Open Access iconOpen Access

ARTICLE

crossmark

Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography

by Pranati Rakshit1, Sreeparna Ganguly1, Souvik Pal2, Ayman A. Aly3, Dac-Nhuong Le4,5,*

1 JIS College of Engineering, Kalyani, West Bengal, 741235, India
2 Global Institute of Management and Technology, Nadia, West Bengal, 741102, India
3 Department of Mechanical Engineering, College of Engineering, Taif University, Taif, 21944, Saudi Arabia
4 Institute of Research and Development, Duy Tan University, Danang, 550000, Vietnam
5 Faculty of Information Technology, Duy Tan University, Danang, 550000, Vietnam

* Corresponding Author: Dac-Nhuong Le. Email: email

(This article belongs to the Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)

Computers, Materials & Continua 2021, 67(1), 1207-1224. https://doi.org/10.32604/cmc.2021.014293

Abstract

With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security which is nowadays extremely required. The proposed system provides a novel method of information security using the techniques of audio steganography combined with visual cryptography. In this system, we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography. Each of the sub-images is then hidden within individual cover audio files using audio steganographic techniques. The cover audios are then sent to the required destinations where reverse steganography schemes are applied to them to get the incomprehensible component images back. At last, all the sub-images are superimposed to get the actual secret image. This method is very secure as it uses a two-step security mechanism to maintain secrecy. The possibility of interception is less in this technique because one must have each piece of correct sub-image to regenerate the actual secret image. Without superimposing every one of the sub-images meaningful secret images cannot be formed. Audio files are composed of densely packed bits. The high density of data in audio makes it hard for a listener to detect the manipulation due to the proposed time-domain audio steganographic method.

Keywords


Cite This Article

APA Style
Rakshit, P., Ganguly, S., Pal, S., Aly, A.A., Le, D. (2021). Securing technique using pattern-based LSB audio steganography and intensity-based visual cryptography. Computers, Materials & Continua, 67(1), 1207-1224. https://doi.org/10.32604/cmc.2021.014293
Vancouver Style
Rakshit P, Ganguly S, Pal S, Aly AA, Le D. Securing technique using pattern-based LSB audio steganography and intensity-based visual cryptography. Comput Mater Contin. 2021;67(1):1207-1224 https://doi.org/10.32604/cmc.2021.014293
IEEE Style
P. Rakshit, S. Ganguly, S. Pal, A. A. Aly, and D. Le, “Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography,” Comput. Mater. Contin., vol. 67, no. 1, pp. 1207-1224, 2021. https://doi.org/10.32604/cmc.2021.014293



cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 3065

    View

  • 2117

    Download

  • 0

    Like

Share Link