2020
DOI: 10.1016/j.cosrev.2020.100316
|View full text |Cite
|
Sign up to set email alerts
|

Digital audio steganography: Systematic review, classification, and analysis of the current state of the art

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(16 citation statements)
references
References 60 publications
0
9
0
Order By: Relevance
“…This type is called target or specific, while the other one is the universal type where the features are identified as a behavioral pattern regardless of the embedding technique. Some steganography techniques follow sequentially or linear access of the cover medium unit for embedding [40]. This leads to an obvious pattern that can be easily detected; for example, a change in the expected JPEG compression quantization nature [16].…”
Section: Signature Steganalysismentioning
confidence: 99%
“…This type is called target or specific, while the other one is the universal type where the features are identified as a behavioral pattern regardless of the embedding technique. Some steganography techniques follow sequentially or linear access of the cover medium unit for embedding [40]. This leads to an obvious pattern that can be easily detected; for example, a change in the expected JPEG compression quantization nature [16].…”
Section: Signature Steganalysismentioning
confidence: 99%
“…The information of the original sample value can be contained as the absolute difference between the original sample value (đ‘„) with the last mirror point formed on the same sample (see (16)). This value is then converted to its binary value with total bits (𝐾 𝑖 ) following the chosen bit as in (9).…”
Section: Embedding Stagementioning
confidence: 99%
“…While the former works by changing the representation of information so that only the receiver can access the real information due to its unreadable format, the latter works by hiding the secret information inside a file called the cover. In its implementation, this cover can be any type of data: image [7] [8], video [10], or audio [9] [11]. Furthermore, text can also be utilized for the same purpose [12].…”
Section: Introductionmentioning
confidence: 99%
“…RDH can extract the embedded data and recover the medium losslessly, which is useful for hiding sensitive information such as in the military, medical, legal, or something that requires no change in a media cover [3,4]. Many RDH algorithms have been developed in various methods and applications, which are analyzed from different aspects, like in encrypted images [5], digital audio-based classification [6], trends of digital image-based data hiding [7], attack to cipher images [8], two-layer embedding [9], and predictor-based RDH [10]. In detail, the introduced methods include difference expansion (DE), histogram shifting (HS), and pixel value ordering (PVO), for various purposes, like file tampering detection [11] and watermarking [12].…”
Section: Introductionmentioning
confidence: 99%
“…In detail, the introduced methods include difference expansion (DE), histogram shifting (HS), and pixel value ordering (PVO), for various purposes, like file tampering detection [11] and watermarking [12]. Furthermore, RDH can be developed in various media, like image [7], audio [6], and video [13], with either spatial or frequency domain. For example, multiple prediction error expansion [14], gametheoretic approach [15], and dual-images [16].…”
Section: Introductionmentioning
confidence: 99%