Data Hiding Techniques for an Efficient and Secure Communication |
Author(s): |
Surekha Shrivastava , SSSIST, Sehore; Gajendra Singh Chandel, SSSIST, Sehore; Kailash Patidar, SSSIST, Sehore |
Keywords: |
Image steganography Techniques, Text Steganography Techniques, Spread Spectrum |
Abstract |
Steganography has been in use since the presence of secret messages and this use has gained popularity as the internet became well-liked. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Audio steganography is a young branch of this discipline. An encoding mechanism is used for embedding the message into the audio file. This paper intends to give an overview of audio steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications. |
Other Details |
Paper ID: IJSRDV3I31156 Published in: Volume : 3, Issue : 3 Publication Date: 01/06/2015 Page(s): 1321-1325 |
Article Preview |
|
|