Steganography in Audio Files – COTS Software Analysis

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Techniques for Steganography of Audio Files

The rise and development of multimedia and digital information has made communication easier and quicker. However with digital information, comes a responsibility to communicate securely and effectively. As digital information is easy to distribute and alter, therefore it is prone to various attacks and threats. Various security measures are taken while dealing with digital information. Audio S...

متن کامل

Steganography in Audio Files by Entropy using FEC as Reed–Solomon of VOIP Streams

In this paper introduce a novel technique to identify the voice (active frames) and silent regions (inactive frames) of a speech stream very much suitable for VoIP calls. Thus here the proposed a better voice activity detection based on the entropy algorithm. High-capacity steganography algorithm for embedding data in the inactive frames . Then inactive frames are encoded by G. 723. 1 source co...

متن کامل

Genetic Algorithm in Audio Steganography

-With the advancement of communication technology, data is exchanged digitally over the network. At the other side the technology is also proven as a tool for unauthorized access to attackers. Thus the security of data to be transmitted digitally should get prime focus. Data hiding is the common approach to secure data. In steganography technique, the existence of data is concealed. GA is an em...

متن کامل

Seamless navigation in audio files

New audio services require editing tools for audio files. Indexing is a solution for fast access to specific information which could be speaker identity, location of speaker intervention on the file, topic identification. Good editing tools for text files have been available for many years and a solution for seamless navigation in an audio file could be the recognition of the content of the fil...

متن کامل

Secret sharing in audio steganography

This paper demonstrates the feasibility of combining the use of secret sharing in conjunction with audio steganography to provide a robust way to store and transmit secret data. Storage of secret information is a constant security concern in the corporate and military environment. Cryptography and steganography are two known techniques that deal with this concern. Recently, the combination of t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electronics and Telecommunications

سال: 2023

ISSN: ['2300-1933', '2081-8491']

DOI: https://doi.org/10.24425/ijet.2023.144340