You are on page 1of 1

CHAPTER 9: CONCLUSION

In past few years Audio Steganography was little renowned but in recent years it is getting
popularity and many techniques were proposed for secure communication. Novel approaches
were used for improvement of existing system. There is still many more to explore in the field of
security. Improved results are better tested by experiments and observations using different
signal processing tools. Audio Steganography method proposed in this thesis focus on to improve
the systems robustness. How secure system is can be ensured by using embedding key. Only
sending information via communication channel and obtaining it at receiver end is not part of
communication. For better covert communication information need to be secured using
embedding algorithm.
In recent researches new steganographic techniques have been implemented. Easy availability of
audio signal as carrier is key factor for selecting it as choice. To preserve integrity of data Audio
steganography method in voice communication has proved better outcomes. Application areas of
audio steganography includes data privacy, copyright protection, finger printing, in audio and
video authentication and voice communication. Audio Steganography technique is sophisticated
method in the field of information security.
A method using the concept of LSB (Low bit encoding) and DWT is proposed with embedding
key generation algorithm to enhance further quality of system. Meanwhile there are many
challenges faced during problem formulation. Such as taking proper audio signal of particular
size such that it can covert maximum data, which approach should be used such that it provides
Less Bit Error rate. Embedding key algorithm used should be proper and synchronised with that
of decryption algorithm. Performance evaluation is done using PSNR by comparing traditional
LSB methods and new approach. For different audio sample and message PSNR is increased and
system is more noise resisted. Different audio signals of varying size have been used to embed
image signal using embedding key and control algorithm. Proposed method has been analysed
using PSNR. So results are more satisfactory in term of getting cover audio back without any
quality impact.
In future, Audio steganography technique can be explored to get more robustness, with more
embedding capacity and highest security.

35 | P a g e

You might also like