2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT) 2015
DOI: 10.1109/acsat.2015.35
|View full text |Cite
|
Sign up to set email alerts
|

Applying AWGN MP3 Steganography Attack in BiLSB and SLSB Techniques

Abstract: Steganography is considered as an advanced emerging method due to its ability to ensure secured data transmission based on embedding the required secret data in digital multimedia files. The most appropriate mediums for steganography is audio files because of its high rates of data transmission and high redundancy level. Various steganography methods have been introduced to ensure the transmission of data in a secured way. Nevertheless, some of those methods, such as the Standard Least Significant Bit (SLSB) t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Therefore, we can use the LSB of xi as the payload for embedding information. Formally, yi, which represents the stego speech , can be written as follows:yi=mfalse(xifalse)+biAs mentioned in [36] and detailed in [21], the stego speech can be modelled as additive white Gaussian noise, as mainly utilised in information theory to resemble the impact of random natural processes. The additive property comes from the fact that this model is added for any noise, which may be inherent for information systems.…”
Section: Proposed Steganographic Schemementioning
confidence: 99%
“…Therefore, we can use the LSB of xi as the payload for embedding information. Formally, yi, which represents the stego speech , can be written as follows:yi=mfalse(xifalse)+biAs mentioned in [36] and detailed in [21], the stego speech can be modelled as additive white Gaussian noise, as mainly utilised in information theory to resemble the impact of random natural processes. The additive property comes from the fact that this model is added for any noise, which may be inherent for information systems.…”
Section: Proposed Steganographic Schemementioning
confidence: 99%