Academic literature on the topic 'Audio steganography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Audio steganography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Audio steganography"

1

Alieksieiev, Artem, and Igor Svatovskiy. "ANALYSIS OF COMMON AUDIO STEGANOGRAPHY METHODS." Grail of Science, no. 34 (December 16, 2023): 117–18. http://dx.doi.org/10.36074/grail-of-science.08.12.2023.24.

Full text
Abstract:
In the face of modern challenges, the protection of vital interests of a person and a citizen is fundamental to the issue of national security. In this context, the ability to freely transfer confidential information is very important. One of the possible solutions is the use of steganographic methods. Digital audio steganography has advantages over other types of steganography. This makes it important to analyze the most common audio steganography methods.
APA, Harvard, Vancouver, ISO, and other styles
2

Khushi, Kalra Anvesh Tewari Yash Gaur Ashish Kumar. "COMPREHENSIVE LITERATURE REVIEW OF COVER OBJECTS AND THEIR EMBEDDING PROCEDURE IN STEGANOGRAPHY." International Journal For Technological Research In Engineering 12, no. 5 (2025): 21–60. https://doi.org/10.5281/zenodo.15005142.

Full text
Abstract:
Steganography is the practice of obfuscating information such that it is difficult for an unauthorized individual to discover its presence inside other non-secret data, such as an image, audio file, or text. Steganography's primary function is to safeguard communication by disguising private data from prying eyes. Since the use of encryption techniques might draw attention to communication, steganography can also be used to evade discovery by uninvited parties. Steganography can offer an extra degree of protection by completely concealing the message's existe
APA, Harvard, Vancouver, ISO, and other styles
3

Muhammad, Abdul Haris, and Gamaria Mandar. "National Institute of Standard Technology Approach for Steganography Detection on WhatsApp Audio Files." Mobile and Forensics 6, no. 2 (2024): 74–82. http://dx.doi.org/10.12928/mf.v6i2.11287.

Full text
Abstract:
Audio steganography in instant messaging applications such as WhatsApp poses new challenges in the field of digital security, especially due to the ability to hide data in frequently used formats. This research examines the effectiveness of steganography detection on WhatsApp audio files by applying a method developed by the National Institute of Standards and Technology (NIST). This approach was chosen due to its reputation in security testing standards, but its use in the context of audio steganography on instant messaging platforms has not been widely explored. The novelty of this research
APA, Harvard, Vancouver, ISO, and other styles
4

Michał, Bajor, and Niemiec Marcin. "A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020) (2020): 261–75. https://doi.org/10.11610/isij.4718.

Full text
Abstract:
Steganography in audio files usually revolves around well-known concepts and algorithms, least significant bit algorithm to name one. This paper pro-poses a new, alternative approach where steganographic information is con-nected with the medium even more – by using the medium itself as the infor-mation. The goal of this paper is to present a new aspect of steganography, which utilizes machine learning. This form of steganography may produce sta-tistically indeterminable steganographic files which are immune to brute force attempts at trying to retrieve the hidden messages. Then the prop
APA, Harvard, Vancouver, ISO, and other styles
5

Noor Azam, Muhammad Harith, Farida Ridzuan, M. Norazizi Sham Mohd Sayuti, A. H. Azni, Sakinah Ali Pitchay, and Najwa Hayaati Mohd Alwi. "A Method of Cover Audio Selection for Embedding Based on Various Criteria." ITM Web of Conferences 63 (2024): 01001. http://dx.doi.org/10.1051/itmconf/20246301001.

Full text
Abstract:
The main goal of an audio steganography method is to improve the capacity, im-perceptibility, and robustness. Several methods of audio steganography have been proposed to enhance its capabilities. To further optimize the efficiency of the audio steganography method, this paper proposes to select the appropriate audio cover for concealing the message. The selection of an appropriate cover can significantly improve the quality of the output and facilitate the development of innovative audio steganography techniques. This paper proposed a new audio cover selection method, which can further enhanc
APA, Harvard, Vancouver, ISO, and other styles
6

Buchyk, Serhii, Oksana Khomenko, and Yuriy Serpinsky. "Steganographic system for hiding text information in audio files." Information systems and technologies security, no. 1 (6) (2023): 13–20. http://dx.doi.org/10.17721/ists.2023.1.13-20.

Full text
Abstract:
Audio file steganography can be used as an effective and efficient method to hide messages, but it is a complex process because the human auditory system is sensitive to small changes in audio data. In this article an improved approach for hiding secret text message in audio is presented, combining steganography and cryptography. The Least Significant Bits (LSB) technique, one of the most common and basic methods of steganography, is used as an algorithm for steganographic transformation. The described point of this method is to replace the least significant bits of the audio container with me
APA, Harvard, Vancouver, ISO, and other styles
7

Dengre, Amit, and A. D. Gawande. "Audio Encryption and Digital Image Watermarking in an Uncompress Video." International Journal of Advances in Applied Sciences 4, no. 2 (2015): 66. http://dx.doi.org/10.11591/ijaas.v4.i2.pp66-72.

Full text
Abstract:
The growth of high speed computer networks and that of the Internet, in particular, has increased the ease of Information Communication. Ironically, the cause for the development is also of the apprehension - use of digital formatted data. In comparison with Analog media, Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. But this type advancement in the field of data communication in other sense has hiked the fear of getting the data snooped at the time of sending it from the sender to the receiver. So, Information Secu
APA, Harvard, Vancouver, ISO, and other styles
8

Al Hadad, Zeina, and Ibtisam Hassoun Ali. "Survey in Image and Audio Steganography by using the Deep Learning Methods." Journal of Kufa for Mathematics and Computer 10, no. 2 (2023): 132–39. http://dx.doi.org/10.31642/jokmc/2018/100222.

Full text
Abstract:
Steganography is the practise of secretly encoding information into another medium (called a cover media) such that its existence cannot be identified. Steganography is the method that is utilised to successfully do this task. Through the use of digital image steganography, one is able to achieve the capacity of secure communication, which is vital in the bulk of the applications that are now being created. The use of steganography is applicable in a wide variety of advantageous settings. Its ascent to the forefront of current security systems may be attributed to a confluence of factors, incl
APA, Harvard, Vancouver, ISO, and other styles
9

Ghane, Mohamed C., Maider D. Uribarri, Ramzi Djemai, Dipo Dunsin, and Istteffanny I. Araujo. "A Novel Hybrid Method for Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files." Journal of Information Security and Cybercrimes Research 6, no. 2 (2023): 89–104. http://dx.doi.org/10.26735/izbk9372.

Full text
Abstract:
Anti-forensics techniques, particularly steganography and cryptography, have become increasingly pressing issues affecting current digital forensics practices. This paper advances the automation of hidden evidence extraction in audio files by proposing a novel multi-approach method. This method facilitates the correlation between unprocessed artefacts, indexed and live forensics analysis, and traditional steganographic and cryptographic detection techniques. In this work, we opted for experimental research methodology in the form of a quantitative analysis of the efficiency of the proposed aut
APA, Harvard, Vancouver, ISO, and other styles
10

Hajer, Muatamed, and Mohammed Anbar. "Identifying optimal message embedding location in audio steganography using generative adversarial networks." Eastern-European Journal of Enterprise Technologies 4, no. 9(118) (2022): 59–68. http://dx.doi.org/10.15587/1729-4061.2022.263695.

Full text
Abstract:
Audio steganography (AS) uses the auditory redundancy of the human ear to conceal the hidden message inside the audio track. In recent studies, deep learning-based steganalysis has swiftly revealed AS by extracting high-dimensional stego acoustic features for categorization. There is still an opportunity for improvement in the current audio steganography required for managing communication confidentiality, access control and data protection. The main objective of this research is to improving the data protection by identifying the data embedding location in the audio. Generative Adversarial Ne
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Audio steganography"

1

Cvejic, N. (Nedeljko). "Algorithms for audio watermarking and steganography." Doctoral thesis, University of Oulu, 2004. http://urn.fi/urn:isbn:9514273842.

Full text
Abstract:
Abstract Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for innovation. Versatile and simple-to-use software and decreasing prices of digital devices have made it possible for consumers from all around the world to create and exchange multimedia data. Broadband Internet connections and near error-free transmission of data facilitate people to distribute large multimedia files and make identical digital copies of them. A perfect reproduction in digital domain have promoted the protection of intellectual ownership and t
APA, Harvard, Vancouver, ISO, and other styles
2

Djebbar, Fatiha. "Contributions to Audio Steganography : Algorithms and Robustness Analysis." Thesis, Brest, 2012. http://www.theses.fr/2012BRES0005.

Full text
Abstract:
La stéganographie numérique est une technique récente qui a émergé comme une source importante pour la sécurité des données. Elle consiste à envoyer secrètement et de manière fiable des informations dissimulées et non pas seulement à masquer leur présence. Elle exploite les caractéristiques des fichiers médias numériques anodins, tels que l’image, le son et la vidéo,et les utilise comme support pour véhiculer des informations secrète d’une façon inaperçue. Les techniques de cryptage et de tatouage sont déjà utilisées pour résoudre les problèmes liés à la sécurité des données. Toutefois,l’évolu
APA, Harvard, Vancouver, ISO, and other styles
3

Djebbar, Fatiha. "Contributions to Audio Steganography : Algorithms and Robustness Analysis." Electronic Thesis or Diss., Brest, 2012. http://www.theses.fr/2012BRES0005.

Full text
Abstract:
La stéganographie numérique est une technique récente qui a émergé comme une source importante pour la sécurité des données. Elle consiste à envoyer secrètement et de manière fiable des informations dissimulées et non pas seulement à masquer leur présence. Elle exploite les caractéristiques des fichiers médias numériques anodins, tels que l’image, le son et la vidéo,et les utilise comme support pour véhiculer des informations secrète d’une façon inaperçue. Les techniques de cryptage et de tatouage sont déjà utilisées pour résoudre les problèmes liés à la sécurité des données. Toutefois,l’évolu
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Chao-Kuo, and 黃照摑. "IMPROVEMENT METHODS FOR AUDIO STEGANOGRAPHY." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/b423ss.

Full text
Abstract:
碩士<br>大同大學<br>通訊工程研究所<br>106<br>In modern life, various media such as the internet are often used to transmit and receive personal or business information. This also means that transmitting information may be extracted by illegal hackers. Thus, in order to improve the privacy and security in information transmitting, the development of steganography has received increasing attention. In a word, the technique of steganography is to hide secret information in an ordinary cover medium to produce a secret-embedded medium that is very similar to the original cover medium, referred to as the stego m
APA, Harvard, Vancouver, ISO, and other styles
5

Hsu, Fu-Chieh, and 許富傑. "Study of Audio Steganography with Chaotic Encryption." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/80917950067424867247.

Full text
Abstract:
碩士<br>中華科技大學<br>電子工程研究所碩士班<br>99<br>The information hiding is a technique to carry the hidden information by cover file which were usually show as digital watermarking to protect the intellectual property, secondly it can be use on secret communication. The researches of audio information hiding were rarely proposed before due to the one-dimensional audio signal is more sensitive than the two-dimensional image signal in human perception therefore to increase obliviousness is a critical issue. The purpose of this thesis is to investigate the steganography algorithm with chaotic theory in audio
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Li-yeh, and 楊力燁. "Improved LSB audio steganography algorithms for message security." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/03241547863403739352.

Full text
Abstract:
碩士<br>大同大學<br>通訊工程研究所<br>104<br>In the current internet scenario, secure data transmission is limited due to its attack made on data communication. Therefore, more robust security methods are required to ensure secure data transmission. One solution to the above problem is the technique of steganography. Audio steganography is one kind of steganography, which is concerned with hiding information in a cover (host) audio signal in an imperceptible way. Least significant bit (LSB) technique is the most simple and efficient technique used for audio steganography. But it is unfortunate that convent
APA, Harvard, Vancouver, ISO, and other styles
7

Lai, Wei-Chou, and 賴韋州. "Stereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure Tones." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/09641543960914960452.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>101<br>Audio steganography is a technique that hiding messages into audio such that no one except the sender and intended recipient suspects the existence of the messages. In this paper we proposed a new method for stereo audio steganography, which employs some characteristics of human auditory system (HAS). Messages are embedded by inserting low-frequency and octave-equivalent pure tones into different channels. By comparing the frequency domain data of left channel and right channel, the hidden messages are detected. The experiment results demonstrate that compari
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Audio steganography"

1

Crawford, Heather, and John Aycock. "Supraliminal Audio Steganography: Audio Files Tricking Audiophiles." In Information Hiding. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04431-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roy, Sangita, and Vivek Kapoor. "High Data Rate Audio Steganography." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0324-5_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Sheng, Imran Khan, and Yasir Ullah. "Audio Steganography by Additional Channel." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8944-2_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nathan, Mark, Nikhil Parab, and K. T. Talele. "Audio Steganography Using Spectrum Manipulation." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20209-4_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mishra, Shilpi, Virendra Kumar Yadav, Munesh Chandra Trivedi, and Tarun Shrimali. "Audio Steganography Techniques: A Survey." In Advances in Computer and Computational Sciences. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3773-3_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anupriya, K., Revathy R. Nair, and V. Leena. "An Attainment Upgrade in Audio Steganography." In Advances in Intelligent Systems and Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3174-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Parab, Nikhil, Mark Nathan, and K. T. Talele. "Audio Steganography Using Differential Phase Encoding." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20209-4_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Monika, A., R. Eswari, and Swastik Singh. "Detection of Location of Audio-Stegware in LSB Audio Steganography." In Proceedings of International Conference on Computational Intelligence and Data Engineering. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0609-3_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sawant, Swapnil, Jill Shah, Aryan Sankholkar, Yash Umredkar, Manjusha Kashilkar, and Kiran Deshpande. "Sound Secret Audio Crypt—LSB-Based Audio Steganography Using RSA." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-6036-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Darsana, R., and Asha Vijayan. "Audio Steganography Using Modified LSB and PVD." In Trends in Network and Communications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22543-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Audio steganography"

1

Singh, Raghwendra Pratap, and Manoj Kumar. "Enhancing Audio Steganography: Advancing Audio Steganography with Cryptographic Hashing." In 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N). IEEE, 2024. https://doi.org/10.1109/icac2n63387.2024.10895509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pleshkova, Snezhana, and Alexander Bekiarski. "Generative Audio Steganography Algorithm." In 2024 XXXIII International Scientific Conference Electronics (ET). IEEE, 2024. http://dx.doi.org/10.1109/et63133.2024.10721560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kiran, Gandikota Prasanth Satya Sai, Nandigama Sushma, Esa Vinay, and Subba Reddy Chavva. "Concealing Text Messages in Audio Using Steganography." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Srinidhi, Srivageesh K., K. S. Vishal, U. Someswara Shashank, T. V. Nidhin Prabhakar, and Rimjhim Singh. "Video Based Steganography for Audio using LSB Approach." In 2024 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI). IEEE, 2024. https://doi.org/10.1109/cvmi61877.2024.10782459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Estrera, Paul Joseph M., Ariel M. Sison, and Ruji P. Medina. "CryptoStego:Enhancing RSA with Optimize RC4 for Audio Steganography." In 2024 15th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2024. https://doi.org/10.1109/ictc62082.2024.10827798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tanwar, Rohit, and Monika Bisla. "Audio steganography." In 2014 International Conference on Optimization, Reliabilty, and Information Technology (ICROIT). IEEE, 2014. http://dx.doi.org/10.1109/icroit.2014.6798347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kakde, Yugeshwari, Priyanka Gonnade, and Prashant Dahiwale. "Audio-video steganography." In 2015 International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS). IEEE, 2015. http://dx.doi.org/10.1109/iciiecs.2015.7192885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abdulhameed Alher, Zainab, Basma M. Al Imran, and Israa Al Ali. "LSB as a Steganography Tool in Information Security." In 5TH INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND COMPUTER SCIENCE (CIC-COCOS'24). Cihan University-Erbil, 2024. http://dx.doi.org/10.24086/cocos2024/paper.1157.

Full text
Abstract:
Least Significant Bit (LSB) method was used to encrypt and decrypt text in images to improve secret communication. An extensive investigation of the use, experimentation, and assessment of a hidden writing strategies to better understand how concealed communication promotes protected interaction and addresses ongoing difficulties. A retrospective and current analysis of concealing messages, practical application and appraisal of LSB approach, and a detailed review of its pros and cons. This examination delves deeply into steganography, specifically the technique of least significant bit encodi
APA, Harvard, Vancouver, ISO, and other styles
9

Hemeida, Farah, Wassim Alexan, and Salma Mamdouh. "Blowfish–Secured Audio Steganography." In 2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES). IEEE, 2019. http://dx.doi.org/10.1109/niles.2019.8909206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Shivani, Virendra Kumar Yadav, Munesh Chandra Trivedi, and Avadesh Gupta. "Audio Steganography using ZDT." In the Second International Conference. ACM Press, 2016. http://dx.doi.org/10.1145/2905055.2905272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!