2015
DOI: 10.1016/j.procs.2015.03.207
|View full text |Cite
|
Sign up to set email alerts
|

Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image

Abstract: Information security is one of the most important factors to be considered when secret information has to be communicated between two parties. Cryptography and steganography are the two techniques used for this purpose. Cryptography scrambles the information, but it reveals the existence of the information. Steganography hides the actual existence of the information so that anyone else other than the sender and the recipient cannot recognize the transmission. In steganography the secret information to be commu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
23
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(24 citation statements)
references
References 9 publications
1
23
0
Order By: Relevance
“…This is because the distortion that is done on the stego file is not that much since not all the samples are modified. Second, we objectively measure the stage quality by comparing it with the original file by using the following measurement methods: (i) SNR [11] that uses the square value of each sample to demonstrate the difference between the original audio signal and the stego audio signal as presented in Eq. (5), where is the number of the samples, is the original cover audio samples, and is the stego audio samples.…”
Section: The Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…This is because the distortion that is done on the stego file is not that much since not all the samples are modified. Second, we objectively measure the stage quality by comparing it with the original file by using the following measurement methods: (i) SNR [11] that uses the square value of each sample to demonstrate the difference between the original audio signal and the stego audio signal as presented in Eq. (5), where is the number of the samples, is the original cover audio samples, and is the stego audio samples.…”
Section: The Experimental Resultsmentioning
confidence: 99%
“…The former directly uses and handles the value of the audio samples and directly embed the data such as LSB methods and difference expansion; while the latter, which is called frequency domain, converts the audio into another domain and then embeds the secret bits within that particular domain such as discrete wavelet transform (DWT). In [10,11], The obtained values from this DWT are used to hide the secret binary bits.…”
Section: Secret Message (Payload)mentioning
confidence: 99%
“…are common attacks that the stego-image may experience. [9] 4) Capacity: it means the amount of data that a steganography algorithm can effectively mask without causing visual impairment to the image within a chosen cover medium. The rate of embedding is expressed mostly in absolute measurement (like the size of the secret message).…”
Section: Quality Evaluation Of Hiding Capacity and The Security Of Thmentioning
confidence: 99%
“…Message bit is embedded in LSB of DWT coefficients of the image [10]. Steganographic approach to hide audio signal within the image using DWT proves to provide increased security [11]. The image is segmented region wise and is combined with PSO which results in SRG (Seeded Region Growing).…”
Section: Related Workmentioning
confidence: 99%