Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 180 , Downloads: 142 | CTR: 79 % | Weekly Popularity: ⮙5

Research Paper | Computer Science & Engineering | India | Volume 1 Issue 2, November 2012

Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security

Juhi Saurabh, Asha Ambhaikar

Audio Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is a method that ensures secured data transfer between parties normally in internet community. Here we present a novel approach for resolving the problems related to the substitution technique of audio steganography. In the first level of security, we use an improved RSA encryption algorithm (RPrime RSA) to encrypt message, which is very complex to break. In the next level, the encrypted message is to be encoded into audio data for this we use a more powerful GA (Genetic Algorithm) based Least Significant Bit) Algorithm. In order to increase the robustness against intentional attacks in which the hackers always try to reveal the hidden message as well as some unintentional attacks such as noise addition, the encrypted message bits are embedded into random LSB layers. Here in order to reduce distortion, GA operators are used. The basic idea behind this paper is maintained randomness in message bit insertion into audio data for hiding the data from hackers and to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safer manner.

Keywords: Audio Steganography, LSB, GA, HAS, HVS, RSA

Edition: Volume 1 Issue 2, November 2012

Pages: 62 - 65

Share this Article

How to Cite this Article?

Juhi Saurabh, Asha Ambhaikar, "Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security ", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR11120206, Volume 1 Issue 2, November 2012, 62 - 65

180 PDF Views | 142 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Audio Steganography'

Views: 138 , Downloads: 105 | CTR: 76 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Views: 141 , Downloads: 111 | CTR: 79 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 37 - 43

Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis

Aswin.V, Narmadha.V

Share this Article

Views: 134 , Downloads: 116 | CTR: 87 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 265 - 274

Review on Steganography in Digital Media

Barnali Gupta Banik, Samir K. Bandyopadhyay

Share this Article

Views: 180 , Downloads: 142 | CTR: 79 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 1 Issue 2, November 2012

Pages: 62 - 65

Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security

Juhi Saurabh, Asha Ambhaikar

Share this Article

Views: 178 , Downloads: 145 | CTR: 81 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019

Pages: 800 - 805

A Survey on Video Steganography

Angitha John, Anjana Baby

Share this Article

Similar Articles with Keyword 'LSB'

Views: 132 , Downloads: 103 | CTR: 78 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Views: 138 , Downloads: 105 | CTR: 76 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Views: 123 , Downloads: 105 | CTR: 85 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this Article

Views: 118 , Downloads: 105 | CTR: 89 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Views: 149 , Downloads: 107 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Similar Articles with Keyword 'GA'

Views: 1389 , Downloads: 446 | CTR: 32 % | Weekly Popularity: ⮙31

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Views: 227 , Downloads: 150 | CTR: 66 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Views: 37 , Downloads: 30 | CTR: 81 % | Weekly Popularity: ⮙16

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 34 , Downloads: 31 | CTR: 91 % | Weekly Popularity: ⮙7

Student Project, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1677 - 1680

Detecting Pneumonia from X-Ray Images using Deep Learning

Deep Piyushkumar Patel

Share this Article

Views: 48 , Downloads: 36 | CTR: 75 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Similar Articles with Keyword 'HAS'

Views: 153 , Downloads: 102 | CTR: 67 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Views: 209 , Downloads: 153 | CTR: 73 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Views: 227 , Downloads: 150 | CTR: 66 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Views: 204 , Downloads: 175 | CTR: 86 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 1 , Downloads: 1 | CTR: 100 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 778 - 782

A Helpline Application in COVID-19 Pandemic Situation

G. Muni Venkatesh

Share this Article

Similar Articles with Keyword 'HVS'

Views: 149 , Downloads: 107 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1434 - 1437

Quality Estimation of Image with Watermark

Firdouz.M

Share this Article

Views: 147 , Downloads: 114 | CTR: 78 %

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 434 - 437

Increasing Data Hiding Capacity of Carrier Image Using BPCS Steganography

Vaishali, Abhishek Kajal

Share this Article

Views: 152 , Downloads: 119 | CTR: 78 %

Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 2178 - 2182

An Overview of Crypto-Compressive Based on Selective Coding

Enas Kh Alamiry, Faisal G. Mohammed

Share this Article

Views: 161 , Downloads: 128 | CTR: 80 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 278 - 281

Stegano-Cryptographic Technique for Online Polling System

Monalisa Hati

Share this Article

Similar Articles with Keyword 'RSA'

Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 128 , Downloads: 97 | CTR: 76 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1303 - 1305

Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes

N. Laxmi Manasa

Share this Article

Views: 124 , Downloads: 98 | CTR: 79 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 135 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Views: 130 , Downloads: 100 | CTR: 77 %

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article
Top