{"title":"基于隐写术的安全应用数据隐藏","authors":"G. Ramya, P. Janarthanan, D. Mohanapriya","doi":"10.1109/I2C2SW45816.2018.8997153","DOIUrl":null,"url":null,"abstract":"Steganography is an art of sending hidden data or secret messages over a public channel so that a third party cannot detect the presence of the secret message. It is used widely in banking, military applications, E-commerce and so on because in it transmissions of information are more secure. In the current paper, the data are hidden in two stages. First, the data are hidden within an image and the image is further hidden in an audio file. For data hiding in image and image hiding in audio, Least Significant Bit (LSB) algorithm is used. In order to overcome security threats and to equip the data with high security, binary values of the data are hidden in different locations on the last three bits. The audio file selected may be a .WAV or .AIFF files. If the binary value of image is hidden in the last bit, the execution time is more. To reduce it, the binary value of the image is hidden in the last two bits of an audio file, so that the processing speed gets increased while execution time gets reduced. For security applications, the execution time should be less. Thus, the paper meets the security requirement and it can be used for military applications.","PeriodicalId":212347,"journal":{"name":"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Steganography Based Data Hiding for Security Applications\",\"authors\":\"G. Ramya, P. Janarthanan, D. Mohanapriya\",\"doi\":\"10.1109/I2C2SW45816.2018.8997153\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography is an art of sending hidden data or secret messages over a public channel so that a third party cannot detect the presence of the secret message. It is used widely in banking, military applications, E-commerce and so on because in it transmissions of information are more secure. In the current paper, the data are hidden in two stages. First, the data are hidden within an image and the image is further hidden in an audio file. For data hiding in image and image hiding in audio, Least Significant Bit (LSB) algorithm is used. In order to overcome security threats and to equip the data with high security, binary values of the data are hidden in different locations on the last three bits. The audio file selected may be a .WAV or .AIFF files. If the binary value of image is hidden in the last bit, the execution time is more. To reduce it, the binary value of the image is hidden in the last two bits of an audio file, so that the processing speed gets increased while execution time gets reduced. For security applications, the execution time should be less. Thus, the paper meets the security requirement and it can be used for military applications.\",\"PeriodicalId\":212347,\"journal\":{\"name\":\"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I2C2SW45816.2018.8997153\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I2C2SW45816.2018.8997153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Steganography Based Data Hiding for Security Applications
Steganography is an art of sending hidden data or secret messages over a public channel so that a third party cannot detect the presence of the secret message. It is used widely in banking, military applications, E-commerce and so on because in it transmissions of information are more secure. In the current paper, the data are hidden in two stages. First, the data are hidden within an image and the image is further hidden in an audio file. For data hiding in image and image hiding in audio, Least Significant Bit (LSB) algorithm is used. In order to overcome security threats and to equip the data with high security, binary values of the data are hidden in different locations on the last three bits. The audio file selected may be a .WAV or .AIFF files. If the binary value of image is hidden in the last bit, the execution time is more. To reduce it, the binary value of the image is hidden in the last two bits of an audio file, so that the processing speed gets increased while execution time gets reduced. For security applications, the execution time should be less. Thus, the paper meets the security requirement and it can be used for military applications.