AN ADAPTIVE LOSSLESS IMAGE STEGANOGRAPHIC SCHEME TO CONCEAL AUDIO IN AN IMAGE USING LSB AND KEY VECTOR METHODS
Main Article Content
Abstract
In recent years, innovation of technology and fast internet services make it possible to distribute the information and digital services to the overall world in a simple and cost effective manner. The rapid growth in information technology and digital communication has become very significant to protect the information transmission between sender and receiver. Steganography is the process of embedding original message bits on some carrier file. The carrier file may be text file, image file, audio file or video file etc. If that carrier file is an image file, then that technique is called Image steganography. If color image is used as a carrier file to embed data bits, then that type of steganographic technique is called as color image steganography . Therefore, Steganography introduces a strong way to conceal information and to converse a secret data in an appropriate multimedia carrier file, eg. Image, text, audio and video files. In this paper, an adaptive lossless data hiding technique is presented which is capable of hiding some bits of large size audio wave file binary information into an image using 2 bit LSB method and the remaining bits by generating decimal key vector.
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.