Online Store - 8925533488 /89

Chennai - 8925533480 /81

Hyderabad - 8925533482 /83

Vijayawada -8925533484 /85

Covai - 8925533486 /87

Hiding An Audio With Text With RC7 Encryption

( 0 Rating )
Shape Image One
0 student


An enhancement of data protection system for secret communication using reserve room in encrypted images based on texture analysis with lifting wavelet is proposed here. The wavelet will decompose the image into four frequency sub bands namely LL, LH, HL and HH. These coefficients are then utilized in the encoder for removing the redundancies. The Selective embedding is utilized in this method to determine host signal samples suitable for data hiding.  This approach uses the Least Significant Bits (LSB) insertion to hide data within encrypted image data. The binary representation of the hidden data is used to overwrite the LSB of each byte within the encrypted image randomly. The Least significant bit replacement effectively used for data hiding process. This method proves that more secure technique for secret data communication with high quality factor. The hidden data will be used to enable the receiver to reconstruct the same secret transformation table after extracting it and hence the original image can be reproduced by the inverse of the transformation and encryption processes.We proposed the encrypting user’s data using RC5 Algorithm with a Secret Key, Which is embedded in a Image using LSB based image steganography techniques. The simulation results indicate that the framework can be successfully utilized in Image data hiding applications.


Existing Methods:

  • Discrete Cosine transformation
  • Direct bit replacement Process



  • Embedding Robustness is less
  • Edge information loss due to ringing artifact.
  • Low hiding capacity & low security


Proposed Method:

The Image Steganography technique is based on,

  • Lifting Wavelet Transformation.
  • Chaos crypto system
  • RC5 Encryption for secret data


Block Diagram:

Embedding Process:


Extraction Process:



  • Plane Separation
  • Chaos crypto system
  • Lifting Wavelet Transform
  • RC5 Encryption
  • LSB Embedding and Extraction
  • Performance analysis



  • High hiding Capacity & High Robustness
  • Less degradation in Image quality during hiding



  • Research institute.
  • Medical information protection.
  • Defense application.


Software Requirement:


  • MATLAB 7.5 and above versions.
  • Image and Video Processing toolbox



A new algorithm hiding technique is proposed in this paper using chaotic logistic map. This algorithm is simple, fast, and efficient and has high imperceptivity. The chaotic logistic map has been used in encrypting and embedding with DCT which increases the security and imperceptivity because the sensitivity of logistic map to initial condition leads to generate different sequence with different initial value. As seen in experimental results using DCT in embedding will not damage cover images which reflect by value of correlation that equal 1, it means high identical between the cover before and after embedding.



[1] Reem Majid Mikhail , “Information Hiding Using Petri Nets and Wavelet Transform” theses, Iraq, University of Technology , 2007.

[2] Nedaa Fleah, “ robots method to hide text file in sound wave file against the compression method mp3 ” , Thesis ,Technology University, Bagdad 2005.

[3] Haider Ismael Shahadi & Razali Jidin & Wong Hung Way , “ A Novel and High Capacity Audio Steganography Algorithm Based on Adaptive Data Embedding Positions” Electronic and Communication Engineering, Tenaga National University (UNITEN), Putrajaya , Malaysia ISSN: 2040- 7459; e-ISSN: 2040-7467 © Maxwell Scientific Organization, 2014.

[4] GEERT UYTTERHOEVEN& DIRK ROOSE &ADHEMAR BULTHEEL “Integer Wavelet Transforms using the Lifting Scheme”, IEEE ,IMA CS ,OTE , p 6257-6253.

[5] Michel Misiti & Yves Misiti &Georges Oppenheim &Jean-Michel Poggi , “Wavelet Toolbox™ User’s Guide”, book , 2014.

[6]“Lifting Scheme of Wavelet Transform” 3TU

[7] Eman Hato Hashim , September 2013, “Speech Signal Encryption Using Chaotic Maps” thesis College of Science, Al Mustansiriyah University, Computer Science department.

[8] Dipankar Pal’ A Robust Audio Steganographic Scheme in Time Domain (RASSTD)’ International Journal of Computer Applications (0975 8887) Volume 80 – No. 15, October 2013 Kalyani, Nadia-741235, West Bengal, India.

Curriculum is empty

pantech team

Agile Project Expert

Course Rating

0.00 average based on 0 ratings

Course Preview
  • Price
  • Instructor pantech team
  • Duration 15 Hrs
  • Enrolled 0 student
  • Access 3 Months

More Things You Might Like This


Student Performance Prediction using Machine Learning

Abstract: Although the educational level of the Portuguese population has improved in the last decades, the statistics keep Portugal at Europe’s tail end due to its high student failure rates. In particular, lack of success in the core classes of Mathematics and the Portuguese language is extremely serious. On the other hand, the fields of


Student feedback analysis

Abstract: Advances in natural language processing (NLP) and educational technology, as well as the availability of unprecedented amounts of educationally-relevant text and speech data, have led to an increasing interest in using NLP to address the needs of teachers and students. Educational applications differ in many ways, however, from the types of applications for which


Machine Learning based Regression Model for Prediction of Soil Surface Humidity over Moderately Vegetated Fields

Abstract: Agriculture is one of the major revenue producing sectors of India and a source of survival. Numerous seasonal, economic and biological patterns influence the crop production but unpredictable changes in these patterns lead to a great loss to farmers. These risks can be reduced when suitable approaches are employed on data related to soil

Open Whatsapp Chat
Need Any Help?
Welcome to Pantech eLearning!..

How can i help you?