Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 421

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.8 / 10


     

Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis

Aswin.V, Narmadha.V


Abstract: The voluminous amounts of data that are transmitted through wireless network are majorly constituted by speech signal. In the prevailing environment where in speech data that are critical by its nature in terms of privacy must be protected. This paper would focus on suggesting a novel algorithm based on audio steganography to secure voice and speech related data during transmission in mobile devices. Audio steganography is a method of hiding the secret data in the cover medium by which only the sender and the intended receiver are only able to realize the existence of a secret data. The process of steganography is carried out in cepstral domain and the key is constructed using the Mel-frequency cepstral coefficients. The imperceptibility in hearing is exploited in a way where the data are embedded in low power levels to make the detection more complicated. The generic auto selection of the key members helps in making the critical data's existence highly non vulnerable in the cover medium. Thus the algorithm stands at high tolerance on interception.


Keywords: Mobile Communication, Audio Steganography, Cepstral Analysis, Mel-Frequency Cepstral Coefficients


Edition: Volume 3 Issue 12, December 2014


Pages: 37 - 43



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Aswin.V, Narmadha.V, "Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 37-43, https://www.ijsr.net/getabstract.php?paperid=SUB14242, DOI: https://www.doi.org/10.21275/SUB14242

Similar Articles

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Downloads: 118

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 265 - 274

Review on Steganography in Digital Media

Barnali Gupta Banik, Samir K. Bandyopadhyay

Share this Article

Downloads: 126

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 144 - 150

Research paper on Automatic Speech Recognition using different Techniques

Vaibhavi Trivedi, Chetan Singadiya

Share this Article

Downloads: 144

Research Paper, Computer Science & Engineering, India, Volume 1 Issue 2, November 2012

Pages: 62 - 65

Audio Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security

Juhi Saurabh, Asha Ambhaikar

Share this Article

Downloads: 147

Survey Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019

Pages: 800 - 805

A Survey on Video Steganography

Angitha John, Anjana Baby

Share this Article
Top