Abstract
Our world is making its way toward complete digitization, with more and more data going to the Internet. Thus, the security of the data has become one of our utmost responsibilities. Strong and secure cryptography and steganography techniques have become the need of the hour to defend against modern adversaries. In this article, a novel scrambled data hiding approach is proposed to secure the sensitive information used in communications. The lacuna in the existing data hiding approaches is the loss of originality in the sensitive data to be attached, leading to poor information quality. This issue is addressed in the proposed approach by encrypting the data using the triple data encryption standard (DES) algorithm. The scrambled data are hidden in the audio file using the least significant bit (LSB) embedding. Experiments were conducted, and the proposed approach secured the sensitive information significantly without the loss of information quality. Furthermore, the secured information is retrieved by only the authenticated users with high quality.
ACKNOWLEDGEMENT
The authors thank the Indian Institute of Information Technology Una for providing the resources to do this work.
Additional information
Notes on contributors
![](/cms/asset/78f1ff4c-50ae-4911-bedd-bf4914575955/tijr_a_1988873_ilg0001.gif)
Bhuvaneswari Amma N.G.
Bhuvaneswari Amma N G received the PhD Degree from the National Institute of Technology, Tiruchirappalli, Tamil Nadu, India in 2020. Currently, she is a guest faculty in the School of Computing, Indian Institute of Information Technology, Una, Himachal Pradesh, India. Her areas of interest include network security, IoT security, machine learning, data analytics, and statistical methods.
![](/cms/asset/5059bce5-2e60-4b12-a0e4-a0436fec69b0/tijr_a_1988873_ilg0002.gif)
Jitaksh Kapoor
Jitaksh Kapoor is currently pursuing his BTech in information technology from Indian Institute of Information Technology, Una, Himachal Pradesh, India. His primary areas of research include cryptographic algorithms and hacking techniques. E-mail: [email protected]