An approach to improve the robustness of substitution techniques of audio steganography
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audi...
| Main Authors: | Zamani, Mazdak, Abdul Manaf, Azizah, Ahmad, Rabiah, Zeki, Akram M. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/5462/ http://irep.iium.edu.my/5462/1/An_Approach_to_Improve_the_Robustness_of_Substitution_Techniques_of_Audio.pdf |
Similar Items
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
Robust Audio Steganography via Genetic Algorithm
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
A Novel Approach for Audio Watermarking
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Exploring the challenges of MP3 audio steganography
by: Atoum, Mohammed Salem, et al.
Published: (2014)
by: Atoum, Mohammed Salem, et al.
Published: (2014)
Steganography technique using modulus arithmetic
by: Jaafar, Sayuthi, et al.
Published: (2007)
by: Jaafar, Sayuthi, et al.
Published: (2007)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Spread Spectrum Audio Watermarking Using Vector Space Projections
by: Abubakar, Adamu I., et al.
Published: (2015)
by: Abubakar, Adamu I., et al.
Published: (2015)
Spread Spectrum Audio Watermarking Using Vector Space Projections
by: Adamu I., Abu Bakar, et al.
Published: (2015)
by: Adamu I., Abu Bakar, et al.
Published: (2015)
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Substitution-based approach for linguistic steganography using antonym
by: Mansor, Fawwaz Zamir
Published: (2017)
by: Mansor, Fawwaz Zamir
Published: (2017)
A robust watermark embedding in smooth areas
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Employing Psychoacoustic Model for Digital Audio Watermarking
by: Chai Siew, Li
Published: (2013)
by: Chai Siew, Li
Published: (2013)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
An intermediate significant bit (ISB) watermarking technique using neural networks
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)
by: Nur Shazana, Matri
Published: (2019)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Bio-inspired Audio Content-Based Retrieval
Framework (B-ACRF)
by: Muda, N. A.
Published: (2009)
by: Muda, N. A.
Published: (2009)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
A new robust image watermarking method using Dual Intermediate Significant Bits
by: Mohammed, Ghassan N., et al.
Published: (2014)
by: Mohammed, Ghassan N., et al.
Published: (2014)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
A robust algorithm for solving nonlinear system of equations using trust-region and line-search techniques
by: Kabir, M. Nomani
Published: (2020)
by: Kabir, M. Nomani
Published: (2020)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Robust blind watermarking approach against the compression for fingerprint image using 2D-DCT
by: Lebcir, Mohamed, et al.
Published: (2022)
by: Lebcir, Mohamed, et al.
Published: (2022)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
Similar Items
-
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009) -
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010) -
Robust Audio Steganography via Genetic Algorithm
by: Zamani, Mazdak, et al.
Published: (2009) -
An artificial-intelligence-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009) -
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)