A secure audio steganography approach
A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution te...
Main Authors: | , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers ( IEEE )
2009
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/467/ http://irep.iium.edu.my/467/ http://irep.iium.edu.my/467/ http://irep.iium.edu.my/467/1/A_SECURE_AUDIO_STEGANOGRAPHY_approach.pdf |
id |
iium-467 |
---|---|
recordtype |
eprints |
spelling |
iium-4672014-12-09T02:31:20Z http://irep.iium.edu.my/467/ A secure audio steganography approach Zamani, Mazdak Abdul Manaf, Azizah Ahmad, Rabiah Jaryani, Farhang Taherdoost, Hamed Zeki, Akram M. QA76 Computer software A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. Institute of Electrical and Electronics Engineers ( IEEE ) 2009 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/467/1/A_SECURE_AUDIO_STEGANOGRAPHY_approach.pdf Zamani, Mazdak and Abdul Manaf, Azizah and Ahmad, Rabiah and Jaryani, Farhang and Taherdoost, Hamed and Zeki, Akram M. (2009) A secure audio steganography approach. In: UNSPECIFIED. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5402644&tag=1 INSPEC Accession Number: 11103332 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Zamani, Mazdak Abdul Manaf, Azizah Ahmad, Rabiah Jaryani, Farhang Taherdoost, Hamed Zeki, Akram M. A secure audio steganography approach |
description |
A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. |
format |
Conference or Workshop Item |
author |
Zamani, Mazdak Abdul Manaf, Azizah Ahmad, Rabiah Jaryani, Farhang Taherdoost, Hamed Zeki, Akram M. |
author_facet |
Zamani, Mazdak Abdul Manaf, Azizah Ahmad, Rabiah Jaryani, Farhang Taherdoost, Hamed Zeki, Akram M. |
author_sort |
Zamani, Mazdak |
title |
A secure audio steganography approach |
title_short |
A secure audio steganography approach |
title_full |
A secure audio steganography approach |
title_fullStr |
A secure audio steganography approach |
title_full_unstemmed |
A secure audio steganography approach |
title_sort |
secure audio steganography approach |
publisher |
Institute of Electrical and Electronics Engineers ( IEEE ) |
publishDate |
2009 |
url |
http://irep.iium.edu.my/467/ http://irep.iium.edu.my/467/ http://irep.iium.edu.my/467/ http://irep.iium.edu.my/467/1/A_SECURE_AUDIO_STEGANOGRAPHY_approach.pdf |
first_indexed |
2023-09-18T20:07:36Z |
last_indexed |
2023-09-18T20:07:36Z |
_version_ |
1777407262593122304 |