2016 18th International Conference on Advanced Communication Technology (ICACT) 2016
DOI: 10.1109/icact.2016.7423319
|View full text |Cite
|
Sign up to set email alerts
|

A proposed implementation method of an audio steganography technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…This paper implements hybrid audio steganography which hides the data by embedding it in variable LSB of some selected samples based on polynomial expression. Tayel et al [1], present an implementation of LSB audio steganography technique using two cards of arduino.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…This paper implements hybrid audio steganography which hides the data by embedding it in variable LSB of some selected samples based on polynomial expression. Tayel et al [1], present an implementation of LSB audio steganography technique using two cards of arduino.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Audio steganography is one of the familiar data hiding techniques that embeds existence secret information in audio signals. Based on the masking effect of human auditory system (HAS), audio steganography is worked by hiding a weak data signal in the presence of the large one [1][2][3]. Fig.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…At first, the hidden message was to encrypt, then use an enhanced edge detection filter to detect edges in the coverimage, finally important massage hidden at the cover image. Audio steganography uses to hide secret data by the LSB technique was proposed by Tayel [11].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The planned technique is connected to completely different sound documents, let's say, discourse and music envelope signals. These sound documents were used as spreads and mystery messages and everything giving noteworthy outcomes on steganography plan [1]. A calculation for concealing image in chosen video arrangement could be a image concealing procedure in lightweight of separate wave remodel (DWT) and Singular price Decomposition (SVD) and irregular LSB (Least vital Bit).…”
Section: Background and Literature Reviewmentioning
confidence: 99%