A genetic-algorithm-based approach for audio steganography
In this paper, we present a novel, principled approach to resolve the remained problems of substitution technique of audio steganography. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness spec...
| Main Authors: | Zamani, Mazdak, Abdul Manaf, Azizah, Ahmad, Rabiah, Zeki, Akram M., Abdullah, Shahidan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
World Academy of Science, Engineering and Technology (W A S E T)
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/1143/ http://irep.iium.edu.my/1143/1/A_Genetic-Algorithm-Based_Approach_for_Audio_Steganography.pdf |
Similar Items
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Robust Audio Steganography via Genetic Algorithm
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
A Novel Approach for Audio Watermarking
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Exploring the challenges of MP3 audio steganography
by: Atoum, Mohammed Salem, et al.
Published: (2014)
by: Atoum, Mohammed Salem, et al.
Published: (2014)
Dynamics of watermark position in audio watermarked
files using neural networks
by: Abubakar, Adamu, et al.
Published: (2017)
by: Abubakar, Adamu, et al.
Published: (2017)
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
Steganography based on utilizing more surrounding pixels
by: Afrakhteh, Masoud
Published: (2010)
by: Afrakhteh, Masoud
Published: (2010)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
An Approach to Derive Parametric L-System Using Genetic Algorithm
by: Farooq, H., et al.
Published: (2009)
by: Farooq, H., et al.
Published: (2009)
The Impact of Overclocking the CPU to the Genetic Algorithm
by: Ahmed , Hikmat, et al.
Published: (2009)
by: Ahmed , Hikmat, et al.
Published: (2009)
Watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2010)
by: Zeki, Akram M., et al.
Published: (2010)
Steganography technique using modulus arithmetic
by: Jaafar, Sayuthi, et al.
Published: (2007)
by: Jaafar, Sayuthi, et al.
Published: (2007)
Process Sequencing Modeled as TSP with Precedence Constraints - A Genetic Algorithm Approach
by: N. M., Razali
Published: (2014)
by: N. M., Razali
Published: (2014)
Genetic algorithms for gene ontology - based protein sequence annotation
by: Othman, Muhamad Razib
Published: (2007)
by: Othman, Muhamad Razib
Published: (2007)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Incorporating semantic similarity measure in genetic algorithm: an approach for searching the gene ontology terms
by: M. Othman, Razib, et al.
Published: (2007)
by: M. Othman, Razib, et al.
Published: (2007)
Fuzzy C-Mean And Genetic Algorithms Based Scheduling For Independent Jobs In Computational Grid
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
A Genetic Algorithm Based Approach for Solving
the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
Crossover and mutation operators of genetic algorithms
by: Siew, Mooi Lim, et al.
Published: (2017)
by: Siew, Mooi Lim, et al.
Published: (2017)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
Similar Items
-
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010) -
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009) -
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009) -
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009) -
Robust Audio Steganography via Genetic Algorithm
by: Zamani, Mazdak, et al.
Published: (2009)