A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Electronics & Communication Engineering | India | Volume 5 Issue 3, March 2016

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Information security is a major obstacle in different areas like military, network application, are illegally access the information. So, it is very important to hide the secret data efficiently. By means of cryptography we can hide information to be transmitted over network. The cryptography makes the secret message not understood unless the decryption key is available. In this project a symmetric key is introduced which provides secret arrangement of secret signal data bits in cover signal data bits. The encryption process is performed on secret audio signal. File is forwarded from one location to another location in the network. The algorithm used for file encryption provides more security. Cryptography along with the steganography provides perfect security.

Keywords: Cover signal, Cryptography, Encryption, Secret audio signal, Symmetric key

Edition: Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

Share this Article

How to Cite this Article?

Pranjali Ihare, V. T. Gaikwad, "A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV162187, Volume 5 Issue 3, March 2016, 1551 - 1554

72 PDF Views | 58 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2710 - 2713

Secret Hiding Using Visual Cryptography

Rahul Gupta

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 878 - 884

ASIC Architectures for Implementing ECC Arithmetic over Finite Fields

Hemanth Ravindra, Jalaja S

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2338 - 2341

SOC Based Cryptosystem Implementation Using RC4 and IDEA Algorithm

Surekha Pujar, Sleeba Mathew

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2466 - 2469

Data Protection Using Virtual Identity and Modified RSA

Rishin Ali K, Mohammed Aslam V.N

Share this Article

Similar Articles with Keyword 'Encryption'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1791 - 1793

Image Encryption-Then-Compression System Operated in the Prediction Error Domain and Random Permutation

Sujatha D, Venkatakiran S

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 779 - 782

High Speed Advanced Encryption Standard Using Pipelining

Mradul Upadhyay, Utsav Malviya

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1116 - 1120

QR Code Based Data Transmission in Mobile Devices Using AES Encryption

Ajini Asok, Arun G.

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1918 - 1922

Surveillance and High Speed Analysis of Wireless Gigabit Network

Bhavani Sunkara, Rama Krishna Mullapudi

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2080 - 2083

Separable Reversible Data Hiding ? A Review

Suyash Sharma, Jaipal Bisht

Share this Article

Similar Articles with Keyword 'Symmetric key'

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1471 - 1476

HMAC Based Secure Authentication of VANET's

Swagat. S. Gudagudi, Dr. Veena Desai

Share this Article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2157 - 2160

Elliptical Curve Cryptography Based Hop-Hop Message Authentication

Devi Radhakrishnan

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1504 - 1508

Designing a Model for Energy Efficient and Secured Data Communication Using RSA Algorithm in Wireless Sensor Networks

Sangeeta Patil, Padmapriya Patil

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1623 - 1626

Improvement in the Advanced Encryption Standard Algorithm in Term of Low Area and Power Consumption by using FPGA

Umalaxmi Sawant, Venkat Ghodke

Share this Article
Top