Comparative study of digital audio steganography techniques

dc.contributor.authorDjebbar, Fatiha
dc.contributor.authorAyad, Beghdad
dc.contributor.authorMeraim, Karim Abed
dc.contributor.authorHamam, Habib
dc.date.accessioned2020-01-27T06:02:24Z
dc.date.available2020-01-27T06:02:24Z
dc.date.copyright2012en_US
dc.date.issued2012
dc.descriptionThis review is not available at CUD collection. The version of scholarly record of this review is published in Eurasip Journal on Audio, Speech, and Music Processing (2012), available online at: https://doi.org/10.1186/1687-4722-2012-25.en_US
dc.description.abstractThe rapid spread in digital data usage in many real life applications have urged new and effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by implementing steganograhy techniques. Novel and versatile audio steganographic methods have been proposed. The goal of steganographic systems is to obtain secure and robust way to conceal high rate of secret data. We focus in this paper on digital audio steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital audio steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. Another contribution of this paper is the provision of a robustness-based classification of steganographic models depending on their occurrence in the embedding process. A survey of major trends of audio steganography applications is also discussed in this paper. © 2012 Djebbar et al.; licensee Springer.en_US
dc.identifier.citationDjebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. (2012). Comparative study of digital audio steganography techniques. Eurasip Journal on Audio, Speech, and Music Processing, 2012(1). https://doi.org/10.1186/1687-4722-2012-25en_US
dc.identifier.issn16874714
dc.identifier.urihttp://dx.doi.org/10.1186/1687-4722-2012-25
dc.identifier.urihttps://hdl.handle.net/20.500.12519/44
dc.language.isoenen_US
dc.relationAuthors Affiliations: Djebbar, F., AE University, Al Ain, United Arab Emirates; Ayad, B., Canadian University of Dubai, Dubai, United Arab Emirates; Meraim, K.A., Telecom ParisTech, Paris, France; Hamam, H., Faculty of Engineering, Université de Moncton, Moncton, NB, Canada
dc.relation.ispartofseriesEurasip Journal on Audio, Speech, and Music Processing;Vol. 2012, no. 1
dc.rightsCreative Commons Attribution 2.0 Generic (CC BY 2.0)
dc.rights.holderCopyright : 2012 Djebbar et al.; licensee Springer
dc.rights.urihttps://creativecommons.org/licenses/by/2.0/
dc.subjectAudio conferencingen_US
dc.subjectAudio steganographyen_US
dc.subjectComparative studiesen_US
dc.subjectEmbedding processen_US
dc.subjectPerformance baseden_US
dc.subjectReal-life applicationsen_US
dc.subjectSteganographic systemen_US
dc.subjectTelecommunication technologiesen_US
dc.subjectTelecommunication systemsen_US
dc.subjectInternet telephonyen_US
dc.titleComparative study of digital audio steganography techniquesen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Access Instruction 44.pdf
Size:
55.95 KB
Format:
Adobe Portable Document Format
Description: