Title :
A double layered additive space sequenced Audio Steganography Technique for mobile network
Author :
Ghosh, Sudip ; De, Debashis ; Kandar, D.
Author_Institution :
Dept. of Comput. Sci. & Eng., West Bengal Univ. of Technol., Kolkata, India
Abstract :
This paper presents a double layered secure data transfer technique using Cryptography and Audio Steganography for mobile network. Firstly, the characters of secret text message are converted to bit values and are encrypted by XOR operation using a Symmetric key. Then using a secret key-box, it is again scrambled and then divided into 2bit blocks. These blocks from MSB are replaced by the Left Significant two bits of each byte of cover audio bit stream. The main trick for this steganography method hides behind logic of selecting the next byte of the cover audio. And additive method with a key constraint is used as the proposed algorithm. After replacing by the secret bit blocks, the byte of the cover audio is divided into two nibbles and added overlooking the carry and is converted to decimal values. The second and third bits are taken together and the decimal value is considered as key constraint. Both the values are added and next byte is chose after counting that numbers of byte positions. The technique presented in this paper has overcome many of the limitations like selection of secret text size and cover audio format, noise removal etc. that helps the user to transfer data through mobile network in a more secured and efficient way.
Keywords :
audio signal processing; cryptography; mobile radio; steganography; XOR operation; audio bit stream; cover audio format; cryptography; double layered additive space sequenced audio steganography technique; double layered secure data transfer technique; mobile network; noise removal; secret bit blocks; secret key-box; secret text message; secret text size; symmetric key; Additives; Ciphers; Encryption; Media; Mobile communication; Mobile computing; Additive; Audio; Byte; Cryptography; LSB; Look Ahead Carry; MSB; Steganography; secret key;
Conference_Titel :
Radar, Communication and Computing (ICRCC), 2012 International Conference on
Conference_Location :
Tiruvannamalai
Print_ISBN :
978-1-4673-2756-5
DOI :
10.1109/ICRCC.2012.6450542