Nehru et al., 2012 - Google Patents
A detailed look of audio steganography techniques using LSB and genetic algorithm approachNehru et al., 2012
- Document ID
- 9180905228433448977
- Author
- Nehru G
- Dhar P
- Publication year
- Publication venue
- International Journal of Computer Science Issues (IJCSI)
External Links
Snippet
This paper is the study of various techniques of audio steganography using different algorithmis like genetic algorithm approach and LSB approach. We have tried some approaches that helps in audio steganography. As we know it is the art and science of …
- 238000000034 method 0 title abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Nehru et al. | A detailed look of audio steganography techniques using LSB and genetic algorithm approach | |
| Jayaram et al. | Information hiding using audio steganography–a survey | |
| Bandyopadhyay et al. | A tutorial review on steganography | |
| Dutta et al. | Data hiding in audio signal: A review | |
| Bhowal et al. | A GA based audio steganography with enhanced security | |
| Nosrati et al. | Audio steganography: a survey on recent approaches | |
| Steinebach et al. | Watermarking-based digital audio data authentication | |
| Meligy et al. | An efficient method to audio steganography based on modification of least significant bit technique using random keys | |
| Zamani et al. | An approach to improve the robustness of substitution techniques of audio steganography | |
| Ghoshal et al. | A novel technique for image authentication in frequency domain using discrete Fourier transformation technique (IAFDDFTT) | |
| Pawar et al. | Review on steganography for hiding data | |
| Kondo | Multimedia Information Hiding Technologies and Methodologies for Controlling Data | |
| Kekre et al. | Increasing the capacity of the cover audio signal by using multiple LSBs for information hiding | |
| Katariya | Digital watermarking | |
| Ahuja et al. | A survey of digital watermarking scheme | |
| Singh et al. | A survey on Steganography in Audio | |
| Bhowal et al. | Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions. | |
| Ur-Rehman et al. | Digital watermarking for image authentication | |
| Parab et al. | Audio steganography using differential phase encoding | |
| Khurana | Watermarking and information-hiding | |
| Shrestha et al. | Audio Steganography | |
| Bhitre et al. | A review on audio and video based steganography for data hiding | |
| Kumar et al. | DWT and LSB based Audio Steganography-A Review | |
| Shan | Wavelet domain self synchronization digital audio watermarking algorithm based on channel information | |
| Nsayif | Text in Audio Steganography |