A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Electronics & Communication Engineering | India | Volume 5 Issue 3, March 2016

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Information security is a major obstacle in different areas like military, network application, are illegally access the information. So, it is very important to hide the secret data efficiently. By means of cryptography we can hide information to be transmitted over network. The cryptography makes the secret message not understood unless the decryption key is available. In this project a symmetric key is introduced which provides secret arrangement of secret signal data bits in cover signal data bits. The encryption process is performed on secret audio signal. File is forwarded from one location to another location in the network. The algorithm used for file encryption provides more security. Cryptography along with the steganography provides perfect security.

Keywords: Cover signal, Cryptography, Encryption, Secret audio signal, Symmetric key

Edition: Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

Share this Article

How to Cite this Article?

Pranjali Ihare, V. T. Gaikwad, "A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV162187, Volume 5 Issue 3, March 2016, 1551 - 1554

126 PDF Views | 102 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2142 - 2145

Image Cryptography Based Upon Scrambling and Random Integer

Gurpreet Singh, Lovleen Kaur

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 878 - 884

ASIC Architectures for Implementing ECC Arithmetic over Finite Fields

Hemanth Ravindra, Jalaja S

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1493 - 1496

Skein and Threefish Implementation on FPGA

Litty.P.Oommen, Anas A S

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Share this Article

Similar Articles with Keyword 'Encryption'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1791 - 1793

Image Encryption-Then-Compression System Operated in the Prediction Error Domain and Random Permutation

Sujatha D, Venkatakiran S

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2142 - 2145

Image Cryptography Based Upon Scrambling and Random Integer

Gurpreet Singh, Lovleen Kaur

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1477 - 1481

Design and Implementation of Rijindael?s Encryption and Decryption Algorithm using NIOS-II Processor

Monika U. Jaiswal, Nilesh A. Mohota

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1865 - 1868

DPA Resistant AES Using a True Random Based LFSR Technique

Reenu Tomy, Vinoj P.G.

Share this Article

Informative Article, Electronics & Communication Engineering, India, Volume 7 Issue 4, April 2018

Pages: 1774 - 1776

An Enhanced Approach for Video Encryption using Multilayer and Scrambling through AES Algorithm

Vinay Kumar Soni, Prashant Puri Goswami

Share this Article

Similar Articles with Keyword 'Symmetric key'

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1471 - 1476

HMAC Based Secure Authentication of VANETs

Swagat. S. Gudagudi, Dr. Veena Desai

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2157 - 2160

Elliptical Curve Cryptography Based Hop-Hop Message Authentication

Devi Radhakrishnan

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1504 - 1508

Designing a Model for Energy Efficient and Secured Data Communication Using RSA Algorithm in Wireless Sensor Networks

Sangeeta Patil, Padmapriya Patil

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1062 - 1066

Detect and Correct Single Event Upset of the AES Algorithm in On Board Satellite

Md. Riyaj, Vipin Gupta

Share this Article
Top