Implementation of ISS - IHAS (Information Security System-Information Hiding in Audio Signal) model with reference to proposed e-cipher Method
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 6
Abstract
This paper shows the possibility of exploiting the features of E- cipher method by using both cryptography and Information hiding in Audio signal methods used to send and receive the message in more secured way. Proposed methodology shows that successfully using these Poly substitutions methods (Proposed E-Cipher) for Encode and decodes messages to evolve a new method for Encrypting and decrypting the messages. Embedding secret messages using audio signal in digital format is now the area in focus. There exist numerous steganography techniques for hiding information in audio medium. In our proposed theme, a new model ISS-IHAS - Embedding Text in Audio Signal that embeds the text like the existing system but with strong encryption that gains the full advantages of cryptography. Using steganography it is possible to conceal the full existence of the original text and the results obtained from the proposed model is compared with other existing techniques and proved to be efficient for textual messages of minimum size as the size of the embedded text is essentially same as that of encrypted text size. This emphasis the fact that we are able to ensure secrecy without an additional cost of extra space consumed for the text to be communicated.
Authors and Affiliations
Prof. R. Venkateswaran , Dr. V. Sundaram , Director
WordNet based Implicit Aspect Sentiment Analysis for Crime Identification from Twitter
Crime analysis has become an interesting field that deals with serious public safety issues recognized around the world. Today, investigating Twitter Sentiment Analysis (SA) is a continuing concern within this field. Asp...
Towards a Prototype of a Low-Priced Domestic Incubator with Telemetry System for Premature Babies in Lima, Peru
Complications due to preterm birth are the main factors of death in the group of children with five years of age or less. Hence, a thorough care for these babies is needed especially during the first weeks or months afte...
Fingerprint Gender Classification using Univariate Decision Tree (J48)
Data mining is the process of analyzing data from a different category. This data provide information and data mining will extracts a new knowledge from it and a new useful information is created. Decision tree learning...
Systematic and Integrative Analysis of Proteomic Data using Bioinformatics Tools
The analysis and interpretation of relationships between biological molecules is done with the help of networks. Networks are used ubiquitously throughout biology to represent the relationships between genes and gene pr...
Vietnamese Speech Command Recognition using Recurrent Neural Networks
Voice control is an important function in many mobile devices, in a smart home, especially in providing people with disabilities a convenient way to communicate with the device. Despite many studies on this problem in th...