2021
DOI: 10.11591/ijeecs.v22.i3.pp1777-1786
|View full text |Cite
|
Sign up to set email alerts
|

Securing audio transmission based on encoding and steganography

Abstract: One of the things that must be considered when establishing a data exchange connection is to make that communication confidential and hide the file’s features when the snoopers intercept it. In this work, transformation (encoding) and steganography techniques are invested to produce an efficient system to secure communication for an audio signal by producing an efficient method to transform the signal into a red–green–blue (RGB) image. Subsequently, this image is hidden in a cover audio file by using the least… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…The LSB embedding algorithm replaces the LSBs of the cover multimedia with the bit stream of the scrambled text to be hidden [ 2 ]. Due to the noise present in the multimedia, this process only changes the least significant bits of the original multimedia, and never the most significant bits (MSBs) [ 5 ]. This approach uses a maximum data transfer rate of 1 kbps per 1 kHz, which means that one LSB covers one bit of hidden data.…”
Section: Section 3: Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…The LSB embedding algorithm replaces the LSBs of the cover multimedia with the bit stream of the scrambled text to be hidden [ 2 ]. Due to the noise present in the multimedia, this process only changes the least significant bits of the original multimedia, and never the most significant bits (MSBs) [ 5 ]. This approach uses a maximum data transfer rate of 1 kbps per 1 kHz, which means that one LSB covers one bit of hidden data.…”
Section: Section 3: Methodologymentioning
confidence: 99%
“…Currently, the most frequent application of steganography is to hide one digital file within another [ 5 ]. In general, stego-data hiding requires three distinct characteristics that primarily act at the application level: security, capacity, and resilience.…”
Section: Section 1: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…where 𝑐1=(Z1𝐿) 2 , and 𝑐2=(Z2𝐿) 2 are both constant to avoid null dominator; L is the high range of the signal sample values; Z1 and Z2 have default values of 0.01 and 0.03, respectively. The identical score between the two measured signals is 1, decreasing to -1 as the signal changes [34]. See Table 3.…”
Section: Psnr and Mse Analysismentioning
confidence: 99%
“…2, November 2021: 831 -842 832 and at the same time, it is difficult to obtain the contents of the hidden message. If the doubt is lifted, the goal of that entire process is not achieved, and the science of steganography becomes useless [4], [11], [12], [16], [19], [23], [25], [33], [35]- [50].…”
Section: Introductionmentioning
confidence: 99%