2018
DOI: 10.1155/2018/1781384
|View full text |Cite
|
Sign up to set email alerts
|

Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect

Abstract: Steganography is a popular technique of digital data security. Among all digital steganography methods, audio steganography is very delicate as human auditory system is highly sensitive to noise; hence small modification in audio can make significant audible impact. In this paper, a key based blind audio steganography method has been proposed which is built on discrete wavelet transform (DWT) as well as discrete cosine transform (DCT) and adheres to Kerckhoff’s principle. Here image has been used as secret mes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…Use the modified phase matrix φ′n(ωk)and the original magnitude matrix An(ωk) to reconstruct the sound signal by applying the inverse DFT ( Banik & Bandyopadhyay, 2018). Figure 6 illustrates the method used at the sender site.…”
Section: ∆φN+1(ω) = φN+1(ωk) -φN(ωk) (Iv)mentioning
confidence: 99%
See 1 more Smart Citation
“…Use the modified phase matrix φ′n(ωk)and the original magnitude matrix An(ωk) to reconstruct the sound signal by applying the inverse DFT ( Banik & Bandyopadhyay, 2018). Figure 6 illustrates the method used at the sender site.…”
Section: ∆φN+1(ω) = φN+1(ωk) -φN(ωk) (Iv)mentioning
confidence: 99%
“…There are two main techniques for data hiding in audio, the first one is spatial domain techniques which consist mainly from LSB coding techniques (Shanthakumari et al, 2021), parity coding technique (Banik & Bandyopadhyay, 2018), and echo hiding technique (Xie & Wu, 2010). The second one is transform domain techniques which includes spread spectrum technique as in (Al-Najjar, 2008), phase coding technique (Alsabhany et al, 2019), discrete wavelet transform technique (Chen et al, 2021), tone incertion technique (Yousif et al, 2017) and amplitude coding technique ( Bharti et al, 2019).…”
Section: Introductionmentioning
confidence: 99%
“…Steganography is the technique of concealing digital data virtually so it cannot be detected [18]. The idea is to alter redundant data in protocols such that the carrier's usage properties are remain unaltered during transmission, hence concealing hidden information [19,20]. It is currently widely applied in text, voice, picture, and video transmission mediums.…”
Section: Introductionmentioning
confidence: 99%
“…The principle is to hide secret information without being noticed by a third party by modifying redundant data in digital media or protocols, such that the carrier's use attributes are not changed during transmission. By this means, a secret message can be embedded into cover objects and transmitted through public channels [2,3]. At present, it is widely used in transmission media such as voice, image, video, and text.…”
Section: Introductionmentioning
confidence: 99%
“…sc: secret communication,2 cac: confidentiality and certification,3 std: spatial and transform domain, 4 m-b: modle-based,5 avi: audio, video and image, 6 dp: data protection, 7 dian: data integrity, authentication and non-repudiation, 8 trscbc: transposition, replacement, stream cipher, block cipher.…”
mentioning
confidence: 99%