scispace - formally typeset
Proceedings ArticleDOI

A view on latest audio steganography techniques

TLDR
A current state of art literature in digital audio steganographic techniques is presented and their potentials and limitations to ensure secure communication are explored.
Abstract
Steganography has been proposed as a new alternative technique to enforce data security. Lately, novel and versatile audio steganographic methods have been proposed. A perfect audio Steganographic technique aim at embedding data in an imperceptible, robust and secure way and then extracting it by authorized people. Hence, up to date the main challenge in digital audio steganography is to obtain robust high capacity steganographic systems. Leaning towards designing a system that ensures high capacity or robustness and security of embedded data has led to great diversity in the existing steganographic techniques. In this paper, we present a current state of art literature in digital audio steganographic techniques. We explore their potentials and limitations to ensure secure communication. A comparison and an evaluation for the reviewed techniques is also presented in this paper.

read more

Citations
More filters
Journal ArticleDOI

Comparative study of digital audio steganography techniques

TL;DR: Current digital audio steganographic techniques are reviewed and evaluated based on robustness, security and hiding capacity indicators and a robustness-based classification of steganography models depending on their occurrence in the embedding process is provided.
Journal ArticleDOI

Hiding Data in Images Using Cryptography and Deep Neural Network

TL;DR: This research combines steganography, cryptography with the neural networks all together to hide an image inside another container image of the larger or same size.
Journal ArticleDOI

Steganography in digital images: Common approaches and tools

TL;DR: A representation of steganography area is graphically and mathematically shown and a demonstration of how secret information is embedded into an image through the use of available steganographic tools is shown.
Journal ArticleDOI

A Steganography Approach over Video Images to Improve Security

TL;DR: This paper presents a secure data hiding technique for video images using random key encoding function and demonstrates the performance of the proposed scheme in terms of security and (Peak signal noise ratio) PSNR values.
Journal ArticleDOI

Audio Steganography in Wavelet Domain - A Survey

TL;DR: Among the techniques studied wavelet domain shows high hiding capacity and transparency, and different techniques are applied on the wavelet coefficients to increase the hidingcapacity and perceptual transparency.
References
More filters
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Journal ArticleDOI

Evaluation of Objective Quality Measures for Speech Enhancement

TL;DR: The evaluation of correlations of several objective measures with these three subjective rating scales is reported on and several new composite objective measures are also proposed by combining the individual objective measures using nonparametric and parametric regression analysis techniques.
Proceedings Article

Echo Hiding

TL;DR: These echoes can be used to place digital identi cation tags directly into an audio signal with minimal objectionable degradation of the original signal.
Proceedings ArticleDOI

Audio steganography using bit modification

TL;DR: The results, based on cover signals from a clean TIMIT utterance and a noisy aircraft cockpit utterance, show that the technique meets several major criteria for successful covert communication.