Comparative study of digital audio steganography techniques
The rapid spread in digital data usage in many real life applications have urged new and
effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by …
effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by …
A view on latest audio steganography techniques
Steganography has been proposed as a new alternative technique to enforce data security.
Lately, novel and versatile audio steganographic methods have been proposed. A perfect …
Lately, novel and versatile audio steganographic methods have been proposed. A perfect …
Securing IoT data using steganography: A practical implementation approach
F Djebbar - Electronics, 2021 - mdpi.com
Adding network connectivity to any “thing” can certainly provide great value, but it also
brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” …
brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” …
Unified phase and magnitude speech spectra data hiding algorithm
F Djebbar, B Ayad, K Abed‐Meraim… - Security and …, 2013 - Wiley Online Library
In this paper, we present a unified algorithm for phase and magnitude speech spectra data
hiding. The phase and the magnitude speech spectra are concurrently investigated to …
hiding. The phase and the magnitude speech spectra are concurrently investigated to …
Lightweight noise resilient steganography scheme for Internet of Things
With the recent advent of Internet of Things (IoT), security poses a major critical concern of its
practical implementation. Therefore, it is imperative that the unique security challenges of …
practical implementation. Therefore, it is imperative that the unique security challenges of …
Speech signal authentication and self-recovery based on DTWT and ADPCM
MT Quiñonez-Carbajal, R Reyes-Reyes… - Multimedia Tools and …, 2024 - Springer
The digital voice is multimedia content of great importance, given the range of applications
where it can be found. This paper addresses the shortcomings of existing voice …
where it can be found. This paper addresses the shortcomings of existing voice …
Robust multi layer audio steganography
B Datta, P Pal… - 2015 Annual IEEE India …, 2015 - ieeexplore.ieee.org
In this paper a robust audio steganography method is introduced which involves multiple
layers for embedding secret data. In LSB technique generally a single or multiple bits are …
layers for embedding secret data. In LSB technique generally a single or multiple bits are …
An audio/video crypto—Adaptive optical steganography technique
In recent years a growing interest in information hiding in multimedia data as the host has
been observed in the research community. This hidden information can be used for many …
been observed in the research community. This hidden information can be used for many …
[PDF][PDF] Audio Steganography
A Azad, L Arora, A Sharma, S Rani - 2024 - ir.juit.ac.in
The foremost undertaking document investigates the multifaceted realm of audio
steganography, delving into its historical context and underlining its importance inside the …
steganography, delving into its historical context and underlining its importance inside the …
Secret Pitch: En ny metod för ljudsteganografi
E Spennare, S Jonasson - 2022 - diva-portal.org
Steganografi är en gammal men fortfarande högst aktuell teknik som används för att dölja
hemlig information i annan information. Syftet med steganografi är att undanhålla för …
hemlig information i annan information. Syftet med steganografi är att undanhålla för …