Results 11 to 20 of about 5,757 (274)
Comparative Analysis of Audio Steganography Methods
Information security has been one of the most important issues of all time for both individuals and companies. Delivering data to the correct recipient is crucial for personal data protection, the privacy of personal life, and national security.
Funda ASLANTAS BEYIN, Cemal HANILCI
doaj +3 more sources
Audio Steganography Using M8MA Technique [PDF]
In recent years , The use of concealment techniques that include audio files has been increased due to the fact that the tools available to analyze sound fail when applied .
doaj +3 more sources
An overview on audio steganography techniques [PDF]
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient.
Abdul Manaf, Azizah +2 more
core +2 more sources
Electronically communicating has increased in the covid scenario giving birth too numerous new styles to transmit information securely and robustly. So to achieve communication in secured way audio steganography can be used. Audio steganography is a method to hide text message in audio.
null Vaibhavi P. Naik +1 more
openaire +1 more source
Securing Voice Communications Using Audio Steganography [PDF]
Although authentication of users of digital voice-based systems has been addressed by much research and many commercially available products, there are very few that perform well in terms of both usability and security in the audio domain. In addition, the use of voice biometrics has been shown to have limitations and relatively poor performance when ...
Phipps, Anthony +2 more
openaire +1 more source
On steganography in lost audio packets [PDF]
ABSTRACTThis paper presents a new hidden data insertion procedure based on the estimated probability of the remaining time of the call for the steganographic method called lost audio packets (LACK) steganography. LACK provides hidden communication for real‐time services such as voice over IP.
Mazurczyk, Wojciech +2 more
openaire +2 more sources
Steganography in Audio Files – COTS Software Analysis [PDF]
The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by
Piotr Marszałek, Piotr Bilski
doaj +1 more source
Image and audio steganography based on indirect LSB
Hiding the presence of data during communication has become a pressing concern in this extremely digitalized world due to the unauthorized data access and network violations that are rapidly emerging.
Zainab Namh Sultani, Ban Nadeem Dhannoon
doaj +1 more source
New security and control protocol for VoIP based on steganography and digital watermarking [PDF]
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core +3 more sources
A Method of Cover Audio Selection for Embedding Based on Various Criteria [PDF]
The main goal of an audio steganography method is to improve the capacity, im-perceptibility, and robustness. Several methods of audio steganography have been proposed to enhance its capabilities.
Noor Azam Muhammad Harith +5 more
doaj +1 more source

