Comparative Analysis of Audio Steganography Methods
Abstract
Keywords
References
- [1] Warkentin M., Schmidt M., Bekkering E. (2007). Steganography and steganalysis, Intellectual Property Protection for Multimedia Information Technology, IGI Global, 374-380, 9781599047621.
- [2] Guojie, H., Zhengjin, F., & Ruiling, M. (2003). Chosen ciphertext attack on chaos communication based on chaotic synchronization. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 50(2), 275-279.
- [3] Dutta, P., Bhattacharyya, D., Kim, T. (2009). Data Hiding in Audio Signal: A Review, International Journal of Database Theory and Application, 2(2):1-8.
- [4] Cvejic, N., Seppänen, T. (2003). Increasing the capacity of LSB-based audio steganography, IEEE Workshop on Multimedia Signal Processing, 336-338. doi: 10.1109/MMSP.2002.1203314.
- [5] Misshra S., Yadav, V.K., Trivedi, M.C., Shrimali, T. (2018). Audio Steganography Techniques: A Survey, Advances in Computer and Computational Sciences, Advances in Intelligent Systems and Computing 581-589. doi: 10.1007/978-981-10-3773-3_56.
- [6] Kaur, N., Behal, S. (2014). Audio Steganography Techniques-A Survey, Int. Journal of Engineering Research and Applications 94-100. doi: 10.14445/22315381/IJETT-V11P276.
- [7] Bhavana, D., Tej, D.R., Puneeth, M., Harini, A., Shankar, Y.M., Madhuri, T.S. (2015). Steganography Using Matlab, International Journal of Advanced Engineering Research and Science (IJAERS) 19-24. doi:10.22161/ijaers.
- [8] Wakiyama, M., Hidaka, Y., Nozaki, K. (2010). 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
Details
Primary Language
English
Subjects
Engineering
Journal Section
Research Article
Publication Date
June 8, 2022
Submission Date
May 7, 2021
Acceptance Date
January 22, 2022
Published in Issue
Year 2022 Volume: 6 Number: 1
