2014 International Conference on Reliability Optimization and Information Technology (ICROIT) 2014
DOI: 10.1109/icroit.2014.6798340
|View full text |Cite
|
Sign up to set email alerts
|

A robust substitution technique to implement audio steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…Rahim et al (2014) also proposed a technique that hides the secret data in dual bits in the 4 and 1 LSB and makes modification to the other bits on the same sample. Moreover RohitTanwar 2014 presented a technique that used two bits (3th and 4th) for embedding and intelligent algorithm for altering the bits (2 and 5 ) to minimize the difference between stegosample and original audio file (Tanwar et al, 2014).…”
Section: Information Hidingin Audiomentioning
confidence: 99%
“…Rahim et al (2014) also proposed a technique that hides the secret data in dual bits in the 4 and 1 LSB and makes modification to the other bits on the same sample. Moreover RohitTanwar 2014 presented a technique that used two bits (3th and 4th) for embedding and intelligent algorithm for altering the bits (2 and 5 ) to minimize the difference between stegosample and original audio file (Tanwar et al, 2014).…”
Section: Information Hidingin Audiomentioning
confidence: 99%
“…Hiding data in duel bits in the 4th and 1st LSB and modifying other bits has been suggested by [8] for more secure communication. [9] proposed 3rd and 4th bits for embedding the secret text and intelligent algorithms for altering 2nd and 5th bits for perceptual resemblance between cover file and stego file. [10] used advanced encryption standard to enhance the security of stego-file.…”
Section: Introductionmentioning
confidence: 99%
“…Also, there is an increase in capacity due to the use of Huffman coding. In [26], for each sample, the third and fourth LSB are replaced with the secret message and the second and fifth LSB are altered by using an intelligent algorithm so that the stego sample gets minimized. In [27], the audio samples are 16 bits.…”
Section: Introductionmentioning
confidence: 99%