International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis

Aswin.V, Narmadha.V

The voluminous amounts of data that are transmitted through wireless network are majorly constituted by speech signal. In the prevailing environment where in speech data that are critical by its nature in terms of privacy must be protected. This paper would focus on suggesting a novel algorithm based on audio steganography to secure voice and speech related data during transmission in mobile devices. Audio steganography is a method of hiding the secret data in the cover medium by which only the sender and the intended receiver are only able to realize the existence of a secret data. The process of steganography is carried out in cepstral domain and the key is constructed using the Mel-frequency cepstral coefficients. The imperceptibility in hearing is exploited in a way where the data are embedded in low power levels to make the detection more complicated. The generic auto selection of the key members helps in making the critical data's existence highly non vulnerable in the cover medium. Thus the algorithm stands at high tolerance on interception.

Keywords: Mobile Communication, Audio Steganography, Cepstral Analysis, Mel-Frequency Cepstral Coefficients

Edition: Volume 3 Issue 12, December 2014

Pages: 37 - 43


How to Cite this Article?

Aswin.V, Narmadha.V, "Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14242, Volume 3 Issue 12, December 2014, 37 - 43

23 PDF Views | 15 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile Communication'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 37 - 43

Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis

Aswin.V, Narmadha.V

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1891 - 1896

M_Commerce Means Mobile Computing

Shraddha C. Belsare, Anjali B. Raut

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2244 - 2248

Privacy in Location-Based Services

Sampada Sarodaya, S. V. Dabhade

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2533 - 2535

Overview on Effective Controlling Via Store-Carry and Forward Scheme in Mobile Communication

Anusha Varghese, Dr. K Deeba

Share this article

Similar Articles with Keyword 'Audio Steganography'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 37 - 43

Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis

Aswin.V, Narmadha.V

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 265 - 274

Review on Steganography in Digital Media

Barnali Gupta Banik, Samir K. Bandyopadhyay

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019

Pages: 800 - 805

A Survey on Video Steganography

Angitha John, Anjana Baby

Share this article

Research Paper, Computer Science & Engineering, India, Volume 1 Issue 2, November 2012

Pages: 62 - 65

Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security

Juhi Saurabh, Asha Ambhaikar

Share this article

Similar Articles with Keyword 'Mel-Frequency Cepstral Coefficients'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 37 - 43

Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis

Aswin.V, Narmadha.V

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 144 - 150

Research paper on Automatic Speech Recognition using different Techniques

Vaibhavi Trivedi, Chetan Singadiya

Share this article

Top