2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03).
DOI: 10.1109/icassp.2003.1202390
|View full text |Cite
|
Sign up to set email alerts
|

Audio steganography using bit modification

Abstract: A method of embedding a covert audio message in a cover utterance for secure communication is presented. The covert message is represented in a compressed form with possibly encryption and/or encoding for added security. One bit in each of the samples of a given cover utterance is altered in accordance with the data bits and a key. The same key is used to retrieve the embedded bits at the receiver. The results, based on cover signals from a clean TIMIT utterance and a noisy aircraft cockpit utterance, show tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
30
0
1

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(31 citation statements)
references
References 3 publications
0
30
0
1
Order By: Relevance
“…Generally objectives of the LSB-based schemes are to raise payload or the maximum amount of the information to be embedded and to prevent audio quality degradation. This technique is reformed to increase the robustness against additive noise [7].…”
Section: Introductionmentioning
confidence: 99%
“…Generally objectives of the LSB-based schemes are to raise payload or the maximum amount of the information to be embedded and to prevent audio quality degradation. This technique is reformed to increase the robustness against additive noise [7].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years various techniques for steganography in digital audio with varying purposes have been developed [1][2][3][4][5][6][7][8][9]. These methods use characteristics (weakness) of the human auditory system (HAS).…”
Section: Introductionmentioning
confidence: 99%
“…Generally objectives of the LSB-based schemes are to raise the payload or the maximum amount of information to be embedded and to prevent audio quality degradation. This technique has also been reformed to increase the robustness against additive noise [6].…”
Section: Introductionmentioning
confidence: 99%
“…Instead of protecting data the way encryption does, steganography hides the existence of the data (Provos and Honeyman, 2003). Most of the steganography study has been carried out on pictures (Chandramouli and Memon, 2001;Shirali, 2005) video clips (Doërr and Dugelay, 2003;Doërr and Dugelay, 2004), music and sounds (Gopalan, 2003). Text steganography is the most difficult kind of steganography this is due largely to the relative lack of redundant information in a text file as compared with a picture or a sound file (Bender et al, 1996).…”
Section: Introductionmentioning
confidence: 99%