An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer
Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. Steganography is categorized into different types based on the carrier file being used for embedding data. The audio file is focused on hidi...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2019-01-01
|
Series: | Journal of Computer Networks and Communications |
Online Access: | http://dx.doi.org/10.1155/2019/5124364 |
id |
doaj-26391d9782214ee68cc5a42677a59d8c |
---|---|
record_format |
Article |
spelling |
doaj-26391d9782214ee68cc5a42677a59d8c2020-11-25T01:36:37ZengHindawi LimitedJournal of Computer Networks and Communications2090-71412090-715X2019-01-01201910.1155/2019/51243645124364An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory OptimizerRohit Tanwar0Kulvinder Singh1Mazdak Zamani2Amit Verma3Prashant Kumar4University of Petroleum and Energy Studies, Dehradun, IndiaUIET Kurukshetra University, Kurukshetra, IndiaFelician University, Lodi, New Jersey, USAUniversity of Petroleum and Energy Studies, Dehradun, IndiaUniversity of Petroleum and Energy Studies, Dehradun, IndiaBeing easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. Steganography is categorized into different types based on the carrier file being used for embedding data. The audio file is focused on hiding data in this paper. Human has associated an acute degree of sensitivity to additive random noise. An individual is able to detect noise in an audio file as low as one part in 10 million. Given this limitation, it seems that concealing information within audio files would be a pointless exercise. Human auditory system (HAS) experiences an interesting behavior known as masking effect, which says that the threshold of hearing of one type of sound is affected by the presence of another type of sound. Because of this property, it is possible to hide some data inside an audio file without being noticed. In this paper, the research problem for optimizing the audio steganography technique is laid down. In the end, a methodology is proposed that effectively resolves the stated research problem and finally the implementation results are analyzed to ensure the effectiveness of the given solution.http://dx.doi.org/10.1155/2019/5124364 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Rohit Tanwar Kulvinder Singh Mazdak Zamani Amit Verma Prashant Kumar |
spellingShingle |
Rohit Tanwar Kulvinder Singh Mazdak Zamani Amit Verma Prashant Kumar An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer Journal of Computer Networks and Communications |
author_facet |
Rohit Tanwar Kulvinder Singh Mazdak Zamani Amit Verma Prashant Kumar |
author_sort |
Rohit Tanwar |
title |
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer |
title_short |
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer |
title_full |
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer |
title_fullStr |
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer |
title_full_unstemmed |
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer |
title_sort |
optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer |
publisher |
Hindawi Limited |
series |
Journal of Computer Networks and Communications |
issn |
2090-7141 2090-715X |
publishDate |
2019-01-01 |
description |
Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. Steganography is categorized into different types based on the carrier file being used for embedding data. The audio file is focused on hiding data in this paper. Human has associated an acute degree of sensitivity to additive random noise. An individual is able to detect noise in an audio file as low as one part in 10 million. Given this limitation, it seems that concealing information within audio files would be a pointless exercise. Human auditory system (HAS) experiences an interesting behavior known as masking effect, which says that the threshold of hearing of one type of sound is affected by the presence of another type of sound. Because of this property, it is possible to hide some data inside an audio file without being noticed. In this paper, the research problem for optimizing the audio steganography technique is laid down. In the end, a methodology is proposed that effectively resolves the stated research problem and finally the implementation results are analyzed to ensure the effectiveness of the given solution. |
url |
http://dx.doi.org/10.1155/2019/5124364 |
work_keys_str_mv |
AT rohittanwar anoptimizedapproachforsecuredatatransmissionusingspreadspectrumaudiosteganographychaostheoryandsocialimpacttheoryoptimizer AT kulvindersingh anoptimizedapproachforsecuredatatransmissionusingspreadspectrumaudiosteganographychaostheoryandsocialimpacttheoryoptimizer AT mazdakzamani anoptimizedapproachforsecuredatatransmissionusingspreadspectrumaudiosteganographychaostheoryandsocialimpacttheoryoptimizer AT amitverma anoptimizedapproachforsecuredatatransmissionusingspreadspectrumaudiosteganographychaostheoryandsocialimpacttheoryoptimizer AT prashantkumar anoptimizedapproachforsecuredatatransmissionusingspreadspectrumaudiosteganographychaostheoryandsocialimpacttheoryoptimizer AT rohittanwar optimizedapproachforsecuredatatransmissionusingspreadspectrumaudiosteganographychaostheoryandsocialimpacttheoryoptimizer AT kulvindersingh optimizedapproachforsecuredatatransmissionusingspreadspectrumaudiosteganographychaostheoryandsocialimpacttheoryoptimizer AT mazdakzamani optimizedapproachforsecuredatatransmissionusingspreadspectrumaudiosteganographychaostheoryandsocialimpacttheoryoptimizer AT amitverma optimizedapproachforsecuredatatransmissionusingspreadspectrumaudiosteganographychaostheoryandsocialimpacttheoryoptimizer AT prashantkumar optimizedapproachforsecuredatatransmissionusingspreadspectrumaudiosteganographychaostheoryandsocialimpacttheoryoptimizer |
_version_ |
1725061955102703616 |