Securing audio transmission based on encoding and steganography
نویسندگان
چکیده
منابع مشابه
Audio Steganography for Covert Data Transmission by Imperceptible Tone Insertion
This paper presents the technique of embedding data in an audio signal by inserting low power tones and its robustness to noise and cropping of embedded speech samples. Experiments on the embedding procedure applied to cover audio utterances from noise-free TIMIT database and a noisy database demonstrate the feasibility of the technique in terms of imperceptible embedding, high data rate and ac...
متن کاملTransparency benchmarking on audio watermarks and steganography
Abstract: The evaluation of transparency plays an important role in the context of watermarking and steganography algorithms. This paper introduces a general definition of the term transparency in the context of steganography, digital watermarking and attack based evaluation of digital watermarking algorithms. For this purpose the term transparency is first considered individually for each of t...
متن کاملLSB Based Audio Steganography Using Pattern Matching
Security of the digital information is becoming primary concern prior to transmitting the information itself via some media. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. In this proposed method, the carrier file and the secret message are taken into audio format and a pattern matchin...
متن کاملGenetic Audio Steganography
A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknessesof substitution techniques are investigated which if they could be solved, the large capacity strengthof substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is prese...
متن کاملOn steganography in lost audio packets
This paper presents a new hidden data insertion procedure based on the estimated probability of the remaining time of the call for the steganographic method called lost audio packets (LACK) steganography. LACK provides hidden communication for real-time services such as voice over IP. The analytical results presented in this paper concern the influence of LACK’s hidden data insertion procedures...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2021
ISSN: 2502-4760,2502-4752
DOI: 10.11591/ijeecs.v22.i3.pp1777-1786