Results 11 to 20 of about 5,757 (274)

Comparative Analysis of Audio Steganography Methods

open access: yesJournal of Innovative Science and Engineering, 2022
Information security has been one of the most important issues of all time for both individuals and companies. Delivering data to the correct recipient is crucial for personal data protection, the privacy of personal life, and national security.
Funda ASLANTAS BEYIN, Cemal HANILCI
doaj   +3 more sources

Audio Steganography Using M8MA Technique [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2013
In recent years , The use of concealment techniques that include audio files has been increased due to the fact that the tools available to analyze sound fail when applied .
doaj   +3 more sources

An overview on audio steganography techniques [PDF]

open access: yesInternational Journal of Digital Content Technology and its Applications, 2012
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient.
Abdul Manaf, Azizah   +2 more
core   +2 more sources

Audio Steganography

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2022
Electronically communicating has increased in the covid scenario giving birth too numerous new styles to transmit information securely and robustly. So to achieve communication in secured way audio steganography can be used. Audio steganography is a method to hide text message in audio.
null Vaibhavi P. Naik   +1 more
openaire   +1 more source

Securing Voice Communications Using Audio Steganography [PDF]

open access: yesInternational Journal of Computer Network and Information Security, 2022
Although authentication of users of digital voice-based systems has been addressed by much research and many commercially available products, there are very few that perform well in terms of both usability and security in the audio domain. In addition, the use of voice biometrics has been shown to have limitations and relatively poor performance when ...
Phipps, Anthony   +2 more
openaire   +1 more source

On steganography in lost audio packets [PDF]

open access: yesSecurity and Communication Networks, 2011
ABSTRACTThis paper presents a new hidden data insertion procedure based on the estimated probability of the remaining time of the call for the steganographic method called lost audio packets (LACK) steganography. LACK provides hidden communication for real‐time services such as voice over IP.
Mazurczyk, Wojciech   +2 more
openaire   +2 more sources

Steganography in Audio Files – COTS Software Analysis [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by
Piotr Marszałek, Piotr Bilski
doaj   +1 more source

Image and audio steganography based on indirect LSB

open access: yesKuwait Journal of Science, 2021
Hiding the presence of data during communication has become a pressing concern in this extremely digitalized world due to the unauthorized data access and network violations that are rapidly emerging.
Zainab Namh Sultani, Ban Nadeem Dhannoon
doaj   +1 more source

New security and control protocol for VoIP based on steganography and digital watermarking [PDF]

open access: yes, 2006
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core   +3 more sources

A Method of Cover Audio Selection for Embedding Based on Various Criteria [PDF]

open access: yesITM Web of Conferences
The main goal of an audio steganography method is to improve the capacity, im-perceptibility, and robustness. Several methods of audio steganography have been proposed to enhance its capabilities.
Noor Azam Muhammad Harith   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy