2003
DOI: 10.1117/12.473138
|View full text |Cite
|
Sign up to set email alerts
|

<title>Audio steganography by amplitude or phase modification</title>

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Many methods and techniques for embedding messages have been implemented in the past few years. Gopalan et al (Kaliappan Gopalan et al 2003) proposed audio steganography for embedding messages using amplitude or phase modification. (Q. Liu, Sung, and Qiao 2011) was noticed as close paper and steganalysis of QIM steganography in low bit-rate speech signals where the loss of quality of speech is less.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many methods and techniques for embedding messages have been implemented in the past few years. Gopalan et al (Kaliappan Gopalan et al 2003) proposed audio steganography for embedding messages using amplitude or phase modification. (Q. Liu, Sung, and Qiao 2011) was noticed as close paper and steganalysis of QIM steganography in low bit-rate speech signals where the loss of quality of speech is less.…”
Section: Discussionmentioning
confidence: 99%
“…Gopalan (K. Gopalan 2003) presented a method of embedding a covert audio message into a cover file by altering one bit in each of the cover utterance samples. Gopalan et al (Kaliappan Gopalan et al 2003) provided two methods of secret message embedding by modifying the phase or amplitude of perceptually masked or significant regions of a host. A direct sequence spread-spectrum watermarking process with strong robustness against common audio editing procedures was proposed in (Kirovski and Malvar 2003).…”
Section: Introductionmentioning
confidence: 99%
“…Information of non-LSB methods are presented in Table 3. These methods include: Addition Method (AM) [10], Amplitude Modulation (AMod) [40], DWT-FFT [41], DWT fusion [42], Mp3Stego [43], Publimark [30], Quantization Index Method (QIM) [10], Stego wave [44], Stochastic Modulation (StMod) [45], WaSpStego [15], Wavelet LSB [10], Integer wavelet (I-Wavelet) [46], and DSSS in the frequency domain (DSSS + DCT) [47]. Table 4 presents the embedding algorithms that each paper has investigated.…”
Section: Discussionmentioning
confidence: 99%
“…The stego signal has an outward appearance almost identical to that of the original signal.Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. Several steganography methods by indirectly exploiting various limitations of HAS have been proposed with varying degrees of success [1][2][3][4][5]. These methods alter the audio signal by a small amount so that the change is imperceptible to HAS thereby, avoiding suspicion.…”
Section: Introductionmentioning
confidence: 99%