NORMA eResearch @NCI Library

Secure End to End transmission using Audio Steganography and AES encryption

Gautam, Anurag Chandrabali (2019) Secure End to End transmission using Audio Steganography and AES encryption. Masters thesis, Dublin, National College of Ireland.

[img]
Preview
PDF (Master of Science)
Download (375kB) | Preview
[img]
Preview
PDF (Configuration manual)
Download (282kB) | Preview

Abstract

Steganography refers to data or a document hidden in a digital image, video or audio file. If a person perceives the files in which the data is stored inside, there will be no evidence that any information is concealed. So the person is not going to try to decrypt the data. Mostly, LSB encoding is used to encode the text in the image which is called as Image steganography. But image steganography is susceptible to pixel degrading techniques which allows attacker to degrade the image pixels and recover the secret message. This prototype will act as the secondary secure channel of transmission, when the key of AES encryption is compromised. In this paper, we have implemented the 256-bit AES encryption and image and audio steganography using LSB encoding and DWT. Audio files are less susceptible to attack. We also study the audio steganography with the cryptography method to accomplish the safety.

Item Type: Thesis (Masters)
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science

Q Science > QA Mathematics > Computer software
T Technology > T Technology (General) > Information Technology > Computer software

Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Master of Science in Cyber Security
Depositing User: CAOIMHE NI MHAICIN
Date Deposited: 31 Mar 2020 15:27
Last Modified: 31 Mar 2020 15:27
URI: http://trap.ncirl.ie/id/eprint/4154

Actions (login required)

View Item View Item