Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis

Aswin.V, Narmadha.V

The voluminous amounts of data that are transmitted through wireless network are majorly constituted by speech signal. In the prevailing environment where in speech data that are critical by its nature in terms of privacy must be protected. This paper would focus on suggesting a novel algorithm based on audio steganography to secure voice and speech related data during transmission in mobile devices. Audio steganography is a method of hiding the secret data in the cover medium by which only the sender and the intended receiver are only able to realize the existence of a secret data. The process of steganography is carried out in cepstral domain and the key is constructed using the Mel-frequency cepstral coefficients. The imperceptibility in hearing is exploited in a way where the data are embedded in low power levels to make the detection more complicated. The generic auto selection of the key members helps in making the critical data's existence highly non vulnerable in the cover medium. Thus the algorithm stands at high tolerance on interception.

Keywords: Mobile Communication, Audio Steganography, Cepstral Analysis, Mel-Frequency Cepstral Coefficients

Edition: Volume 3 Issue 12, December 2014

Pages: 37 - 43

Share this Article

How to Cite this Article?

Aswin.V, Narmadha.V, "Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14242, Volume 3 Issue 12, December 2014, 37 - 43

60 PDF Views | 51 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile Communication'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 498 - 500

Remote Control of Electrical Appliance using Wireless Technology 'GSM'

Sindhuja Alla, B.Kiran Babu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1891 - 1896

M_Commerce Means Mobile Computing

Shraddha C. Belsare, Anjali B. Raut

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2244 - 2248

Privacy in Location-Based Services

Sampada Sarodaya, S. V. Dabhade

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 252 - 255

Post Disaster Relief Operations Communication Using Grid Location Services in Smartphone

D. S. John Deva Prasanna, K. Rajarajan

Share this Article

Similar Articles with Keyword 'Audio Steganography'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 37 - 43

Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis

Aswin.V, Narmadha.V

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 265 - 274

Review on Steganography in Digital Media

Barnali Gupta Banik, Samir K. Bandyopadhyay

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 1 Issue 2, November 2012

Pages: 62 - 65

Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security

Juhi Saurabh, Asha Ambhaikar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019

Pages: 800 - 805

A Survey on Video Steganography

Angitha John, Anjana Baby

Share this Article

Similar Articles with Keyword 'Mel-Frequency Cepstral Coefficients'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 37 - 43

Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis

Aswin.V, Narmadha.V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 144 - 150

Research paper on Automatic Speech Recognition using different Techniques

Vaibhavi Trivedi, Chetan Singadiya

Share this Article
Top