2013 International Conference on Advanced Computer Science Applications and Technologies 2013
DOI: 10.1109/acsat.2013.38
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the Challenges of MP3 Audio Steganography

Abstract: This paper presents the issues and challenges faced for steganographic techniques that uses MP3 (Moving Picture Experts Group-1 "MPEG-1" Audio Layer 3) files as the cover or carrier file. The problem of steganographic techniques for MP3 is variety of MP3 states, where it exists at higher or lower bit rates, with higher or lower resulting quality. These have profound effects on strength of techniques that will be used for a different state of MP3 files. Several techniques have already been proposed for embeddin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…The white Gaussian noise is mainly utilized in system modeling, where it can be added to audio signals using the MATLAB program using the function "randn", where it produces random numbers, which follow a Gaussian distribution [16]. To read more about MP3 steganography can refer to [17][18][19][20][21][22][23][24] …”
Section: Adding Gaussian Noisementioning
confidence: 99%
“…The white Gaussian noise is mainly utilized in system modeling, where it can be added to audio signals using the MATLAB program using the function "randn", where it produces random numbers, which follow a Gaussian distribution [16]. To read more about MP3 steganography can refer to [17][18][19][20][21][22][23][24] …”
Section: Adding Gaussian Noisementioning
confidence: 99%
“…Using Before All Frames (BAF) technique [14], researchers develop new technique to embed hole secret message before the first frames in the header. The secret message with encrypted text is embedded in a cover file, will have a maximum size of 15 KB, however the size will reach 30 KB without using encryption.…”
Section: Embedding In Header Framesmentioning
confidence: 99%
“…This technique is better capacity compared with padding and unused bit, but also is less security without using encryption method before embedding the secret message. In addition, Between Frames (BF) methods divide the secret message before embedding it into small size cover file [14]. This method depends on the size of secret message, and on the spaces between frames of the cover file.…”
Section: Embedding In Header Framesmentioning
confidence: 99%
See 1 more Smart Citation
“…, Second Secret Key steganography and lastly, Public Key Steganography is based on the concepts of public key cryptography. Public key steganography uses a public key and a private key to secure the communication between the parties [20].…”
Section: Introductionmentioning
confidence: 99%