Journal articles on the topic 'Audio steganography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Audio steganography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alieksieiev, Artem, and Igor Svatovskiy. "ANALYSIS OF COMMON AUDIO STEGANOGRAPHY METHODS." Grail of Science, no. 34 (December 16, 2023): 117–18. http://dx.doi.org/10.36074/grail-of-science.08.12.2023.24.
Full textNoor Azam, Muhammad Harith, Farida Ridzuan, M. Norazizi Sham Mohd Sayuti, A. H. Azni, Sakinah Ali Pitchay, and Najwa Hayaati Mohd Alwi. "A Method of Cover Audio Selection for Embedding Based on Various Criteria." ITM Web of Conferences 63 (2024): 01001. http://dx.doi.org/10.1051/itmconf/20246301001.
Full textBuchyk, Serhii, Oksana Khomenko, and Yuriy Serpinsky. "Steganographic system for hiding text information in audio files." Information systems and technologies security, no. 1 (6) (2023): 13–20. http://dx.doi.org/10.17721/ists.2023.1.13-20.
Full textAl Hadad, Zeina, and Ibtisam Hassoun Ali. "Survey in Image and Audio Steganography by using the Deep Learning Methods." Journal of Kufa for Mathematics and Computer 10, no. 2 (2023): 132–39. http://dx.doi.org/10.31642/jokmc/2018/100222.
Full textDengre, Amit, and A. D. Gawande. "Audio Encryption and Digital Image Watermarking in an Uncompress Video." International Journal of Advances in Applied Sciences 4, no. 2 (2015): 66. http://dx.doi.org/10.11591/ijaas.v4.i2.pp66-72.
Full textGhane, Mohamed C., Maider D. Uribarri, Ramzi Djemai, Dipo Dunsin, and Istteffanny I. Araujo. "A Novel Hybrid Method for Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files." Journal of Information Security and Cybercrimes Research 6, no. 2 (2023): 89–104. http://dx.doi.org/10.26735/izbk9372.
Full textHajer, Muatamed, and Mohammed Anbar. "Identifying optimal message embedding location in audio steganography using generative adversarial networks." Eastern-European Journal of Enterprise Technologies 4, no. 9(118) (2022): 59–68. http://dx.doi.org/10.15587/1729-4061.2022.263695.
Full textMaricar, M. Chaeril, and Seng Hansun. "Implementasi Audio Steganografi menggunakan 4th LSB dan Advanced Encryption Standard pada Windows Phone." Jurnal ULTIMA Computing 7, no. 1 (2016): 1–4. http://dx.doi.org/10.31937/sk.v7i1.442.
Full textMaurya, Indu, and S. K Gupta. "Understandable Steganography." International Journal of Engineering & Technology 7, no. 3 (2018): 1024. http://dx.doi.org/10.14419/ijet.v7i3.8940.
Full textJusoh, Suhaibah, Aida Mustapha, Azizan Ismail, and Roshidi Din. "A review of arabic text steganography: past and present." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 2 (2020): 1040. http://dx.doi.org/10.11591/ijeecs.v17.i2.pp1040-1046.
Full textG.mohammed, Sajaa. "A survey on Rijndael based LSB Audio Steganography techniques." Wasit Journal for Pure sciences 2, no. 4 (2023): 80–87. http://dx.doi.org/10.31185/wjps.245.
Full textSetiaji, Hartoko Carolus Ferdy, Suhartono Tjondronegoro, and Bambang Hidayat. "Audio Steganography using Modified Enhanced Least Significant Bit in 802.11n." Journal of Measurements, Electronics, Communications, and Systems 1, no. 1 (2015): 7. http://dx.doi.org/10.25124/jmecs.v1i1.1479.
Full textLi, Jing, Kaixi Wang, and Xiaozhu Jia. "A Coverless Audio Steganography Based on Generative Adversarial Networks." Electronics 12, no. 5 (2023): 1253. http://dx.doi.org/10.3390/electronics12051253.
Full textJain, Nikhil. "Wavelet Transform based Steganography." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 1398–402. http://dx.doi.org/10.22214/ijraset.2021.35105.
Full textAlexander, Anu Sara, and L. C. Manikandan. "A Study on Steganography Concealing Data." European Journal of Engineering Research and Science 4, no. 5 (2019): 115–18. http://dx.doi.org/10.24018/ejers.2019.4.5.1337.
Full textAlexander, Anu Sara, and L. C. Manikandan. "Study on Steganography Concealing Data." European Journal of Engineering and Technology Research 4, no. 5 (2019): 115–18. http://dx.doi.org/10.24018/ejeng.2019.4.5.1337.
Full textPhipps, Anthony, Karim Ouazzane, and Vassil Vassilev. "Securing Voice Communications Using Audio Steganography." International Journal of Computer Network and Information Security 14, no. 3 (2022): 1–18. http://dx.doi.org/10.5815/ijcnis.2022.03.01.
Full textAlhassan, Salamudeen, Mohammed Ibrahim Daabo, and Gabriel Kofi Armah. "Twin K-Shuffle Based Audio Steganography." Asian Journal of Engineering and Applied Technology 11, no. 1 (2022): 1–4. http://dx.doi.org/10.51983/ajeat-2022.11.1.3200.
Full textAruna, Ms T. N., L. R. Nandika, C. I. Sneha, imothy Jerald Xavier, and Treesa Mary George. "Text, Image and Audio Steganography." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 4435–39. http://dx.doi.org/10.22214/ijraset.2023.51091.
Full textGupta Banik, Barnali, and Samir Kumar Bandyopadhyay. "Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect." Security and Communication Networks 2018 (2018): 1–21. http://dx.doi.org/10.1155/2018/1781384.
Full textVejare, Ritvij, Abhishek Vaish, Kapish Singh, and Mrunali Desai. "Removal of Image Steganography using Generative Adversarial Network." Indian Journal of Artificial Intelligence and Neural Networking 2, no. 4 (2022): 6–10. http://dx.doi.org/10.54105/ijainn.d1054.062422.
Full textSrivastava, Mayank, and Mohd Qasim Rafiq. "A Novel Approach to Secure Communication Using Audio Steganography." Advanced Materials Research 403-408 (November 2011): 963–69. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.963.
Full textAcharjee, T., A. Choudhury, and P. Kumar. "A Hybrid Audio Steganography Method." International Journal of Computer Sciences and Engineering 6, no. 12 (2018): 558–62. http://dx.doi.org/10.26438/ijcse/v6i12.558562.
Full textRana, Manisha, and Rohit Tanwar. "Genetic Algorithm in Audio Steganography." International Journal of Engineering Trends and Technology 13, no. 1 (2014): 29–34. http://dx.doi.org/10.14445/22315381/ijett-v13p206.
Full textTharmia, Akshay, Niketan Kudtarkar, Nishant Mishra, Sarthak Bhingarde, and Rohini Patil. "Genetic Algorithm Based Audio Steganography." International Journal of Engineering Trends and Technology 46, no. 3 (2017): 174–77. http://dx.doi.org/10.14445/22315381/ijett-v46p230.
Full textJian, Chua Teck, Chuah Chai Wen, Nurul Hidayah Binti Ab. Rahman, and Isredza Rahmi Binti A. Hamid. "Audio Steganography with Embedded Text." IOP Conference Series: Materials Science and Engineering 226 (August 2017): 012084. http://dx.doi.org/10.1088/1757-899x/226/1/012084.
Full textPuranik, Prof, S. W. "Video Steganography." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 11 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26643.
Full textReddy, Reddyvari Venkateswara. "Message Encapsulation in-Text, Image, Audio and Video." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 136–43. http://dx.doi.org/10.22214/ijraset.2024.59730.
Full textNoor Azam, Muhammad Harith, Farida Ridzuan, and M. Norazizi Sham Mohd Sayuti. "A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography." Pertanika Journal of Science and Technology 30, no. 1 (2022): 497–511. http://dx.doi.org/10.47836/pjst.30.1.27.
Full textJulianto, Yohanes, and Kristoforus Jawa Bendi. "SISTEM STEGANOGRAFI DENGAN METODE LEAST SIGNIFICANT BIT (LSB) TERACAK." Jurnal Ilmiah Flash 2, no. 2 (2016): 116. http://dx.doi.org/10.32511/jiflash.v2i2.32.
Full textJulianto, Yohanes, and Kristoforus Jawa Bendi. "SISTEM STEGANOGRAFI DENGAN METODE LEAST SIGNIFICANT BIT (LSB) TERACAK." Jurnal Ilmiah Flash 2, no. 2 (2016): 116. http://dx.doi.org/10.32511/flash.v2i2.32.
Full textKumar, P. Mohan, and K. L. Hanmuganathan. "Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate." Journal of Telecommunications and Information Technology, no. 2 (June 27, 2023): 61–66. http://dx.doi.org/10.26636/jtit.2011.2.1146.
Full textSayed, Mohamed H., and Talaat M. Wahbi. "Information Security for Audio Steganography Using a Phase Coding Method." European Journal of Theoretical and Applied Sciences 2, no. 1 (2024): 634–47. http://dx.doi.org/10.59324/ejtas.2024.2(1).55.
Full textMangikuppe Venkateshaiah, Namitha, and Manjula Govinakovi Rudrappa. "High-capacity steganography through audio fusion and fission." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 1 (2024): 643. http://dx.doi.org/10.11591/ijeecs.v33.i1.pp643-652.
Full textPeling, Ida Bagus Adisimakrisna, and Nyoman Putra Sastra. "Enhanced Audio Steganografi dengan Algoritma Advanced Encryption Standard untuk Pengamanan Data pada File Audio." Majalah Ilmiah Teknologi Elektro 17, no. 1 (2018): 66. http://dx.doi.org/10.24843/mite.2018.v17i01.p09.
Full textJangra, Taruna, and Dr Dinesh Singh. "MESSAGE GUIDED RANDOM AUDIO STEGANOGRAPHY USING MODIFIED LSB TECHNIQUE." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 5 (2014): 3464–69. http://dx.doi.org/10.24297/ijct.v12i5.2916.
Full textSusilawati Mohamad, Fatma, and Nurul Sahira Mohd Yasin. "Information Hiding Based on Audio Steganography using Least Significant Bit." International Journal of Engineering & Technology 7, no. 4.15 (2018): 536. http://dx.doi.org/10.14419/ijet.v7i4.15.28363.
Full textJournal, Baghdad Science. "Steganography in Audio Using Wavelet and DES." Baghdad Science Journal 12, no. 2 (2015): 431–36. http://dx.doi.org/10.21123/bsj.12.2.431-436.
Full textAli, Rasha H. "Steganography in Audio Using Wavelet and DES." Baghdad Science Journal 12, no. 2 (2015): 431–36. http://dx.doi.org/10.21123/bsj.2015.12.2.431-436.
Full textOKELLO, Moses Oyaro. "Transmission of Secret Information Based on Time Instances." Eurasia Proceedings of Science Technology Engineering and Mathematics 16 (December 31, 2021): 209–18. http://dx.doi.org/10.55549/epstem.1068612.
Full textMudusu, Rambabu, A. Nagesh, and M. Sadanandam. "Enhancing Data Security Using Audio-Video Steganography." International Journal of Engineering & Technology 7, no. 2.20 (2018): 276. http://dx.doi.org/10.14419/ijet.v7i2.20.14777.
Full textHussain Ali, Ahmed, MohdRosmadiMokhtar MohdRosmadiMokhtar, and LoayEdwar George. "A Review on Audio Steganography Techniques." Research Journal of Applied Sciences, Engineering and Technology 12, no. 2 (2016): 154–62. http://dx.doi.org/10.19026/rjaset.12.2316.
Full textDuong, Lai Van. "Detecting Audio Steganography using Machine Learning." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (2020): 5815–20. http://dx.doi.org/10.30534/ijatcse/2020/240942020.
Full textRasedur, Md, Partha Chakraborty, Md Zahidur, and Md Golam. "Hiding Confidential File using Audio Steganography." International Journal of Computer Applications 178, no. 50 (2019): 30–35. http://dx.doi.org/10.5120/ijca2019919422.
Full textMazdak Zamani, Azizah Bt Abdul Manaf, and Shahidan M. Abdullah. "An Overview on Audio Steganography Techniques." International Journal of Digital Content Technology and its Applications 6, no. 13 (2012): 107–22. http://dx.doi.org/10.4156/jdcta.vol6.issue13.13.
Full textMalik, Garima. "Effective Security Mechanism for Audio Steganography." IARJSET 4, no. 7 (2017): 109–12. http://dx.doi.org/10.17148/iarjset.2017.4717.
Full textYousif, Suhaip A., Talaat M.wahbi, and Mohamed H. Sayed. "Audio Steganography Using Tone Insertion Technique." International Journal of Computer Applications Technology and Research 6, no. 6 (2017): 254–58. http://dx.doi.org/10.7753/ijcatr0606.1004.
Full textMohammed, Saja, and Faris Mohammed. "Suggested Method for Audio File Steganography." AL-Rafidain Journal of Computer Sciences and Mathematics 10, no. 1 (2013): 285–95. http://dx.doi.org/10.33899/csmj.2013.163459.
Full textUdhamSingh, Kamred. "A Survey on Audio Steganography Approaches." International Journal of Computer Applications 95, no. 14 (2014): 7–14. http://dx.doi.org/10.5120/16660-6640.
Full textSakthisudhan, K., S. Gayathri Priya, P. Prabhu, and P. Thangaraj. "Secure Data Transmission Using Audio Steganography." i-manager's Journal on Electronics Engineering 2, no. 3 (2012): 1–6. http://dx.doi.org/10.26634/jele.2.3.1763.
Full text