2009 7th International Conference on Information, Communications and Signal Processing (ICICS) 2009
DOI: 10.1109/icics.2009.5397486
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive and efficient audio DataHiding method in temporal domain

Abstract: In this paper a novel Audio steganography method is proposed. In this algorithm, first embedding threshold in the time domain is estimated. Then this threshold is used for data concealment in the time domain. The performance of the proposed scheme in terms of SNR (signal to noise ratio) and BER (bit error rate) is analyzed. An estimation formula that connects SNR with embedding threshold has been provided to ensure the transparency of embedded data. The security of this method is enhanced by using of an encryp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 14 publications
(19 reference statements)
0
1
0
Order By: Relevance
“…Complexity: Hiding algorithms consumes time in performing hide/de-hide process and this depends on the complexities of the algorithm. Secret data should be rapidly embedded/extracted into/from the host file, so that streaming data hiding real time can be delivered over the network (Delforouzi and Pooyan, 2009).…”
Section: Robustness and Securitymentioning
confidence: 99%
“…Complexity: Hiding algorithms consumes time in performing hide/de-hide process and this depends on the complexities of the algorithm. Secret data should be rapidly embedded/extracted into/from the host file, so that streaming data hiding real time can be delivered over the network (Delforouzi and Pooyan, 2009).…”
Section: Robustness and Securitymentioning
confidence: 99%
“…This paper is implemented in temporal domain. Ahmad Delforouzi and Mohammad Pooyan [8] proposes an algorithm which embeds secret data in temporal domain. In this algorithm first embedding threshold in the time domain is estimated.…”
Section: Literature Surveymentioning
confidence: 99%