Performance Improvement of Threshold based Audio Steganography using Parallel Computation
نویسندگان
چکیده
منابع مشابه
Performance Improvement of Threshold based Audio Steganography using Parallel Computation
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security level. The existing techniques either focus on the payload or security, but none of them has ensured both security and payload at same time. Data Dependency in existing solu...
متن کاملPerformance Improvement of Advanced Encryption Algorithm using Parallel Computation
The requirement of information security on network has become more and more important. Cryptography is a method to provide information confidentiality, authenticity and integrity. There are so many challenges to implement cryptography algorithm such as execution time, memory requirement, and computation power. Parallel computation is a promising technique to improve the performance of cryptogra...
متن کاملA Multi-Threshold Based Scheme for Audio Steganography
Audio steganography deals with a method to hide a secret message in an audio file. Also, Audio steganography can be used for secret watermarking or concealing ownership or copyright information in the audio that can be verified later to justify ownership right. A direct Least Significant Bit (LSB) substitution method is one of the most simple and popular techniques used for audio steganography;...
متن کاملLSB Based Audio Steganography Using Pattern Matching
Security of the digital information is becoming primary concern prior to transmitting the information itself via some media. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. In this proposed method, the carrier file and the secret message are taken into audio format and a pattern matchin...
متن کاملAudio steganography using bit modification
A method of embedding a covert audio message in a cover utterance for secure communication is presented. The covert message is represented in a compressed form with possibly encryption and/or encoding for added security. One bit in each of the samples of a given cover utterance is altered in accordance with the data bits and a key. The same key is used to retrieve the embedded bits at the recei...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2016
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2016.071039