2020 Fourth International Conference on Inventive Systems and Control (ICISC) 2020
DOI: 10.1109/icisc47916.2020.9171142
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Audio Steganography combined with Cryptography for RC4 and 3DES Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Usually, the information being hidden is first converted into any audio format like WAVE, MIDI, and so on, and techniques like LSB, Phase Coding, Echo Hiding, and so on, are used for embedding that signal into the carrier audio signal for transmission. It takes advantage of hearing sensory limitation of humans 4 . The LSB algorithm and the Phase Coding algorithm are used in the majority of audio steganography.…”
Section: Steganography: An Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Usually, the information being hidden is first converted into any audio format like WAVE, MIDI, and so on, and techniques like LSB, Phase Coding, Echo Hiding, and so on, are used for embedding that signal into the carrier audio signal for transmission. It takes advantage of hearing sensory limitation of humans 4 . The LSB algorithm and the Phase Coding algorithm are used in the majority of audio steganography.…”
Section: Steganography: An Overviewmentioning
confidence: 99%
“…It takes advantage of hearing sensory limitation of humans. 4 The LSB algorithm and the Phase Coding algorithm are used in the majority of audio steganography. A faint sound contains the secret, while a louder sound in the same audio serves as a cover for the secret.…”
Section: Types Of Steganographymentioning
confidence: 99%