Review Papers | Electronics & Communication Engineering | India | Volume 5 Issue 3, March 2016
A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images
Pranjali Ihare, V. T. Gaikwad
Abstract: Information security is a major obstacle in different areas like military, network application, are illegally access the information. So, it is very important to hide the secret data efficiently. By means of cryptography we can hide information to be transmitted over network. The cryptography makes the secret message not understood unless the decryption key is available. In this project a symmetric key is introduced which provides secret arrangement of secret signal data bits in cover signal data bits. The encryption process is performed on secret audio signal. File is forwarded from one location to another location in the network. The algorithm used for file encryption provides more security. Cryptography along with the steganography provides perfect security.
Keywords: Cover signal, Cryptography, Encryption, Secret audio signal, Symmetric key
Edition: Volume 5 Issue 3, March 2016,
Pages: 1551 - 1554
How to Cite this Article?
Pranjali Ihare, V. T. Gaikwad, "A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV162187, Volume 5 Issue 3, March 2016, 1551 - 1554
How to Share this Article?
Similar Articles with Keyword 'Cryptography'
Review on Methods of Authentication of Images with Data Repair Capability
Vrushali Chirmade, Dimple Chaudhari
Image Cryptography Based Upon Scrambling and Random Integer
Gurpreet Singh, Lovleen Kaur
Similar Articles with Keyword 'Encryption'
Image Encryption-Then-Compression System Operated in the Prediction Error Domain and Random Permutation
Sujatha D, Venkatakiran S
DPA Resistant AES Using a True Random Based LFSR Technique
Reenu Tomy, Vinoj P.G.
Similar Articles with Keyword 'Symmetric key'
HMAC Based Secure Authentication of VANETs
Swagat. S. Gudagudi, Dr. Veena Desai
Elliptical Curve Cryptography Based Hop-Hop Message Authentication
Similar Articles with Keyword 'Cover'
Planning and Optimization Approach using Genetic Algorithms of a New Generation Cellular Network Capitalizing on the Existing Sites
Raphael Nlend, Emmanuel Tonye
Survey of Seamless Vertical Handoff Schemes for WiFi/WiMAX Heterogeneous Network
Ajmal Mohammed V M, Prapu Premanath, Lalji Cyriac
Similar Articles with Keyword 'signal'
Review on CNN based Sign Language Recognition Methods
Akash Vijayan, Sajeena .A
Design of Efficient Braun Multiplier for Arithmetic Applications