An introduction to image steganography techniques
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …
hiding the existence of a message between sender and intended recipient. Steganography …
A simple review of audio steganography
D Tan, Y Lu, X Yan, X Wang - 2019 IEEE 3rd Information …, 2019 - ieeexplore.ieee.org
Stegnography is very important because it conceals the existence of communication itself.
Nowadays, people use a variety of multimedia files as stegnography carriers. Recently …
Nowadays, people use a variety of multimedia files as stegnography carriers. Recently …
Stego machine–video steganography using modified LSB algorithm
M Ramalingam - International Journal of Information and …, 2011 - publications.waset.org
Computer technology and the Internet have made a breakthrough in the existence of data
communication. This has opened a whole new way of implementing steganography to …
communication. This has opened a whole new way of implementing steganography to …
[PDF][PDF] Audio steganography: a survey on recent approaches
In this study, we will have a survey on audio steganography recent researches. Due to it,
some basic concepts of audio steganography and HAS including Least Significant Bit (LSB) …
some basic concepts of audio steganography and HAS including Least Significant Bit (LSB) …
A GA based audio steganography with enhanced security
K Bhowal, D Bhattacharyya, A Jyoti Pal… - Telecommunication …, 2013 - Springer
In the current internet community, secure data transfer is limited due to its attack made on
data communication. So more robust methods are chosen so that they ensure secured data …
data communication. So more robust methods are chosen so that they ensure secured data …
Genetic algorithm for fragile audio watermarking
A novel genetic-concept-based algorithm is proposed for fragile audio watermarking to
reduce the distortion of least significant bits substitution and consequently improve the peak …
reduce the distortion of least significant bits substitution and consequently improve the peak …
[PDF][PDF] A comparative study of audio steganography techniques
P Singh - International Research Journal of Engineering and …, 2016 - academia.edu
The emerging growth in use of digital data recommended the need of effective measure to
ensure security of digital data. The goal of steganography is to hide information by …
ensure security of digital data. The goal of steganography is to hide information by …
Chaos-based audio steganography and cryptography using LSB method and one-time pad
SMH Alwahbani, HTI Elshoush - Proceedings of SAI Intelligent Systems …, 2018 - Springer
This paper presents a chaos-based audio steganography and cryptography method that is
based on Least Significant Bit (LSB) and one-time pad, respectively. In the proposed …
based on Least Significant Bit (LSB) and one-time pad, respectively. In the proposed …
An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer
Being easy to understand and simple to implement, substitution technique of performing
steganography has gain wide popularity among users as well as attackers. Steganography …
steganography has gain wide popularity among users as well as attackers. Steganography …
Audio steganography using GA
Audio Steganography is a method that ensures secured data transfer between parties
normally in internet community. In this paper, we present a novel, principled approach to …
normally in internet community. In this paper, we present a novel, principled approach to …