원문정보
초록
영어
In this paper we propose the LSB technique for secure data transfer. Secret information can be hidden inside all sorts of cover information: text, images, audio, video and more. Embedding secret messages in digital sound is usually a more difficult process. Varieties of techniques for embedding information in digital audio have been established. These are parity coding, phase coding, spread spectrum, echo hiding, LSB. Least significant bits (LSB) insertion is one of the simplest approaches to embedding information in audio file.
목차
Abstract
1. Introduction
2. Previous works
2.1 Parity coding
2.2 Phase Coding
2.3 Spread Spectrum
2.4 Echo Hiding
3. Proposed work and Analysis
4. Conclusion
References
1. Introduction
2. Previous works
2.1 Parity coding
2.2 Phase Coding
2.3 Spread Spectrum
2.4 Echo Hiding
3. Proposed work and Analysis
4. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보
- 1B. Pfitzmann, “Information Hiding Terminology”, First International Workshop on Information Hiding, May 30 – June 1, 1996, Cambridge, UK, pp. 347‐350.
- 2Rade Petrovi, Kanaan Jemili, Joseph M. Winograd, Ilija Stojanovi, Eric Metois, “DATA HIDING WITHIN AUDIO SIGNALS”, June 15, 1999, MIT Media Lab, Series: Electronics and Energetics vol. 12, No.2, pp.103‐122. http://pubs.media.mit.edu/?section=docdetail&id=211474&collection=Media+Lab&filtercollection = Media+Lab
- 3J. Johnston and K. Brandenburg, "Wideband Coding Perceptual Consideration for Speech and Music".Advances in Speech Signal Processing, S. Furoi and M. Sondhi, Eds. New York: Marcel Dekker, 1992.
- 4W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, “Techniques for data hiding”, IBM Systems Journal, Volume 39 , Issue 3‐4, July 2000, pp. 547 – 568.
- 5Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das, Debashis Ganguly and Swarnendu Mukherjee, “A tutorial review on Steganography”, International Conference on Contemporary Computing (IC3‐2008), Noida, India, August 7‐9, 2008, pp. 105‐114.
- 6Steve Czerwinski, Richard Fromm, Todd Hodes, “Digital Music Distribution and Audio Watermarking”. http:// reference.kfupm.edu.sa/content/d/i/digital_music_distribution_and_audio_wat_1045219.pdf http://http.cs.berkeley.edu/~hodes/watermarking.ps (Source: Computer Science Division, University of California, Berkeley).
- 7Robert Krenn, “Steganography and steganalysis”, An Article, January 2004. http://www.krenn.nl/univ/cry/steg/article.pdf
- 8Francesco Queirolo, “Steganography in Images”, Final Communications Report. http://eric.purpletree.org/file/Steganography%20In%20Images.pdf
- 9Ingemar J. Cox, Ton Kalker, Georg Pakura and Mathias Scheel. “Information Transmission and Steganography”, Springer, Vol. 3710/2005, pp. 15‐29.
- 10LoboGuerrero, A., Marques, F., Lienard, P.B.J., “Enhanced audio data hiding synchronization using non linear filters”, ICASSP '04, 17‐21 May 2004, pp. ii‐ 885‐8 vol.2.
- 11Data Hiding in Audio Signal : A Reviewearticle 원문 이동