Securing audio transmission based on encoding and steganography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Audio Steganography for Covert Data Transmission by Imperceptible Tone Insertion

This paper presents the technique of embedding data in an audio signal by inserting low power tones and its robustness to noise and cropping of embedded speech samples. Experiments on the embedding procedure applied to cover audio utterances from noise-free TIMIT database and a noisy database demonstrate the feasibility of the technique in terms of imperceptible embedding, high data rate and ac...

متن کامل

Transparency benchmarking on audio watermarks and steganography

Abstract: The evaluation of transparency plays an important role in the context of watermarking and steganography algorithms. This paper introduces a general definition of the term transparency in the context of steganography, digital watermarking and attack based evaluation of digital watermarking algorithms. For this purpose the term transparency is first considered individually for each of t...

متن کامل

LSB Based Audio Steganography Using Pattern Matching

Security of the digital information is becoming primary concern prior to transmitting the information itself via some media. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. In this proposed method, the carrier file and the secret message are taken into audio format and a pattern matchin...

متن کامل

Genetic Audio Steganography

A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknessesof substitution techniques are investigated which if they could be solved, the large capacity strengthof substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is prese...

متن کامل

On steganography in lost audio packets

This paper presents a new hidden data insertion procedure based on the estimated probability of the remaining time of the call for the steganographic method called lost audio packets (LACK) steganography. LACK provides hidden communication for real-time services such as voice over IP. The analytical results presented in this paper concern the influence of LACK’s hidden data insertion procedures...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2021

ISSN: 2502-4760,2502-4752

DOI: 10.11591/ijeecs.v22.i3.pp1777-1786