2018
DOI: 10.1007/s11042-018-6213-0
|View full text |Cite
|
Sign up to set email alerts
|

High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
37
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 60 publications
(37 citation statements)
references
References 42 publications
0
37
0
Order By: Relevance
“…A digital watermark is called imperceptible if the original and watermarked images are perceptually indistinguishable. It might be fulfilled by sacrificing either robustness, capacity or both [7]. Robustness indicates the ability of the watermarking scheme to resist to different image processing operations.…”
Section: Imperceptibilitymentioning
confidence: 99%
“…A digital watermark is called imperceptible if the original and watermarked images are perceptually indistinguishable. It might be fulfilled by sacrificing either robustness, capacity or both [7]. Robustness indicates the ability of the watermarking scheme to resist to different image processing operations.…”
Section: Imperceptibilitymentioning
confidence: 99%
“…In the other side, there is a huge amount of information in social networks now and it's not difficult to hide a message in one way or another [5], [7]. In this case, if the disguised message under the typical content of a social network, then will be quite problematic to detect the fact of hiding information [1], [8], [9]. This information may be, for example, images or audio and hiding one at the other is a required task.…”
Section: Introductionmentioning
confidence: 99%
“…The essential requirements for audio steganography are: (1) the secret data should not be perceptible to humans [6,7]; (2) it should maximize the hiding capacity; and (3) preferably, the hidden data should be encrypted. In the digital world, two types of objects are used: either audio or image files as stego-objects for masking the furtive message [9]. By performing a bit change in the binary sequence of a sound file, the secret data are embedded into the original file.…”
Section: Introductionmentioning
confidence: 99%