Views: 180 , Downloads: 142 | CTR: 79 % | Weekly Popularity: ⮙5
Research Paper | Computer Science & Engineering | India | Volume 1 Issue 2, November 2012
Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security
Juhi Saurabh, Asha Ambhaikar
Audio Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is a method that ensures secured data transfer between parties normally in internet community. Here we present a novel approach for resolving the problems related to the substitution technique of audio steganography. In the first level of security, we use an improved RSA encryption algorithm (RPrime RSA) to encrypt message, which is very complex to break. In the next level, the encrypted message is to be encoded into audio data for this we use a more powerful GA (Genetic Algorithm) based Least Significant Bit) Algorithm. In order to increase the robustness against intentional attacks in which the hackers always try to reveal the hidden message as well as some unintentional attacks such as noise addition, the encrypted message bits are embedded into random LSB layers. Here in order to reduce distortion, GA operators are used. The basic idea behind this paper is maintained randomness in message bit insertion into audio data for hiding the data from hackers and to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safer manner.
Keywords: Audio Steganography, LSB, GA, HAS, HVS, RSA
Edition: Volume 1 Issue 2, November 2012
Pages: 62 - 65
How to Cite this Article?
Juhi Saurabh, Asha Ambhaikar, "Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security ", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR11120206, Volume 1 Issue 2, November 2012, 62 - 65
180 PDF Views | 142 PDF Downloads
Similar Articles with Keyword 'Audio Steganography'
Views: 138 , Downloads: 105 | CTR: 76 % | Weekly Popularity: ⮙4
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1537 - 1542A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
Views: 141 , Downloads: 111 | CTR: 79 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 37 - 43Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis
Aswin.V, Narmadha.V
Views: 134 , Downloads: 116 | CTR: 87 % | Weekly Popularity: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 265 - 274Review on Steganography in Digital Media
Barnali Gupta Banik, Samir K. Bandyopadhyay
Views: 180 , Downloads: 142 | CTR: 79 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 1 Issue 2, November 2012
Pages: 62 - 65Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security
Juhi Saurabh, Asha Ambhaikar
Views: 178 , Downloads: 145 | CTR: 81 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019
Pages: 800 - 805A Survey on Video Steganography
Angitha John, Anjana Baby
Similar Articles with Keyword 'LSB'
Views: 132 , Downloads: 103 | CTR: 78 % | Weekly Popularity: ⮙4
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1062 - 1064Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Devashri Anil Vyawahare, Prof. Anil Gujar
Views: 138 , Downloads: 105 | CTR: 76 % | Weekly Popularity: ⮙4
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1537 - 1542A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
Views: 123 , Downloads: 105 | CTR: 85 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1976 - 1979Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method
Ekata S. Bele, Chetan Bawankar
Views: 118 , Downloads: 105 | CTR: 89 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016
Pages: 1654 - 1660An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key
Zainalabideen Abdullsamd Rasheed
Views: 149 , Downloads: 107 | CTR: 72 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
Similar Articles with Keyword 'GA'
Views: 1389 , Downloads: 446 | CTR: 32 % | Weekly Popularity: ⮙31
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Views: 227 , Downloads: 150 | CTR: 66 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Views: 37 , Downloads: 30 | CTR: 81 % | Weekly Popularity: ⮙16
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Views: 34 , Downloads: 31 | CTR: 91 % | Weekly Popularity: ⮙7
Student Project, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021
Pages: 1677 - 1680Detecting Pneumonia from X-Ray Images using Deep Learning
Deep Piyushkumar Patel
Views: 48 , Downloads: 36 | CTR: 75 % | Weekly Popularity: ⮙3
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1789 - 1791The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence
Vina Lomte, Saloni Shah
Similar Articles with Keyword 'HAS'
Views: 153 , Downloads: 102 | CTR: 67 % | Weekly Popularity: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Views: 209 , Downloads: 153 | CTR: 73 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 338 - 384Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm
Dr. Niju P. Joseph, Dr. Priyanka Surendran
Views: 227 , Downloads: 150 | CTR: 66 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Views: 204 , Downloads: 175 | CTR: 86 % | Weekly Popularity: ⮙3
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Views: 1 , Downloads: 1 | CTR: 100 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021
Pages: 778 - 782A Helpline Application in COVID-19 Pandemic Situation
G. Muni Venkatesh
Similar Articles with Keyword 'HVS'
Views: 149 , Downloads: 107 | CTR: 72 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1434 - 1437Quality Estimation of Image with Watermark
Firdouz.M
Views: 147 , Downloads: 114 | CTR: 78 %
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 434 - 437Increasing Data Hiding Capacity of Carrier Image Using BPCS Steganography
Vaishali, Abhishek Kajal
Views: 152 , Downloads: 119 | CTR: 78 %
Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017
Pages: 2178 - 2182An Overview of Crypto-Compressive Based on Selective Coding
Enas Kh Alamiry, Faisal G. Mohammed
Views: 161 , Downloads: 128 | CTR: 80 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 278 - 281Stegano-Cryptographic Technique for Online Polling System
Monalisa Hati
Similar Articles with Keyword 'RSA'
Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Views: 128 , Downloads: 97 | CTR: 76 % | Weekly Popularity: ⮙4
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1303 - 1305Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes
N. Laxmi Manasa
Views: 124 , Downloads: 98 | CTR: 79 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Views: 135 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 759 - 761Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website
Phani K. Cheruku, Atul Kumar
Views: 130 , Downloads: 100 | CTR: 77 %
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.