Rate the Article: Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security , IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 144 | Views: 399

Research Paper | Computer Science & Engineering | India | Volume 1 Issue 2, November 2012 | Rating: 6.8 / 10


Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security

Juhi Saurabh, Asha Ambhaikar


Abstract: Audio Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is a method that ensures secured data transfer between parties normally in internet community. Here we present a novel approach for resolving the problems related to the substitution technique of audio steganography. In the first level of security, we use an improved RSA encryption algorithm (RPrime RSA) to encrypt message, which is very complex to break. In the next level, the encrypted message is to be encoded into audio data for this we use a more powerful GA (Genetic Algorithm) based Least Significant Bit) Algorithm. In order to increase the robustness against intentional attacks in which the hackers always try to reveal the hidden message as well as some unintentional attacks such as noise addition, the encrypted message bits are embedded into random LSB layers. Here in order to reduce distortion, GA operators are used. The basic idea behind this paper is maintained randomness in message bit insertion into audio data for hiding the data from hackers and to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safer manner.


Keywords: Audio Steganography, LSB, GA, HAS, HVS, RSA


Edition: Volume 1 Issue 2, November 2012,


Pages: 62 - 65



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top