International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 1 Issue 2, November 2012

Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security

Juhi Saurabh, Asha Ambhaikar

Audio Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is a method that ensures secured data transfer between parties normally in internet community. Here we present a novel approach for resolving the problems related to the substitution technique of audio steganography. In the first level of security, we use an improved RSA encryption algorithm (RPrime RSA) to encrypt message, which is very complex to break. In the next level, the encrypted message is to be encoded into audio data for this we use a more powerful GA (Genetic Algorithm) based Least Significant Bit) Algorithm. In order to increase the robustness against intentional attacks in which the hackers always try to reveal the hidden message as well as some unintentional attacks such as noise addition, the encrypted message bits are embedded into random LSB layers. Here in order to reduce distortion, GA operators are used. The basic idea behind this paper is maintained randomness in message bit insertion into audio data for hiding the data from hackers and to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safer manner.

Keywords: Audio Steganography, LSB, GA, HAS, HVS, RSA

Edition: Volume 1 Issue 2, November 2012

Pages: 62 - 65


How to Cite this Article?

Juhi Saurabh, Asha Ambhaikar, "Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security ", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR11120206, Volume 1 Issue 2, November 2012, 62 - 65

30 PDF Views | 32 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Audio Steganography'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 37 - 43

Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis

Aswin.V, Narmadha.V

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 265 - 274

Review on Steganography in Digital Media

Barnali Gupta Banik, Samir K. Bandyopadhyay

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019

Pages: 800 - 805

A Survey on Video Steganography

Angitha John, Anjana Baby

Share this article

Research Paper, Computer Science & Engineering, India, Volume 1 Issue 2, November 2012

Pages: 62 - 65

Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security

Juhi Saurabh, Asha Ambhaikar

Share this article

Similar Articles with Keyword 'LSB'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2024 - 2028

A Review on Various Approaches for Image Steganography

Urvashi, Amninder Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 266 - 270

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal

Share this article

Similar Articles with Keyword 'GA'

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 5, May 2020

Pages: 1472 - 1477

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this article

Similar Articles with Keyword 'HAS'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Similar Articles with Keyword 'HVS'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1434 - 1437

Quality Estimation of Image with Watermark

Firdouz.M

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 434 - 437

Increasing Data Hiding Capacity of Carrier Image Using BPCS Steganography

Vaishali, Abhishek Kajal

Share this article

Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 2178 - 2182

An Overview of Crypto-Compressive Based on Selective Coding

Enas Kh Alamiry, Faisal G. Mohammed

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 278 - 281

Stegano-Cryptographic Technique for Online Polling System

Monalisa Hati

Share this article

Similar Articles with Keyword 'RSA'

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020

Pages: 1365 - 1367

A Survey on Detection of Fake Online Reviews

Dr. Sameena Banu, Asma Shaheen

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1303 - 1305

Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes

N. Laxmi Manasa

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1698 - 1704

Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation

V. Maruvoor Arasi, Carolene

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 590 - 595

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Cauvery Raju

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1289 - 1292

CARV System ? Cryptographic Algorithms Representing Visually System

Pyarimol Nair, Neethu Krishnan

Share this article

Top