A secure audio steganography approach
A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution te...
| Main Authors: | , , , , , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
Institute of Electrical and Electronics Engineers ( IEEE )
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/467/ http://irep.iium.edu.my/467/1/A_SECURE_AUDIO_STEGANOGRAPHY_approach.pdf |
| _version_ | 1848775713868480512 |
|---|---|
| author | Zamani, Mazdak Abdul Manaf, Azizah Ahmad, Rabiah Jaryani, Farhang Taherdoost, Hamed Zeki, Akram M. |
| author_facet | Zamani, Mazdak Abdul Manaf, Azizah Ahmad, Rabiah Jaryani, Farhang Taherdoost, Hamed Zeki, Akram M. |
| author_sort | Zamani, Mazdak |
| building | IIUM Repository |
| collection | Online Access |
| description | A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. |
| first_indexed | 2025-11-14T14:18:35Z |
| format | Proceeding Paper |
| id | iium-467 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T14:18:35Z |
| publishDate | 2009 |
| publisher | Institute of Electrical and Electronics Engineers ( IEEE ) |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-4672014-12-09T02:31:20Z http://irep.iium.edu.my/467/ A secure audio steganography approach Zamani, Mazdak Abdul Manaf, Azizah Ahmad, Rabiah Jaryani, Farhang Taherdoost, Hamed Zeki, Akram M. QA76 Computer software A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. Institute of Electrical and Electronics Engineers ( IEEE ) 2009 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/467/1/A_SECURE_AUDIO_STEGANOGRAPHY_approach.pdf Zamani, Mazdak and Abdul Manaf, Azizah and Ahmad, Rabiah and Jaryani, Farhang and Taherdoost, Hamed and Zeki, Akram M. (2009) A secure audio steganography approach. In: UNSPECIFIED. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5402644&tag=1 INSPEC Accession Number: 11103332 |
| spellingShingle | QA76 Computer software Zamani, Mazdak Abdul Manaf, Azizah Ahmad, Rabiah Jaryani, Farhang Taherdoost, Hamed Zeki, Akram M. A secure audio steganography approach |
| title | A secure audio steganography approach |
| title_full | A secure audio steganography approach |
| title_fullStr | A secure audio steganography approach |
| title_full_unstemmed | A secure audio steganography approach |
| title_short | A secure audio steganography approach |
| title_sort | secure audio steganography approach |
| topic | QA76 Computer software |
| url | http://irep.iium.edu.my/467/ http://irep.iium.edu.my/467/ http://irep.iium.edu.my/467/ http://irep.iium.edu.my/467/1/A_SECURE_AUDIO_STEGANOGRAPHY_approach.pdf |