2011 International Conference on Innovations in Information Technology 2011
DOI: 10.1109/innovations.2011.5893859
|View full text |Cite
|
Sign up to set email alerts
|

A view on latest audio steganography techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
47
0
3

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 79 publications
(50 citation statements)
references
References 22 publications
0
47
0
3
Order By: Relevance
“…If single information is to be produced from audio signal, single bit information can be encoded only. So, this mechanism audio signal is separated into blocks before encoding, modified and then concatenated to produce the final audio signal [6]. The main drawback of this technique is its low capacity as it is computationally heavy and complex to add echo for each bit.…”
Section: B Echo Hidingmentioning
confidence: 99%
See 1 more Smart Citation
“…If single information is to be produced from audio signal, single bit information can be encoded only. So, this mechanism audio signal is separated into blocks before encoding, modified and then concatenated to produce the final audio signal [6]. The main drawback of this technique is its low capacity as it is computationally heavy and complex to add echo for each bit.…”
Section: B Echo Hidingmentioning
confidence: 99%
“…In DSSS, the secret message is spread across the spectrum by constant known as chip rate, and then it is modulated with signal and then interleaved with host signal. In FHSS the frequency of spectrum is modified to allow it to hop briskly between frequencies and allowing fast wrapping of information [6]. The limitation of this method is it introduces distortion to the original audio signal.…”
Section: Spread Spectrummentioning
confidence: 99%
“…Otherwise modify the LSB's of any one of the individual samples in that group to make the parity bit equal to the data bit. Thus, the sender has more option in encoding the secret data bit, and the signal can be altered in a more unobtrusive fashion [23].…”
Section: Parity Codingmentioning
confidence: 99%
“…Namun, tidak dipungkiri ada juga penelitian yang dikembangkan untuk meningkatkan dua hal tersebut. Khususnya untuk penelitian yang terkait dengan media pembawanya, berupa berkas audio, ada berbagai macam metode yang dapat digunakan dalam proses penyisipan data pada berkas audio, antara lain LSB; echo hiding, dilakukan dengan menyisipkan satu bit data rahasia pada sinyal echo [15]; phase coding, yaitu penyisipan dengan mengubah sinyal ke domain frekuensi menggunakan discrate fourier transform (DFT) [16]; spread spectrum, yaitu penyisipan dengan proses modulasi yang diawali dengan proses enkripsi pada pesan rahasia [17]; tone insertion, yang menggunakan tone rendah untuk ruang penyisipan [18]; dan LSD, yaitu hasil sampling sinyal disisipkan berupa nilai desimal [19].…”
unclassified
“…Pada spread spectrum, salah satu metode penyisipan data yang tidak tergantung pada sinyal asli, pesan rahasia disisipkan sepanjang frekuensi spectrum audio sinyal [17]. Metode ini memiliki beberapa media yang dibutuhkan, antara lain media pembawa, data rahasia, dan sinyal chip.…”
unclassified