Open Access Open Access  Restricted Access Subscription or Fee Access

Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography

Tarun Dhar Diwan, Aaqib Rshid, Vinay Sahu


In this paper, the proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points The first to employ hidden communications techniques -with radio transmissions- were the armies, because of the strategic importance of secure communication and the need to conceal the source as much as possible. Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This problem has become more and more important just in these days, with which around thirty of the major - with respect to technology - countries in the world methods are discussed and analyzed based on the ratio between the number of the identical and the non identical bits between the pixel color values and the secret message values This property is used for proposed image encryption and for steganography to increase the security level of the encoded image and to make it less visible.


Surveillance Information, Segmenting, Object Tracking, Significant Percentage, Auto-Calibration.

Full Text:



Xinpeng Zhang ]ieee signal processing letters, VOL. 18, NO. 4, APRIL 2011 255 Reversible Data Hiding in Encrypted Image.

M. Naor, and A. Shamir,Visual Cryptography Advances in Cryptology – Eurocrypt„94 Proceeding, LNCS Vol. 950, Springer-Verlag,1995, pp. 1-12.

Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999

Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM,47:10, October 2004

Anderson, R.J. & Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areasin Communications, May 1998

Marvel, L.M., Boncelet Jr., C.G. & Retter, C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, 8:08, 1999

Dunbar, B., “Steganographic techniques and their use in an Open-Systems environment”, SANSInstitute, January 2002

Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001

Simmons, G., “The prisoners problem and the subliminal channel”, CRYPTO, 1983

Chandramouli, R., Kharrazi, M. & Memon, N., “Image steganography and steganalysis: Concepts and Practice”, Proceedings of the 2nd International Workshop on Digital Watermarking, October 2003

M. Naor, and A. Shamir, ―Visual Cryptography‖,dvances in Cryptology – Eurocrypt„94 Proceeding ,LNCS Vol. 950, Springer-Verlag, 1995, pp. 1-12.

M. Naor and A. Shamir, ―Visual Cryptography II: Improving the Contrast Via the Cover Base, Cambridge Workshop on Protocols, 1996.

“An Authentication Server in Java Implementation of an Encryption”, Framework Model and DES Algorithm in Java Leandro Batista de Almeida, Walter Godoy Jr., Jotio Luiz Kovaleski , 0-7803-5030-8/98/$10.00 1998 IEEE.

“Efficient Method Of Audio Steganography By Modified Lsb Algorithm And Strong Encryption Key With Enhanced Security”, 1r Sridevi, 2dr. A Damodaram, 3dr. Svl.Narasimham, Journal of Theoretical and Applied Information Technology © 2005 - 2009 JATIT.

“Introduction to MATLAB-7 for Engineers”, Palm, William J, Mc Graw Hill, 2005.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.