Audio Steganography for Secure Data Transmission

Authors

  • Kundu N Dept. CST, Central University of Punjab, Bathinda, Punjab, India
  • Kaur A Dept. CST, Central University of Punjab, Bathinda, Punjab, India

Keywords:

Audio Steganography, Encryption, Audio Encryption, Modified LSB, Vigenere Square Encryption Algorithm, LSB Coding, PSNR-Peak signal to noise ratio, MSE-mean square error

Abstract

As the internet growing day by day secure transmission of information is crucial. Steganography and cryptography both techniques provide data confidentiality, integrity and help us to protect data from day by day attacks. Internet communication has become an essential part of infrastructure now a days and also lots of applications are internet based. So the communication made must be secret to avoid attacks. Steganography is a process of hiding the information of secret messages or one can say that it is an art of sending the hidden data or message over a public network. In the proposed approach message is first encrypted through using The Vigenere Square Encryption Algorithm. After those characters of information or data is embedded into deeper layers through modified LSB method. After that further audio transposition encryption technique is used for audio and accuracy for transposition method is measured in terms of MSE.

References

Forouzan B., “Cryptography and Network Security” special Indian Edition 2007, pp-240-330 Tata McGraw-Hill Publishing Company Limited, New Delhi.

Suganya.A, Sharmila.R and Gopinathan.N, "A New Method of Secure Communication with Crystography", International Journal of Computer Sciences and Engineering, Vol.2(4), pp225-228, Apr -2014.

Sangwan N., “Text Encryption with Huffman Compression”, International Journal of Computer Applications (0975 – 8887) Volume 6,pp.54, September 2012.

Ayushi, “A Symmetric Key Cryptographic Algorithm” International Journal of Computer Applications, Vol. 1(15), pp.-34-37, 2010.

Wang H. and Wang S., “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, vol. 47,pp.120-156 no. 10, 2004

Adhiya K. and Patil S., Hiding Text in Audio Using LSB Based Steganography. Information and Knowledge Management, pp.56-98 2012.

Gilani J., and Khalid M. Asad, "”An enhanced least significant bit modification technique for audio steganography”, 2011 International Conference on Computer Networks and Information Technology (ICCNIT)," pp.230-233 ,IEEE, 2011.

Gill M.K. and Randhawa R. K.., "Comparative Study of Multibit LSB Steganography with Cryptography", International Journal of Computer Sciences and Engineering, Vol.3(7), pp.120-123, Jul -2015.

Suri S, Joshi H, Mincoha V. and Tyagi A., "Comparative Analysis of Steganography for Coloured Images", International Journal of Computer Sciences and Engineering, Vol.2(4), pp.180-184, Apr -2014

Bender W. , Gruhl D., "Echo hiding," in proceeding of the 1st Information Hiding Workshop, England, pp. 295-315, 1996.

Shirali-Shahreza S., "Steganography in Silence Intervals of Speech," in , proceedings of the Fourth IEEE International Conference on Intelligent Information Hiding and Multimedia Signal (IIH-MSP 2008), Harbin , china,pp.78-80, 2008.

Gopalan S., "Audio Steganography for Covert Data Transmissionby Imperceptible Tone Insertion," in WOC, Banff , Canada, pp. 8-10,2004.

Tapio S. , Cvejic N., "Increasing The Capacity of LSB-Based Audio Steganography," IEEE, 2002.

Kriti, and Saroha P. , "A variant of LSB steganography for hiding images in audio.," International Journal of Computer Applications, vol.6 , pp. 21-27, 2010.

Shahadi H. and Jidin R., "High capacity and inaudibility audio steganography scheme," in 7th International Conference n Information Assurance and Security (IAS), IEEE, pp-890-899,2011.

Bhasker V., Shiva V. Khan S., "An Optimized Method for Concealing Data using Audio Steganography," International Journal of Computer Applications, pp. 0975-8887, 2011.

Gilani J., Asad A., "Three Layered Model," in International Conference on Emerging, US , pp. 56-78 , 2012.

Ballestero D. and Moreno J., "Highly transparent steganography model of speech signals using Efficient Wavelet Masking," vol. 6 ,pp. 48-56 , 2012.

Katariya V., Patil K., Bankar P., "Audio Steganography using LSB," international Journal of Electronics, vol. 5, pp. 90-92, 2012.

R A.,Al-Anani M., Al-Khalid R. , & Al-Dallah M., "An Efficient technique for data hiding in audio signals.," American Academic & Scholarly Research Journal, vol. 56 , pp. 10-16, 2012.

Galshetwar G.,Jeyakumar A., Mane A., "Data Hiding Technique: Audio Steganography using LSB Technique," International Journal of Engineering Research and Applications, vol. 5, pp. 1123-1125, 2012.

Reddy M. , S.S. Divya, "Hiding Text In Audio Using Multiple LSB Steganography And Provide Security Using Cryptography," International Journal of Scientific &Technology,vol. 4 pp. 68-70, 2012.

Gaidhani C.R., Deshpande V.M. and Bora V.N., "Image Steganography for Message Hiding Using Genetic Algorithm", International Journal of Computer Sciences and Engineering, Vol.2(3), pp.67-70, Mar -2014.

Banerjee S., Rana L., "Dual Layer Randomization in Audio Steganography Using Random Byte Position Encoding," International Journal of Engineering and Innovative Technology, vol. 3,pp. 8, 2013.

John S., B.D, Muruganantham C. and Murthy D., Babu L., "Steganographic Method for Data Hiding in Audio Signals with LSB & DCT," International Journal of Computer Science and Mobile Computing, vol.2, pp. 89-93, August 2013.

Prof. Trivedi.V., Jain M., "Effective Audio Steganography by using Coefficient Comparison in DCT Domain," International Journal of Engineering Research & Technology (IJERT), vol 2 pp. 45-51, 2013.

Nasef M. and Fatma T. , Eid Meligy A., "An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys," I. J. Computer Netwok and Information Security, vol .4, pp. 24-29, 2015.

Bhowmick A., Kishore B., Sinha N., "Encrypted Information Hiding using Audio Steganography and Audio Cryptography," International Journal of Computer Applications, vol. 2 , pp. 0975-8123, 2015.

Downloads

Published

2025-11-11

How to Cite

[1]
N. Kundu and A. Kaur, “Audio Steganography for Secure Data Transmission”, Int. J. Comp. Sci. Eng., vol. 5, no. 2, pp. 124–129, Nov. 2025.

Issue

Section

Research Article