Audio Steganography and Security Using Cryptography

  • Kapadia H
  • Haribau H
  • Patil H
  • 15


    Mendeley users who have this article in their library.
  • N/A


    Citations of this article.


-Security is as strong as the weakest link. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. This paper presents the technique for the above requirement. In the proposed method, we use Steganography technique where secret message is embedded within a carrier audio file and the existence of message is hidden from the intruder. To prevent disclosure of contents of the covered file cryptography RSA algorithm is used with Steganography to enhance the robustness of the system. In practice RSA public and private exponents are chosen to be very large this makes decryption slow. One way to speed things up is by using Chinese Remainder Theorem which focuses on modulus calculation. This paper proposes a faster RSA-CRT algorithm for decryption of data. Differing from other approaches which try to detect embedded data or perform time consuming computations as part of their process we focus on a comprehensive Steganographic prevention which works in real time on any audio data. In order to testify our system we propose different attacks on the stegno embedded file which justifies the robustness of our system.

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

There are no full text links


  • Harshita Kapadia

  • Harawane Sneha Haribau

  • Harsha Patil

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free