Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Efficient Data Hiding System using Cryptography and Steganography

Abikoye Oluwakemi C. , Adewole Kayode S., Oladipupo Ayotunde J. Published in Security

International Journal of Applied Information Systems
Year of Publication: 2012
© 2012 by IJAIS Journal
10.5120/ijais12-450763
Download full text
  1. Abikoye Oluwakemi C., Adewole Kayode S. and Oladipupo Ayotunde J.. Article: Efficient Data Hiding System using Cryptography and Steganography. International Journal of Applied Information Systems 4(11):6-11, December 2012. BibTeX

    @article{key:article,
    	author = "Abikoye Oluwakemi C. and Adewole Kayode S. and Oladipupo Ayotunde J.",
    	title = "Article: Efficient Data Hiding System using Cryptography and Steganography",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 4,
    	number = 11,
    	pages = "6-11",
    	month = "December",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting the confidentiality, integrity and availability of information from unauthorized access. In this paper, a data hiding system that is based on audio steganography and cryptography is proposed to secure data transfer between the source and destination. Audio medium is used for the steganography and a LSB (Least Significant Bit) algorithm is employed to encode the message inside the audio file. The proposed system was evaluated for effectiveness and the result shows that, the encryption and decryption methods used for developing the system make the security of the proposed system more efficient in securing data from unauthorized access. The system is therefore, recommended to be used by the Internet users for establishing a more secure communication.

Reference

  1. Dipti, K. S. and Neha, B. 2010. Proposed System for Data Hiding Using Cryptography and Steganography. International Journal of Computer Applications. 8(9), pp. 7-10. Retrieved 14th August, 2012 from http://www. ijcaonline. org/volume8/number9/pxc3871714. pdf.
  2. Jayaram, P. , Ranganatha, H. R. and Anupama, H. S. 2011. Information Hiding Using Audio Steganography – A Survey. International Journal of Multimedia and Its Application, 3(3), pp. 86-96.
  3. Mark D. G. 2003. Chameleon Image Steganography- Technical Paper. Retrieved 14th July, 2012 from http://faculty. ksu. edu. sa/ghazy/Steg/References/ref13. pdf.
  4. Niels, P. and Peter, H 2003. Hide and Seek: An Introduction to Steganography. IEEE Computer Society. IEEE Security and Privacy, pp. 32-44.
  5. Raphael, A. J. , and Sundaram, V. 2011. Cryptography and Steganography - A Survey. International Journal of Computer Technology Application, 2(3), ISSN: 2229-6093, pp. 626-630.
  6. Simon, B. , Steve M. , and Ray, F. 2005. Object-Oriented Systems Analysis and Design Using UML, (3rd ed. ), McGraw Hill.
  7. Sridevi, R. , Damodaram, A. , and Narasimham, S. 2009. Efficient Method of Audio Steganography By Modified LSB Algorithm and Strong Encryption Key with Enhanced Security. Journal of Theoretical and Applied Information Technology, pp. 768-771. Retrieved 21st August, 2012 from http://www. jatit. org.
  8. Vivek, J. , Lokesh, K. , Madhur, M. S. , Mohd, S. , and Kshitiz Rastogi 2012. Public-Key Steganography Based on Modified LSB Method. Journal of Global Research in Computer Science, 3(4). ISSN: 2229-371X, pp. 26-29.
  9. Domenico, B. and Luca, L. year. Image Based Steganography and Cryptography.
  10. Mohammad, A. A. , and Abdelfatah, A. Y. 2010. Public-Key Steganography Based on Matching Method. European Journal of Scientific Research, 40(2). ISSN: 1450-216X. EuroJournals Publishing, Inc. , pp. 223-231. Retrieved 21st August, 2012 from http://www. eurojournals. com/ejsr. htm.
  11. Sujay, N. and Gaurav, P. 2010. Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions. Signal & Image Processing: An International Journal (SIPIJ), 1(2), pp 60-73.

Keywords

Electronic exchange, cryptography, steganography, Least Significant Bit, algorithm