UGC APPROVED    ISSN 2278-1412

Archive

  Volume 13 | Issue 1

  Volume 13 | Issue 6

  Volume 13 | Issue 5

  Volume 13 | Issue 3

  Volume 12 | Issue 7

  Volume 12 | Issue 5

  Volume 12 | Issue 8

  Volume 12 | Issue 2

  Volume 12 | Issue 12

  Volume 12 | Issue 1

  Volume 12 | Issue 9

  Volume 12 | Issue 3

  Volume 12 | Issue 11

  Volume 12 | Issue 6

  Volume 12 | Issue 4

  Volume 12 | Issue 10

  Volume 11 | Issue 8

  Volume 11 | Issue 1

  Volume 11 | Issue 12

  Volume 11 | Issue 7

  Volume 11 | Issue 10

  Volume 11 | Issue 6

  Volume 11 | Issue 3

  Volume 11 | Issue 11

  Volume 10 | Issue 3

  Volume 10 | Issue 8

  Volume 10 | Issue 6

  Volume 10 | Issue 2

  Volume 10 | Issue 12

  Volume 10 | Issue 1

  Volume 9 | Issue 10

  Volume 8 | Issue 7

  Volume 8 | Issue 11

  Volume 7 | Issue 3

  Volume 7 | Issue 8

  Volume 7 | Issue 1

  Volume 7 | Issue 5

  Volume 7 | Issue 4

  Volume 7 | Issue 2

  Volume 7 | Issue 6

  Volume 7 | Issue 7

  Volume 6 | Issue 5

  Volume 6 | Issue 9

  Volume 6 | Issue 3

  Volume 6 | Issue 6

  Volume 6 | Issue 10

  Volume 6 | Issue 7

  Volume 6 | Issue 1

  Volume 6 | Issue 4

  Volume 6 | Issue 8

  Volume 6 | Issue 2

  Volume 6 | Issue 12

  Volume 5 | Issue 7

  Volume 5 | Issue 2

  Volume 5 | Issue 12

  Volume 5 | Issue 8

  Volume 5 | Issue 3

  Volume 5 | Issue 5

  Volume 5 | Issue 1

  Volume 5 | Issue 9

  Volume 5 | Issue 11

  Volume 5 | Issue 6

  Volume 5 | Issue 4

  Volume 5 | Issue 10

  Volume 4 | Issue 7

  Volume 4 | Issue 4

  Volume 4 | Issue 8

  Volume 4 | Issue 12

  Volume 4 | Issue 10

  Volume 4 | Issue 5

  Volume 4 | Issue 1

  Volume 4 | Issue 6

  Volume 4 | Issue 2

  Volume 3 | Issue 4

  Volume 3 | Issue 10

  Volume 3 | Issue 1

  Volume 3 | Issue 5

  Volume 3 | Issue 2

  Volume 3 | Issue 6

  Volume 3 | Issue 3

  Volume 3 | Issue 8

  Volume 2 | Issue 10

  Volume 2 | Issue 7

  Volume 2 | Issue 11

  Volume 2 | Issue 8

  Volume 2 | Issue 2

  Volume 2 | Issue 9

  Volume 2 | Issue 12

  Volume 1 | Issue 7

  Volume 1 | Issue 1

  Volume 1 | Issue 8

  Volume 1 | Issue 4

  Volume 1 | Issue 2

  Volume 1 | Issue 9

  Volume 1 | Issue 6

  Volume 1 | Issue 3


Current Volume 13 | Issue 07

Title:  Data Hiding Security Using Steganography
Volume:  7 - Issue: 06 - Date: 01-06-2018
Approved ISSN:  2278-1412
Published Id:  IJAECESTU341 |  Page No.: 601-604
Author: Ashish Kumar Narayan
Co- Author: Shilpi Sharma,Shanti Jaiswal
Abstract:-

Steganography may be a technique for hiding data in a host signal. The host signal may be a still image, speech or video and therefore the message signal that's hidden within the host signal can be a text, image or an audio signal. For data hiding in host, discrete wavelate transform (DWT) is used. Perfect audio Steganography technique aim at embedding data in an imperceptible, robust and secure way and so extracting it by authorized people. Hence, up to this point the main challenge in digital audio steganography is to get robust high capacity steganography systems. Leaning towards designing a system that ensures high capacity or robustness and security of embedded data has LED to great diversity within the existing steganography techniques


Key Words:-Audio steganography, DWT, PSNR, LSB, Data Hiding, Digital data security,
Area:-Engineering
DOI Member: 192.81.342
DOI Member: 
Preview This Article

Unable to display PDF file. Download instead.


Download Paper

Downlaod Paper

No. of Download
00031

Impact Factor


7.4

Ijaece

Upcoming Events


Special Issue For Paper


Upcoming Conference


Call For Paper