The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2014
DOI: 10.5120/16660-6640
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Audio Steganography Approaches

Abstract: Today's internet community the secure data transfer is bounded due to its attack on data communication. Security of data can be achieved by implementing steganography techniques. All of the existing steganographic techniques use the digital multimedia files as a cover mediums to conceal secret data. Audio file use as a cover medium in steganography because of its larger size compare to other carrier's file such as text, image. So there are more possibilities to hide large amount of data inside digital audio fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…This framework served as a basis for cover audio selection optimisation, involving a multi-objective problem based on capacity and imperceptibility characteristics while considering its trade-off. For the value of a good trade-off between imperceptibility and capacity, this framework considered all cover audios that achieved 30 dB of Signal-to-Noise Ratio (SNR) following Singh (2014). Meanwhile, the capacity was fixed based on user input.…”
Section: General Frameworkmentioning
confidence: 99%
“…This framework served as a basis for cover audio selection optimisation, involving a multi-objective problem based on capacity and imperceptibility characteristics while considering its trade-off. For the value of a good trade-off between imperceptibility and capacity, this framework considered all cover audios that achieved 30 dB of Signal-to-Noise Ratio (SNR) following Singh (2014). Meanwhile, the capacity was fixed based on user input.…”
Section: General Frameworkmentioning
confidence: 99%
“…2. However this domain suffers from low robustness and (Singh, 2014). The earliest algorithm employed in such domain is LSB which is used in embedding process.…”
Section: Steganography Domainsmentioning
confidence: 99%