Audio steganography with enhanced LSB method for securing encrypted text with bit cycling

EW Abood, AM Abdullah, MA Al Sibahe… - Bulletin of Electrical …, 2022 - beei.org
Data security pressing issue, particularly in terms of ensuring secure and reliable data
transfer over a network. Encryption and seganography play a fundamental role in the task of …

Secure message embedding in audio

R Hussein, W Alexan - 2019 2nd International Conference on …, 2019 - ieeexplore.ieee.org
Since the rise of the Internet, information security has been one of the most important factors
in networking. Cryptography and steganography are the arts and sciences of secret …

Logistic tan map based audio steganography

MT Elkandoz, W Alexan - 2019 international conference on …, 2019 - ieeexplore.ieee.org
Steganography is the art of concealing a message within an unremarkable cover media in
order to avoid detection. This paper proposes using both cryptography for scrambling the …

[PDF][PDF] Secure image hiding in speech signal by steganography-mining and encryption

AH Khaleel, IQ Abduljaleel - Indonesian Journal of …, 2021 - faculty.uobasrah.edu.iq
Information hiding techniques are constantly evolving due to the increased need for security
and confidentiality. This paper proposes a working mechanism in three phases. The first …

[PDF][PDF] Hiding text in speech signal using K-means, LSB techniques and chaotic maps.

IQ Abduljaleel, AH Khaleel - International Journal of …, 2020 - faculty.uobasrah.edu.iq
In this paper, a new technique that hides a secret text inside a speech signal without any
apparent noise is presented. The technique for encoding the secret text is through first …

Direct spread spectrum technology for data hiding in audio

A Kuznetsov, A Onikiychuk, O Peshkova, T Gancarczyk… - Sensors, 2022 - mdpi.com
Direct spread spectrum technology is traditionally used in radio communication systems with
multiple access, for example, in CDMA standards, in global satellite navigation systems, in …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based
and word-rule based. Additionally, it analyses the performance and the metric evaluation of …

Recent Trends for Practicing Steganography Using Audio as Carrier: A Study

R Joshi, MC Trivedi, V Goyal, D Bhati - Advances in Data and Information …, 2022 - Springer
In today's digital world, confidential information exchange over public communication
channel suffers from several issues. Steganography is considered to be one of the concepts …

[PDF][PDF] Comparative Analysis of Audio Steganography Methods

F Aslantaş, C Hanilçi - Journal of Innovative Science and …, 2022 - dergipark.org.tr
Abstract Information security has been one of the most important issues of all time for both
individuals and companies. Delivering data to the correct recipient is crucial for personal …

Steganography Audio Files Using EAS Method and AES CBC Algorithm for Data Security

M Taruk, H Hamdani… - 2024 11th International …, 2024 - ieeexplore.ieee.org
The ease of exchanging information can be misused by irresponsible parties to commit
various cybercrimes such as data tapping. Therefore, this study was conducted with the aim …