DocumentCode :
163860
Title :
Protection augmentation using key replacement in acoustic steganography
Author :
Abinaya, B. ; Sobiyaa, P.
Author_Institution :
Dept. of CSEincrease, P.A. Coll. of Eng. & Technol., Pollachi, India
fYear :
2014
fDate :
8-8 July 2014
Firstpage :
241
Lastpage :
247
Abstract :
Owing to the hurried expansion in the field of the isolated computing in recent years, there is need of ordered protection for the information that is send through a set of systems. To fulfill this need, steganography is used as the one of the planned method to guard the secret message against the eavesdroppers. The implemented method provides one of the techniques of embedding the secret message bits into the audio series. The concept of the proposed method is that synonyms and antonyms of a word, replaces each and every statement of the secret message for a number of iterations and thus provides the raise of complexity. The synonyms and antonyms are again converted to number sequence and are formed into matrix. The matrix is inversed to increase the security. The principle aim is to reduce the distortion that is caused while embedding the covert message into the LSB and MSB audio bits using the replacement technique. The concept of genetic algorithm is used to reduce the distortion caused in the cover audio series and also increases the robustness of the embedded audio sequence. The robustness is provided against the intentional attacks which try to know the embedded secret message and some accidental attacks which try to add some unwanted message into the audio sequence. The main advantage of the proposed technique is to increase the difficulty and robustness of the audio sequence in audio steganography.
Keywords :
audio coding; genetic algorithms; matrix algebra; message authentication; steganography; LSB audio bits; MSB audio bits; accidental attacks; audio sequence; audio steganography; cover audio series; covert message embedding; distortion reduction; embedded audio sequence; embedded secret message; genetic algorithm; intentional attacks; inversed matrix; key replacement; number sequence; protection augmentation; replacement technique; secret message bit embedding techniques; secret message statement; word antonyms; word synonyms; Ciphers; Conferences; Encoding; Encryption; Matrix converters; Robustness; Steganography; antonym genetic algorithm; distortion; synonym;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Current Trends in Engineering and Technology (ICCTET), 2014 2nd International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4799-7986-8
Type :
conf
DOI :
10.1109/ICCTET.2014.6966295
Filename :
6966295
Link To Document :
بازگشت