International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017
p-ISSN: 2395-0072
www.irjet.net
Secure Audio Data Transfer over Internet Using Steganography Shweta Hallale1, Nikita Gaikwad2, Aayushi Kachole3, Shivanee Kamble4, S.P.Pingat5 (Assistant prof.) Department of Computer Engineering, Smt. Kashibai Navale College of Engineering, Pune, India. ---------------------------------------------------------------------***------------------------------------------------------------------Abstract–– Steganography is an art of hiding information
breaking the password assigned to the system. Thus it is
in a host signal. It is very important to hide the data
very important to design a secure encryption method for
efficiently,
perfect data security. Many public places such as Banking
as
many
attacks
made
on
the
data
communication. The host signal can be an image, speech or
sectors, Share
video and the message signal that is hidden in the host
Educational sectors, IT industries, Government sectors
signal can be a text, image or an audio, video signal. The
and Medical sectors required secured secret data
cryptography concept is used for locking the secret message
transmission. There is much software developed by the
in the cover file. Due to cryptography the secret message
hackers to attack on any secret key (password). It means
will not get decrypted easily. It is related with constructing
only user ID and password are not enough to protect the
and analyzing various methods to overcome the influence of
secret data. The confidential data must be hidden in
third parties. Modern cryptography works in many
encrypted form. There are two types of cryptography
disciplines
and
algorithm. symmetric-key cryptography used for the
electrical engineering. In this paper a symmetric key is
encryption process in which sender and receiver uses the
developed which consists of reshuffling and secret
secret key. Public key cryptography used only for
arrangement of secret data bits in cover image data bits. In
encryption and decryption. There are various types of
this paper the authors have performed the encryption
secret
process on secret speech signal data bits-level to achieve
implementation in software. The secret key cryptography
greater strength of encryption which we have hided inside
schemes are categorized as stream ciphers or block
the cover image. The encryption algorithm applied with
ciphers. The stream ciphers works on single bit or byte at
embedding method is the robust secure method for data
a time and implement some form of feedback mechanism
hiding.
so that the key is constantly changing. A block cipher is
like
mathematics,
computer
science
key
markets,
encryption
different
schemes
Industry
are
sectors,
designed
for
used to encrypts one block of data at a time using the same
Key words: Steganography, Encryption, Secret key generation,Decryption.
key on each block.
1. INTRODUCTION 1.1 Problem Statement In today’s internet world the data transmission should be fast and secured. The secret signal data gets hacked by © 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 996