of using maximum memory space in pictures to hide the file. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points the first to employ hidden communications techniques because of the strategic importance of secure communication and the need to conceal the source as much as possible. Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This problem has become more and more important just in these days, with which around thirty of the major - with respect to technology countries in the world methods are discussed and analyzed based on the ratio between the number of the identical and the non identical bits between the pixel color values and the secret message values This property is used for proposed image encryption and for steganography to increase the security level of the encoded image and to make it less visible.

Keywords: surveillance information, segmenting, Object tracking, significant percentage,auto-calibration.

 


International eJournal of Mathematics and Engineering

Volume 4, Issue 3, Pages:  2216 - 2222