Using this approach you can hide a byte every eight bytes of the cover. In computing, the least significant bit (LSB) is the bit position in a binary integer contributing the unit’s value, that is, controlling whether the number is even or odd. That’s usually an effective approach in cases where the LSB substitution doesn’t cause significant quality degradation, such as in 24-bit bitmaps. LSB (Least Significant Bit) approach is very famous approach and it replaces the least significant bit in some bytes of the cover file to conceal a sequence of bytes enclosing the hidden data. Mike Stevens, information and data security training expert explains that there have been many approaches of hiding confidential information or messages in audio in such a manner that the changes made to the audio file are not visible. To insert the confidential information in the cover file, the redundant bits in the cover file are interchanged by the bits of the confidential information. Redundant bits are that bits that can he modified without corrupting the eminence or destroying the integrity of the cover-file. Identification of redundant bits in the cover-file. The confidential information hiding procedure consists of subsequent two steps The cover-file with the confidential information is also called as a stego-file. The Password is also called as a stego-key, and it assures that only the receiver who knows the password will be able to extract the confidential information or message from a the cover-file. The Message can be image, plain text, audio or any type of file. Essentially, in steganography the message is the information that the sender desires to remain confidential. The Carrier file is also called as a cover-file, which hides the confidential information. ![]() The essential technique of audio steganography consists of a Carrier (Audio file), a Message and a Password. If a steganography technique causes someone to believe there is hidden information in a carrier medium, then the technique has botched. Steganography not only prevents people from knowing about the hidden confidential information, but it also prevents others from thinking that somebody is communicating in a hidden way. The main objective of steganography is to converse securely in a completely invisible mode and to draw away curiosity from the communication of the hidden information. Confidential information is encoded in a way so that the very existence of the information is hidden. Steganography is the science of hiding confidential information in a cover file so that only the dispatcher and the recipient know the existence of the confidential information. We are going to talk about confidential information hiding with the help of information and data security solutions experts. Terrorists organizations have been using audio data hiding since a long time to keep their communications secret and to organize attacks. This is not only used in the commercial sector, it can also be used in the non-commercial sector to hide data that someone wants to keep private. In the corporate world, audio data hiding can be used to hide and secure confidential chemical formulas or designs of a new invention. There are many reasons to hide information but the most common one is to protect it from unauthorized access and to prevent people from finding out the existence of secret information.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |