Implementation of ETAS (Embedding Text in Audio Signal) Model to Ensure Secrecy
نویسنده
چکیده
Steganography is the art of hiding information that evolves as a new secret communication technology. For a long period time, information hiding was done using plain text, still images, video and IP datagram. Embedding secret messages using audio signal in digital format is now the area of focus. There exists numerous steganography techniques for hiding information in audio medium. In this work we propose a new model ETAS Embedding Text in Audio Signal that embeds the text like the existing system but with encryption that gains the full advantages of cryptography. Using steganography it is possible to conceal the full existence of the original text and the results obtained from the proposed model is compared with other existing techniques and proved to be efficient for textual messages of size beyond 12 KB as the size of the embedded text is approximately same as that of encrypted text size. This emphasis the fact that we are able to ensure secrecy without an additional cost of extra space consumed for the text to be communicated. Keywords— Steganography, Audio data hiding, ETAS, cryptography, cover media.
منابع مشابه
Implementation of ISS - IHAS (Information Security System – Information Hiding in Audio Signal) model with reference to proposed e-cipher Method
This paper shows the possibility of exploiting the features of Ecipher method by using both cryptography and Information hiding in Audio signal methods used to send and receive the message in more secured way. Proposed methodology shows that successfully using these Poly substitutions methods (Proposed E-Cipher) for Encode and decodes messages to evolve a new method for Encrypting and decryptin...
متن کاملSecrecy of Communications in Data Transmission by Impulses with Unknown Moments of Appearance and Disappearance
We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...
متن کاملA Joint Semantic Vector Representation Model for Text Clustering and Classification
Text clustering and classification are two main tasks of text mining. Feature selection plays the key role in the quality of the clustering and classification results. Although word-based features such as term frequency-inverse document frequency (TF-IDF) vectors have been widely used in different applications, their shortcoming in capturing semantic concepts of text motivated researches to use...
متن کاملA New Document Embedding Method for News Classification
Abstract- Text classification is one of the main tasks of natural language processing (NLP). In this task, documents are classified into pre-defined categories. There is lots of news spreading on the web. A text classifier can categorize news automatically and this facilitates and accelerates access to the news. The first step in text classification is to represent documents in a suitable way t...
متن کاملImplementation of the direction of arrival estimation algorithms by means of GPU-parallel processing in the Kuda environment (Research Article)
Direction-of-arrival (DOA) estimation of audio signals is critical in different areas, including electronic war, sonar, etc. The beamforming methods like Minimum Variance Distortionless Response (MVDR), Delay-and-Sum (DAS), and subspace-based Multiple Signal Classification (MUSIC) are the most known DOA estimation techniques. The mentioned methods have high computational complexity. Hence using...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010