Results 21 to 30 of about 5,757 (274)

Implementation of Securing Data in the Cloud using Combined Cryptography and Steganography

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2020
The recent advance in information technology field forcing us to ensure the privacy of the digital data. It is very important to develop the method that may satisfy the needs. Many methods/techniques applied to reach that goal.
Rosalina Rosalina, Nur Hadisukmana
doaj   +1 more source

Synthetic speech detection and audio steganography in VoIP scenarios [PDF]

open access: yes, 2016
The distinction between synthetic and human voice uses the techniques of the current biometric voice recognition systems, which prevent that a person’s voice, no matter if with good or bad intentions, can be confused with someone else’s.
Capolupo, Daniele, D'AMORE, Fabrizio
core   +1 more source

Hiding Techniques using Mp3 [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
In last years, Steganography techniques involving audio file formats appear to be increasing in popularity. This may be attributed to the fact that current steganalysis tools available to the general public fall short when applied to audio files. Another
Shyma Mohammed, Ahmed Nori
doaj   +1 more source

SecMon: End-to-End Quality and Security Monitoring System [PDF]

open access: yes, 2008
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype).
Ciszkowski, Tomasz   +5 more
core   +4 more sources

Text, Image and Audio Steganography

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2023
Abstract: Steganography refers to the concealment of confidential data within a common medium, like a text, image, or audio file, without altering its original appearance, to evade detection. This method is used for several purposes, including protecting data privacy, preventing unauthorized access to data, and ensuring safe information transmission ...
Ms. T N Aruna   +4 more
openaire   +1 more source

Studying Audio Capacity as Carrier of Secret Images in Steganographic System

open access: yesIraqi Journal of Physics, 2021
Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity.
Ahlam Majead Kadhim, Huda Muhamed Jawad
doaj   +1 more source

Reversible Audio Steganography Algorithm Based on Sample Value Ordering [PDF]

open access: yesJisuanji gongcheng, 2021
To address the large distortion suffered by the existing reversible audio steganography algorithms,this paper proposes an improved reversible audio steganography algorithm based on Sample Value Ordering(SVO).In the algorithm,the complexity of each sample
YU Heng, WANG Rangding, YAN Diqun, ZHANG Xueyuan
doaj   +1 more source

Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm

open access: yesJournal of ICT, 2023
Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selection that is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding ...
Muhammad Harith Noor Azam   +2 more
doaj   +1 more source

A novel steganography method for binary and color halftone images [PDF]

open access: yesPeerJ Computer Science, 2022
Digital steganography is the science of establishing hidden communication on electronics; the aim is to transmit a secret message to a particular recipient using unsuspicious carriers such as digital images, documents, and audio files with the help of ...
Efe Çiftci, Emre Sümer
doaj   +2 more sources

Using Transcoding for Hidden Communication in IP Telephony [PDF]

open access: yes, 2011
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt
Mazurczyk, Wojciech   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy