Results 1 to 10 of about 5,757 (274)
A robust audio steganography technique based on image encryption using different chaotic maps [PDF]
The development of innovative methods for concealing critical data in multimedia files has exploded in information security in recent years. Cryptography and steganography cannot be used alone to protect data; rather, they can be combined and used in a ...
Marwa A. Nasr +6 more
doaj +3 more sources
Learning to Generate Steganographic Cover for Audio Steganography Using GAN
Audio steganography aims to exploit the human auditory redundancy to embed the secret message into cover audio, without raising suspicion when hearing it. However, recent studies have shown that the existing audio steganography can be easily exposed with
Lang Chen +3 more
doaj +3 more sources
A novel steganography approach for audio files [PDF]
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T +2 more
core +4 more sources
Detecting fingerprints of audio steganography software
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong +5 more
doaj +2 more sources
Assessment of a VoIP steganalysis method based on statistical analysis and deep neural network [PDF]
Recent widespread utilization of Voice over Internet Protocol (VoIP) has made it a common medium for covert communication via steganography. In order to counter these security threats, several steganalysis approaches have been developed, among which the ...
Hojat Allah Moghadasi, Hamid Dehghani
doaj +2 more sources
A survey on Rijndael based LSB Audio Steganography techniques
The need to protect multimedia data security—including audio, video, and text—and the data it contains has persisted, whether in physical or digital form.
sajaa g.mohammed
doaj +1 more source
Computationally secure steganography based on speech synthesis
The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography ...
Menghan LI +3 more
doaj +3 more sources
ARPNetSteg: Network Steganography Using Address Resolution Protocol [PDF]
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of
Punam Bedi, Arti Dua
doaj +1 more source
High Capacity Audio Steganography Based on Contourlet Transform [PDF]
The science of hiding information behind other cover media file is known steganography. Audio steganography means that a secret message is hidden by embedding it in an audio file.
Abbas Salman Hameed
doaj +1 more source
A robust audio steganography algorithm based on differential evolution
Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is ...
Zhaopin SU +4 more
doaj +2 more sources

