2020
DOI: 10.1016/j.fsir.2020.100075
|View full text |Cite
|
Sign up to set email alerts
|

Detecting fingerprints of audio steganography software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…On the other hand, attackers may try to detect Fig. 11 The quality of the stego file generated by Jung and Yoo [29], Ahmad and Fiqar [30], Andra et al [32], Bobeica et al [33], Ahmad et al [31], and the proposed technique with e = 3 , m = 1 , h = 0 and h = 4 the existence of hidden information in the stego audio [38,39]. Although it is out of the scope of this investigation, this possible attack should be anticipated.…”
Section: Discussionmentioning
confidence: 99%
“…On the other hand, attackers may try to detect Fig. 11 The quality of the stego file generated by Jung and Yoo [29], Ahmad and Fiqar [30], Andra et al [32], Bobeica et al [33], Ahmad et al [31], and the proposed technique with e = 3 , m = 1 , h = 0 and h = 4 the existence of hidden information in the stego audio [38,39]. Although it is out of the scope of this investigation, this possible attack should be anticipated.…”
Section: Discussionmentioning
confidence: 99%
“…Steganography can be detected via various tools, taking into account their three components: the sender, received and the carrier [3]. Steganalysis is the practice of detecting the use of steganography [18] and research states that, currently, there are two different types of approach in stenography identification: the first is the targeted steganalysis which to detects a particular algorithm; the second, is capable of detecting steganalysis without knowing the steganographic algorithms [19]. The method used depends on the hiding technique [15].…”
Section: Detention Techniquesmentioning
confidence: 99%
“…Nevertheless, we need to keep in mind that with the increasing of steganographic software's, the steganalysis methods need to keep up with the demand [19].…”
Section: Detention Techniquesmentioning
confidence: 99%
“…The encryption, on the other hand, is a way of transforming the overall view of understood data into a disfigured one, so the encrypted message appears to contain important data that requires deciphering. The encryption would fail if the intruder were to be able to decrypt the cipher message, while Steganography fails to secure data when the attacker detects the presence of a secret data inside the cover file [4], [5]. Thus, for more ensuring data security, steganography and encryption are used together so that any observer would struggle to detect messages and, even upon retrieval, it would remain indecipherable and meaningless [6].…”
Section: Introductionmentioning
confidence: 99%