2013
DOI: 10.1007/978-981-4585-18-7_32
|View full text |Cite
|
Sign up to set email alerts
|

An Audio Steganography Technique to Maximize Data Hiding Capacity along with Least Modification of Host

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…The secret message of suitable size i.e. less than the length of the onset samples of the cover hosts audio is selected [8]. As shown in table 2 a sample message text of bit length 1225 is selected to be embedded in the cover audio.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The secret message of suitable size i.e. less than the length of the onset samples of the cover hosts audio is selected [8]. As shown in table 2 a sample message text of bit length 1225 is selected to be embedded in the cover audio.…”
Section: Resultsmentioning
confidence: 99%
“…[7] proposed method based on diffusing the secret method over host audio in which selection position of secrete bit from 0th to 7th LSB depends on the decimal value of 3 MSB's. Hiding data in duel bits in the 4th and 1st LSB and modifying other bits has been suggested by [8] for more secure communication. [9] proposed 3rd and 4th bits for embedding the secret text and intelligent algorithms for altering 2nd and 5th bits for perceptual resemblance between cover file and stego file.…”
Section: Introductionmentioning
confidence: 99%
“…This part initially divides the input cover file into multiple samples using sampling theory [21,49]. On the basis of the set threshold value, it extracts the audio samples from the cover file.…”
Section: Conversion Of Cover Audio File Into a String Arraymentioning
confidence: 99%
“…According to [47], [48], a high compression efficiency resulting from any compression technique threatens data confidentiality. As the proposed compression is also very efficient, it also jeopardises data confidentiality.…”
Section: E Proposed Audio Steganographymentioning
confidence: 99%
“…According to [37], [47], [48], the confidentiality level of our integrated technique can be measured by determining its capacity to retain perceptual similarities between the original and steganographic files and resist unauthorized tampering of illicit third parties.…”
Section: A Ability To Protect Data Confidentialitymentioning
confidence: 99%