Comparative study of digital audio steganography techniques
dc.contributor.author | Djebbar, Fatiha | |
dc.contributor.author | Ayad, Beghdad | |
dc.contributor.author | Meraim, Karim Abed | |
dc.contributor.author | Hamam, Habib | |
dc.date.accessioned | 2020-01-27T06:02:24Z | |
dc.date.available | 2020-01-27T06:02:24Z | |
dc.date.copyright | 2012 | en_US |
dc.date.issued | 2012 | |
dc.description | This review is not available at CUD collection. The version of scholarly record of this review is published in Eurasip Journal on Audio, Speech, and Music Processing (2012), available online at: https://doi.org/10.1186/1687-4722-2012-25. | en_US |
dc.description.abstract | The rapid spread in digital data usage in many real life applications have urged new and effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by implementing steganograhy techniques. Novel and versatile audio steganographic methods have been proposed. The goal of steganographic systems is to obtain secure and robust way to conceal high rate of secret data. We focus in this paper on digital audio steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital audio steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. Another contribution of this paper is the provision of a robustness-based classification of steganographic models depending on their occurrence in the embedding process. A survey of major trends of audio steganography applications is also discussed in this paper. © 2012 Djebbar et al.; licensee Springer. | en_US |
dc.identifier.citation | Djebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. (2012). Comparative study of digital audio steganography techniques. Eurasip Journal on Audio, Speech, and Music Processing, 2012(1). https://doi.org/10.1186/1687-4722-2012-25 | en_US |
dc.identifier.issn | 16874714 | |
dc.identifier.uri | http://dx.doi.org/10.1186/1687-4722-2012-25 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12519/44 | |
dc.language.iso | en | en_US |
dc.relation | Authors Affiliations: Djebbar, F., AE University, Al Ain, United Arab Emirates; Ayad, B., Canadian University of Dubai, Dubai, United Arab Emirates; Meraim, K.A., Telecom ParisTech, Paris, France; Hamam, H., Faculty of Engineering, Université de Moncton, Moncton, NB, Canada | |
dc.relation.ispartofseries | Eurasip Journal on Audio, Speech, and Music Processing;Vol. 2012, no. 1 | |
dc.rights | Creative Commons Attribution 2.0 Generic (CC BY 2.0) | |
dc.rights.holder | Copyright : 2012 Djebbar et al.; licensee Springer | |
dc.rights.uri | https://creativecommons.org/licenses/by/2.0/ | |
dc.subject | Audio conferencing | en_US |
dc.subject | Audio steganography | en_US |
dc.subject | Comparative studies | en_US |
dc.subject | Embedding process | en_US |
dc.subject | Performance based | en_US |
dc.subject | Real-life applications | en_US |
dc.subject | Steganographic system | en_US |
dc.subject | Telecommunication technologies | en_US |
dc.subject | Telecommunication systems | en_US |
dc.subject | Internet telephony | en_US |
dc.title | Comparative study of digital audio steganography techniques | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Access Instruction 44.pdf
- Size:
- 55.95 KB
- Format:
- Adobe Portable Document Format
- Description: