A secure audio steganography approach

A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution te...

Full description

Bibliographic Details
Main Authors: Zamani, Mazdak, Abdul Manaf, Azizah, Ahmad, Rabiah, Jaryani, Farhang, Taherdoost, Hamed, Zeki, Akram M.
Format: Conference or Workshop Item
Language:English
Published: Institute of Electrical and Electronics Engineers ( IEEE ) 2009
Subjects:
Online Access:http://irep.iium.edu.my/467/
http://irep.iium.edu.my/467/
http://irep.iium.edu.my/467/
http://irep.iium.edu.my/467/1/A_SECURE_AUDIO_STEGANOGRAPHY_approach.pdf
id iium-467
recordtype eprints
spelling iium-4672014-12-09T02:31:20Z http://irep.iium.edu.my/467/ A secure audio steganography approach Zamani, Mazdak Abdul Manaf, Azizah Ahmad, Rabiah Jaryani, Farhang Taherdoost, Hamed Zeki, Akram M. QA76 Computer software A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. Institute of Electrical and Electronics Engineers ( IEEE ) 2009 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/467/1/A_SECURE_AUDIO_STEGANOGRAPHY_approach.pdf Zamani, Mazdak and Abdul Manaf, Azizah and Ahmad, Rabiah and Jaryani, Farhang and Taherdoost, Hamed and Zeki, Akram M. (2009) A secure audio steganography approach. In: UNSPECIFIED. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5402644&tag=1 INSPEC Accession Number: 11103332
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Zamani, Mazdak
Abdul Manaf, Azizah
Ahmad, Rabiah
Jaryani, Farhang
Taherdoost, Hamed
Zeki, Akram M.
A secure audio steganography approach
description A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness.
format Conference or Workshop Item
author Zamani, Mazdak
Abdul Manaf, Azizah
Ahmad, Rabiah
Jaryani, Farhang
Taherdoost, Hamed
Zeki, Akram M.
author_facet Zamani, Mazdak
Abdul Manaf, Azizah
Ahmad, Rabiah
Jaryani, Farhang
Taherdoost, Hamed
Zeki, Akram M.
author_sort Zamani, Mazdak
title A secure audio steganography approach
title_short A secure audio steganography approach
title_full A secure audio steganography approach
title_fullStr A secure audio steganography approach
title_full_unstemmed A secure audio steganography approach
title_sort secure audio steganography approach
publisher Institute of Electrical and Electronics Engineers ( IEEE )
publishDate 2009
url http://irep.iium.edu.my/467/
http://irep.iium.edu.my/467/
http://irep.iium.edu.my/467/
http://irep.iium.edu.my/467/1/A_SECURE_AUDIO_STEGANOGRAPHY_approach.pdf
first_indexed 2023-09-18T20:07:36Z
last_indexed 2023-09-18T20:07:36Z
_version_ 1777407262593122304