An introduction to image steganography techniques

AAJ Altaay, SB Sahib, M Zamani - … international conference on …, 2012 - ieeexplore.ieee.org
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …

A simple review of audio steganography

D Tan, Y Lu, X Yan, X Wang - 2019 IEEE 3rd Information …, 2019 - ieeexplore.ieee.org
Stegnography is very important because it conceals the existence of communication itself.
Nowadays, people use a variety of multimedia files as stegnography carriers. Recently …

Stego machine–video steganography using modified LSB algorithm

M Ramalingam - International Journal of Information and …, 2011 - publications.waset.org
Computer technology and the Internet have made a breakthrough in the existence of data
communication. This has opened a whole new way of implementing steganography to …

[PDF][PDF] Audio steganography: a survey on recent approaches

M Nosrati, R Karimi, M Hariri - world applied programming, 2012 - researchgate.net
In this study, we will have a survey on audio steganography recent researches. Due to it,
some basic concepts of audio steganography and HAS including Least Significant Bit (LSB) …

A GA based audio steganography with enhanced security

K Bhowal, D Bhattacharyya, A Jyoti Pal… - Telecommunication …, 2013 - Springer
In the current internet community, secure data transfer is limited due to its attack made on
data communication. So more robust methods are chosen so that they ensure secured data …

Genetic algorithm for fragile audio watermarking

M Zamani, ABA Manaf - Telecommunication Systems, 2015 - Springer
A novel genetic-concept-based algorithm is proposed for fragile audio watermarking to
reduce the distortion of least significant bits substitution and consequently improve the peak …

[PDF][PDF] A comparative study of audio steganography techniques

P Singh - International Research Journal of Engineering and …, 2016 - academia.edu
The emerging growth in use of digital data recommended the need of effective measure to
ensure security of digital data. The goal of steganography is to hide information by …

Chaos-based audio steganography and cryptography using LSB method and one-time pad

SMH Alwahbani, HTI Elshoush - Proceedings of SAI Intelligent Systems …, 2018 - Springer
This paper presents a chaos-based audio steganography and cryptography method that is
based on Least Significant Bit (LSB) and one-time pad, respectively. In the proposed …

An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer

R Tanwar, K Singh, M Zamani… - Journal of computer …, 2019 - Wiley Online Library
Being easy to understand and simple to implement, substitution technique of performing
steganography has gain wide popularity among users as well as attackers. Steganography …

Audio steganography using GA

K Bhowal, AJ Pal, GS Tomar… - 2010 International …, 2010 - ieeexplore.ieee.org
Audio Steganography is a method that ensures secured data transfer between parties
normally in internet community. In this paper, we present a novel, principled approach to …