secure Audio Data Transfer Over Internet Using Steganography

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 01 | Jan -2017

p-ISSN: 2395-0072

www.irjet.net

Secure Audio Data Transfer over Internet Using Steganography Shweta Hallale1, Nikita Gaikwad2, Aayushi Kachole3, Shivanee Kamble4, S.P.Pingat5 (Assistant prof.) Department of Computer Engineering, Smt. Kashibai Navale College of Engineering, Pune, India. ---------------------------------------------------------------------***------------------------------------------------------------------Abstract–– Steganography is an art of hiding information

breaking the password assigned to the system. Thus it is

in a host signal. It is very important to hide the data

very important to design a secure encryption method for

efficiently,

perfect data security. Many public places such as Banking

as

many

attacks

made

on

the

data

communication. The host signal can be an image, speech or

sectors, Share

video and the message signal that is hidden in the host

Educational sectors, IT industries, Government sectors

signal can be a text, image or an audio, video signal. The

and Medical sectors required secured secret data

cryptography concept is used for locking the secret message

transmission. There is much software developed by the

in the cover file. Due to cryptography the secret message

hackers to attack on any secret key (password). It means

will not get decrypted easily. It is related with constructing

only user ID and password are not enough to protect the

and analyzing various methods to overcome the influence of

secret data. The confidential data must be hidden in

third parties. Modern cryptography works in many

encrypted form. There are two types of cryptography

disciplines

and

algorithm. symmetric-key cryptography used for the

electrical engineering. In this paper a symmetric key is

encryption process in which sender and receiver uses the

developed which consists of reshuffling and secret

secret key. Public key cryptography used only for

arrangement of secret data bits in cover image data bits. In

encryption and decryption. There are various types of

this paper the authors have performed the encryption

secret

process on secret speech signal data bits-level to achieve

implementation in software. The secret key cryptography

greater strength of encryption which we have hided inside

schemes are categorized as stream ciphers or block

the cover image. The encryption algorithm applied with

ciphers. The stream ciphers works on single bit or byte at

embedding method is the robust secure method for data

a time and implement some form of feedback mechanism

hiding.

so that the key is constantly changing. A block cipher is

like

mathematics,

computer

science

key

markets,

encryption

different

schemes

Industry

are

sectors,

designed

for

used to encrypts one block of data at a time using the same

Key words: Steganography, Encryption, Secret key generation,Decryption.

key on each block.

1. INTRODUCTION 1.1 Problem Statement In today’s internet world the data transmission should be fast and secured. The secret signal data gets hacked by © 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 996


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
secure Audio Data Transfer Over Internet Using Steganography by IRJET Journal - Issuu