AUDIO STEGANOGRAPHY

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 1, Issue 2, No 2, 2013.

Copyright: All Rights Reserved ©2013

Year of Publication: 2013

Author: D.Seetha,Dr.P.Eswaran

Reference:IJCS-013

View PDF Format

Abstract

Steganography has been proposed as a new alternative technique to enforce data security. A perfect audioSteganographic technique aim at embedding data in an imperceptible, robust and secure way and then extracting it by authorized people. Hence, up to date the main challenge in digital audio steganography is to obtain robust high capacity steganographic systems. Leaning towards designing a system that ensures high capacity or robustness and security of embedded data has led to great diversity in the existing steganographic techniques. In this paper, we present a methods of audio steganography and how it works.

References

[1] Vijay Kumar Sharma, 2vishal Shrivastava,“A Steganography Algorithm For Hiding Image In Image By Improved LSB Substitution By Minimize Detection “Journal Of Theoretical And Applied Information Technology 15th February 2012. Vol. 36 No.1 [2] Jayaram , Ranganatha , Anupama , “Information Hiding Using Audio Steganography – A Survey”, The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011. [3] Prof.SamirKumar,BandyopadhyayBarnali, Gupta Banik,”LSB Modification and Phase Encoding Technique of Audio Steganography Revisited”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 4, June 2012.[4] Swati Malviya, Manish Saxena “Audio Steganography in a Nutshell”, International Journal of Electronics Communication and Computer Technology (IJECCT) Volume 2 Issue 5 (September 2012). [5] Swati Malviya, Manish Saxena, Dr. Anubhuti Khare,” Audio Steganography by Different Methods “,International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 7, July 2012)


Keywords

Steganography, information hiding, Parity coding, echo hiding , phase coding, spread spectrum

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog