2022
DOI: 10.3390/s22093115
|View full text |Cite
|
Sign up to set email alerts
|

Direct Spread Spectrum Technology for Data Hiding in Audio

Abstract: Direct spread spectrum technology is traditionally used in radio communication systems with multiple access, for example, in CDMA standards, in global satellite navigation systems, in Wi-Fi network wireless protocols, etc. It ensures high security and reliability of information transfer. In addition, spread spectrum technology provides the transmitted signals with a noise-like appearance, thus hiding the semantic content of the messages. We researched this technology for other implementations. The purpose of o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 53 publications
0
5
0
Order By: Relevance
“…A model of steganographic data transformation operations based on the finite integral ring theorem has been built. This has made it possible to formalize the operations performed in the steganographic transformation algorithm and estimate the equivalent W-function for the algorithm of power residues (formula (9) when performing key data partitioning (8)).…”
Section: Discussion Of Results Of the Construction Of A Mathematical ...mentioning
confidence: 99%
See 1 more Smart Citation
“…A model of steganographic data transformation operations based on the finite integral ring theorem has been built. This has made it possible to formalize the operations performed in the steganographic transformation algorithm and estimate the equivalent W-function for the algorithm of power residues (formula (9) when performing key data partitioning (8)).…”
Section: Discussion Of Results Of the Construction Of A Mathematical ...mentioning
confidence: 99%
“…Article [8] reports the research results of direct spectrum expansion technology for hiding data in an audio container. The work highlights the advantages of using this technology to ensure data security.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…[2], offered more advanced techniques for incorporating information while preserving perceptual quality. Starting from [12], audio and video files emerged as new areas of exploration, where spread spectrum techniques were employed to distribute concealed data throughout the carrier signal in order to reduce the chances of detection. Mathematical transformations were utilised in audio steganography to seamlessly insert information, particularly in the transform domain [8].…”
Section: A Journey Through Steganography's Past and Presentmentioning
confidence: 99%
“…ii. Image and Audio Steganography: Financial data can be concealed within digital photos or audio files by altering attributes such as pixel colour values or audio frequencies [12]. Commonly employed techniques, such as least significant bit (LSB) modification and spread spectrum, are frequently utilised [7].…”
Section: Techniques Of Financial Steganographymentioning
confidence: 99%
“…The paper [5] describes the technology of direct spectrum enhancement for data hiding in audio. The article shows the advantage of using this technology for data security.…”
Section: Literature Reviewmentioning
confidence: 99%