Digital Watermarking with Secret Audio Sharing
Supriyo De1, Subijit Mondal2, Dibyendu Chowdhury3

1Supriyo De, Department Of Electronics and Communication Engineering, Saroj Mohan Institute of Technology (Degree Engineering Division), Hooghly, India.
2Subijit Mondal, Department Of Electronics and Communication Engineering, Saroj Mohan Institute of Technology (Degree Engineering Division), Halisahar , India.
3Dibyendu Chowdhury, Department Of Electronics and Communication Engineering,, Haldia Institute of Technology ,Haldia, India.
Manuscript received on January 01, 2013. | Revised Manuscript received on January 02, 2013. | Manuscript published on January 05, 2013. | PP: 372-375 | Volume-2, Issue-6, January 2013.
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In today’s society with the increased use of computers, internet, and wireless communications, the need for safety and security has raised dramatically. The phenomenal growth of E-communication and new technologies has furnished to the need of secured communication and secure data transmission. The information can be a confidential document, it may be in form of image, audio, text etc. Some of the information transmitted can be intercepted illegally, such as personal information and private or secure messages. In this paper, implementation of secret sharing scheme is used to achieve the goal. We have proposed a technique to hide shared data into a digital image using the basics of cryptography to prepare a cipher key and meanwhile using the definition of digital watermarking to hide the fact that data is hidden. This helps to prevent the participant from incidental or intentional provision of a false or tampered stego-image. Consequently, the proposed scheme offers a high secure and cost effective mechanism for secret sharing.
Keywords: Image processing, Secret sharing, Secure message transfer, Security watermarking, Steganography.