A Survey Paper on Audio Security (original) (raw)

Securing audio transmission based on encoding and steganography

Indonesian Journal of Electrical Engineering and Computer Science, 2021

One of the things that must be considered when establishing a data exchange connection is to make that communication confidential and hide the file’s features when the snoopers intercept it. In this work, transformation (encoding) and steganography techniques are invested to produce an efficient system to secure communication for an audio signal by producing an efficient method to transform the signal into a red–green–blue (RGB) image. Subsequently, this image is hidden in a cover audio file by using the least significant bit (LSB) method in the spatial and transform domains using discrete wavelet transform. The audio files of the message and the cover are in *.wav format. The experimental results showed the success of the transformation in concealing audio secret messages, as well the remarkability of the stego signal quality in both techniques. A peak signal-to-noise ratio peak signal-to-noise ratio (PSNR) scored (20-26) dB with wavelet and (81-112) dB with LSB for cover file size...

A Survey on Steganography in Audio

Audio as a cover mediu m in steganography has its own place due to its bigger size compare to other carrier's file like (text, image, etc.). So there are more possibilities to hide large amount of data inside audio as a cover. There are also some inherent characteristics in Hu man Auditory System (HAS), which make it great success in field of Steganogarphy. Dig ital contents are easy to be pirated and to be distributed in today's world. Recently created technology on web increases the rate of data transmission, open new possibilit ies for audio steganography. Digital steganography is based on the fact that artifacts like audio files contain redundant informat ion, so instead of eliminating the redundant information, we replace some of it with other data based on human auditory system. Audio steganography, or information hiding in audio signals, is gaining widespread importance for secure communication of informat ion such as covert battlefield data. On another level, watermarking of audio signals for digital rights management is becoming vital to prevent illegal copying, file sharing, etc. In fact, when co mmunicat ion about highly confidential topics is needed, steganography combined with cryptography would be the most secure way to go. Because the mere existence of an encrypted communication draws attention to it, hiding it in another file ups your security level substantially. In this paper we will take an in-depth look at this technology by introducing the reader to various existent methods of Audio Steganography, its practical applications, what works, what does not, and possible research areas.

A Unique Approach for Data Hiding Using Audio Steganography

2014

The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate rotation because of the significance, accuracy and sensitivity of the information. Steganography and Cryptography are considered as one of the techniques which are used to protect the important information, but both techniques have their pro's and con's. This paper aims to conquer their respective drawbacks and to achieve this we are using a double layer protection technique which is cryptography cum steganography approach.

Analysis & Evaluation of Digital Audio Steganography

Today's internet community the secure data transfer is bounded due to its attack on data communication. Security of data can be achieved by implementing steganography techniques. All of the existing steganographic techniques use the digital multimedia files as a cover medium to conceal secret data. Audio file use as a cover medium in steganography because of its larger size compare to other carrier's file such as text, image. So there are more possibilities to hide large amount of data inside digital audio file. Signals and digital audio files make suitable mediums for steganography because of its high level of redundancy and high data transmission rate. This is not easy to hide data in real time communication audio signals. In this paper we will survey the overall principles of hiding secret data in audio file using audio data hiding techniques, and deliver an overview of present techniques and functions and also discuss the advantages and disadvantages of different types of audio steganography methods. In this paper we have proposed a new method of audio steganography incorporating encryption and pseudorandom sequence as a key. The secret data has been encrypted using RSA and pseudorandom sequence. The encrypted data is then embedded in the audio signals. The use of the pseudorandom sequence increases the complexity of the encryption and the RSA algorithm gives a very tight cipher design.

A Study on Current Scenario of Audio Encryption

International Journal of Computer Applications

Cryptography is the backbone for secure communication over networks. The rapid growth of digital data and its security raises the concern for developing more advanced techniques in cryptography. Cryptography is the physical process that scrambles the information by rearrangement and substitution of content, making it unreadable to anyone except the person capable of unscrambling it. Whereas the techniques used for deciphering a message without any knowledge of enciphering is called as Cryptanalysis i.e., "breaking the code". Now cryptography is not limited to only text data. Algorithms are also there for different data like image, audio, video etc. Throughputs, Speed, CPU time, Battery power, memory requirement are few parameters on which cryptographic algorithms are analyzed. In the present paper analysis of some common algorithms like DES, 3DES, AES, Blowfish, Twofish, ThreeFish, RC4 and RC6 are conducted on the above parameters to find out a best solution. This paper provides a comprehensive introduction about some of the existing cryptographic techniques and their performance for all data types particularly audio files.

Audio Watermarking Schemes: A Comparative Analysis

International Journal of Engineering Technology and Management Sciences, 2020

The growth of internet and its reachability to all sectors of people have never been greater. Internet has become the best marketplace, the best library and may be the best guide for everything. But this revolution comes with some bigger problems. One of the most challenging problems among them would be copyright protection of digital data being transferred over internet. Digital images, videos and audios undergo illegal re-production and re-distributions, tampering and other acts of copyright violation. This is proved to have leading the film and other prominent industries to loss of millions of dollars per year. Encrypting the data provides security to it. In this case only people who pay to buy the secret key that should be used for decryption can use the data. But the problem is that once decrypted, the data can be reproduced into any number of copies and can be re-distributed without any permission from the author. Watermarking is an intelligent solution for this problem where ...

Comparative Analysis of Encryption and Decryption Algorithms for Audio

The use of the web exceeds day by day. Information security is a challenging issue in today's hi-tech world. Cryptography plays a main role within the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks. In this study is made for the cryptography algorithms, particularly algorithms-AES, DES, 3DES, RC4,RC6, RSA, Blowfish, MUGI, ARIA, Salsa20 and Serpent are compared and performance is evaluated. This paper chiefly focuses on encryption techniques for audio knowledge. This presents a study and comparison of basic encoding standards and a literature survey of encryption technique that used for encoding on audio data. Comparing between symmetric and asymmetric cryptography, symmetric cryptographic techniques take less time than asymmetric technique.

IJERT-Three Layered Model for Audio Steganography for Secured Data Transfer

International Journal of Engineering Research and Technology (IJERT), 2014

https://www.ijert.org/three-layered-model-for-audio-steganography-for-secured-data-transfer https://www.ijert.org/research/three-layered-model-for-audio-steganography-for-secured-data-transfer-IJERTV3IS110148.pdf Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdroppers. A technique for secure transmission of messages called Steganography, which send the messages in such a way that existence of the message is concealed. Audio Steganography is the scheme of hiding the existence of secret information by concealing it into an audio file. In this paper ,a novel technique which uses audio file as carrier to hide the secret information following Three Layered Model. The goal of this paper is to achieve highly secure data transmission to ensure confidentiality. The three Layers for increasing the security are : Encoding , Double Encryption and Embedding using Enhanced LSB Modification Technique. Two powerful algorithms are fused to double the level of Security. The data is embedded up to 3 LSBs. The roposed technique has been tested successfully on different .wav files. A performance analysis is carried out based on the parameters including Capacity, Transparency and Robustness.

A Novel Technique for Secure Data Transmission using Audio/Video Files

International Journal of Engineering Research and, 2015

With the advancement of digital technology around the world through the internet data security has become a fundamental need of mankind. In order to fulfil the need, combination of cryptography and steganography is used. In this paper, we propose a highly secure data transmission system which employs these two techniques for audio files. A robust communication system is designed in such a way that it provides confidentiality, integrity, availability of network and security of data from malicious attacks. Cryptography is achieved by DES algorithm which scrambles a message so that it cannot be understood whereas LSB algorithm is employed in steganography which hides the message so that it cannot be seen. The simulation results show that the proposed system displays two level of security.