Enhanced Audio LSB Steganography for Secure Communication
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
The ease with which data can be remitted across the globe via Internet has made it an obvious (as medium) choice for on line data transmission and communication. This salient trait, however, is constraint with akin issues of privacy, veracity of the information being exchanged over it, and legitimacy of its sender together with its availability when needed. Although cryptography is being used to confront confidentiality concern yet for many is slightly limited in scope because of discernibility of encrypted information. Further, due to restrictions imposed on the use of cryptography by its citizens for personal doings, various Governments have also coxswained the research arena to explore another discipline of information hiding called steganography – whose sole purpose is to make the information being exchanged inaudible. This research is focused on evolution of model based secure LSB Steganographic scheme for digital audio wave file format to withstand passive attack by Warden Wendy.
Authors and Affiliations
Muhammad Hussain, Khan Rafat
Framework for Disease Outbreak Notification Systems with an Optimized Federation Layer
Data that is needed to detect outbreaks of known and unknown diseases is often gathered from sources that are scattered in many geographical locations. Often these scattered data exist in a wide variety of formats, struc...
Web Service Testing Techniques: A Systematic Literature Review
These days continual demands on loosely coupled systems have web service gives basic necessities to deliver resolution that are adaptable and sufficient to be work at runtime for maintaining the high quality of the syste...
Knowledge Level Assessment in e-Learning Systems Using Machine Learning and User Activity Analysis
Electronic Learning has been one of the foremost trends in education so far. Such importance draws the attention to an important shift in the educational paradigm. Due to the complexity of the evolving paradigm, the pros...
The Phenomenon of Enterprise Systems in Higher Education:Insights From Users
Higher education has been strongly influenced by global trends to adopt new technologies. There has been a call by governments for universities worldwide to improve their performance and efficiency. In response, higher e...
Combating the Looping Behavior: A Result of Routing Layer Attack
Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them a...