2009
DOI: 10.1007/s11042-009-0430-5
|View full text |Cite
|
Sign up to set email alerts
|

Huffman table swapping-based steganograpy for MP3 audio

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Over the past decade different mp3 steganography methods have been developed. They include Mp3stego [43], under mp3 cover (Ump3c) [53], Mp3stegz − One Kernel: [54], Huffman table swapping [55], quantization step parity [56], Linbit [57], Bv-Stego [58], and other methods [59][60][61]. Current literature has only investigated steganalysis of Mp3stego and Ump3c.…”
Section: Mp3 Steganalysismentioning
confidence: 99%
See 1 more Smart Citation
“…Over the past decade different mp3 steganography methods have been developed. They include Mp3stego [43], under mp3 cover (Ump3c) [53], Mp3stegz − One Kernel: [54], Huffman table swapping [55], quantization step parity [56], Linbit [57], Bv-Stego [58], and other methods [59][60][61]. Current literature has only investigated steganalysis of Mp3stego and Ump3c.…”
Section: Mp3 Steganalysismentioning
confidence: 99%
“…One Kernel: [54], Huffman table swapping [55], quantization step parity [56], Linbit [57], Bv-Stego [58], and other methods [59][60][61].…”
mentioning
confidence: 99%
“…In this case the smallest possible value is 1only one of the formats is supported and the highest is 4all formats are supported. The evaluation scale gives larger value to lossy compression support, because lossy compression algorithms are much more popular between the users than lossless or uncompressed audio [8][9][10] and create greater difficulty in embedding hidden information in themso we give it a better evaluation that the support of other format.…”
Section: Lossy Compressionmentioning
confidence: 99%
“…Existing MP3 steganographic methods can be divided into two major categories: encoding parameters-based methods and encoding data-based ones. For the encoding parameters-based methods, the messages are embedded by adjusting window type [1], quantization step [2,3], Huffman table index [4], and so forth. e modification of these parameters will not cause sharp disturbances to the audio signal.…”
Section: Introductionmentioning
confidence: 99%