Results 1 to 10 of about 5,757 (274)

A robust audio steganography technique based on image encryption using different chaotic maps [PDF]

open access: yesScientific Reports
The development of innovative methods for concealing critical data in multimedia files has exploded in information security in recent years. Cryptography and steganography cannot be used alone to protect data; rather, they can be combined and used in a ...
Marwa A. Nasr   +6 more
doaj   +3 more sources

Learning to Generate Steganographic Cover for Audio Steganography Using GAN

open access: yesIEEE Access, 2021
Audio steganography aims to exploit the human auditory redundancy to embed the secret message into cover audio, without raising suspicion when hearing it. However, recent studies have shown that the existing audio steganography can be easily exposed with
Lang Chen   +3 more
doaj   +3 more sources

A novel steganography approach for audio files [PDF]

open access: yesSN Computer Science, 2020
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T   +2 more
core   +4 more sources

Detecting fingerprints of audio steganography software

open access: yesForensic Science International: Reports, 2020
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong   +5 more
doaj   +2 more sources

Assessment of a VoIP steganalysis method based on statistical analysis and deep neural network [PDF]

open access: yesScientific Reports
Recent widespread utilization of Voice over Internet Protocol (VoIP) has made it a common medium for covert communication via steganography. In order to counter these security threats, several steganalysis approaches have been developed, among which the ...
Hojat Allah Moghadasi, Hamid Dehghani
doaj   +2 more sources

A survey on Rijndael based LSB Audio Steganography techniques

open access: yesWasit Journal for Pure Sciences, 2023
The need to protect multimedia data security—including audio, video, and text—and the data it contains has persisted, whether in physical or digital form.
sajaa g.mohammed
doaj   +1 more source

Computationally secure steganography based on speech synthesis

open access: yes网络与信息安全学报, 2022
The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography ...
Menghan LI   +3 more
doaj   +3 more sources

ARPNetSteg: Network Steganography Using Address Resolution Protocol [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of
Punam Bedi, Arti Dua
doaj   +1 more source

High Capacity Audio Steganography Based on Contourlet Transform [PDF]

open access: yesTikrit Journal of Engineering Sciences, 2018
The science of hiding information behind other cover media file is known steganography. Audio steganography means that a secret message is hidden by embedding it in an audio file.
Abbas Salman Hameed
doaj   +1 more source

A robust audio steganography algorithm based on differential evolution

open access: yesDianxin kexue, 2021
Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is ...
Zhaopin SU   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy