Data Hiding Behind Audio and Video

Authors

  • Rupali Kate Computer, AISSMS IOIT
  • Amruta Badgujar Computer, AISSMS IOIT
  • Aditya Nemade Computer, AISSMS IOIT

Keywords:

Security, encryption, decryption, private key, public key

Abstract

Data encryption is an essential topic now a days due tremendous amount of hacking. The previous systems
hid the data or relevant information behind audio and video files. We provide the similar way but differ in working and
providing output. The previous versions had a distorted audio and video files which made the hackers easily hack the
files. We are using the combination of various algorithms mainly RSA, DES, Triple DES for providing encryption
security. Also the files we are targeting are all types of audio as well as video files for the cover whereas the hidden files
can be of the format pdf, text, audio, video or message. The encryption will take place per frame. This forensics in
computer will help keep secret information

Published

2022-08-23

How to Cite

Data Hiding Behind Audio and Video. (2022). International Journal of Advance Engineering and Research Development (IJAERD), 3(13), -. https://ijaerd.org/index.php/IJAERD/article/view/5840

Similar Articles

1-10 of 1032

You may also start an advanced similarity search for this article.