earticle

논문검색

데이터 보호

Secure Data Transfer through Audio Signal

초록

영어

In this paper we propose the LSB technique for secure data transfer. Secret information can be hidden inside all sorts of cover information: text, images, audio, video and more. Embedding secret messages in digital sound is usually a more difficult process. Varieties of techniques for embedding information in digital audio have been established. These are parity coding, phase coding, spread spectrum, echo hiding, LSB. Least significant bits (LSB) insertion is one of the simplest approaches to embedding information in audio file.

목차

Abstract
 1. Introduction
 2. Previous works
  2.1 Parity coding
  2.2 Phase Coding
  2.3 Spread Spectrum
  2.4 Echo Hiding
 3. Proposed work and Analysis
 4. Conclusion
 References

저자정보

  • Debnath Bhattacharyya Computer Science and Engineering Heritage Institute of Technology Kolkata, India
  • Poulami Dutta Computer Science and Engineering Heritage Institute of Technology Kolkata, India
  • Tai‐hoon Kim Professor, Department of Multimedia Engineering , Hannam University

참고문헌

자료제공 : 네이버학술정보
  • 1B. Pfitzmann, “Information Hiding Terminology”, First International Workshop on Information Hiding, May 30 – June 1, 1996, Cambridge, UK, pp. 347‐350.
  • 2Rade Petrovi, Kanaan Jemili, Joseph M. Winograd, Ilija Stojanovi, Eric Metois, “DATA HIDING WITHIN AUDIO SIGNALS”, June 15, 1999, MIT Media Lab, Series: Electronics and Energetics vol. 12, No.2, pp.103‐122. http://pubs.media.mit.edu/?section=docdetail&id=211474&collection=Media+Lab&filtercollection = Media+Lab
  • 3J. Johnston and K. Brandenburg, "Wideband Coding Perceptual Consideration for Speech and Music".Advances in Speech Signal Processing, S. Furoi and M. Sondhi, Eds. New York: Marcel Dekker, 1992.
  • 4W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, “Techniques for data hiding”, IBM Systems Journal, Volume 39 , Issue 3‐4, July 2000, pp. 547 – 568.
  • 5Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das, Debashis Ganguly and Swarnendu Mukherjee, “A tutorial review on Steganography”, International Conference on Contemporary Computing (IC3‐2008), Noida, India, August 7‐9, 2008, pp. 105‐114.
  • 6Steve Czerwinski, Richard Fromm, Todd Hodes, “Digital Music Distribution and Audio Watermarking”. http:// reference.kfupm.edu.sa/content/d/i/digital_music_distribution_and_audio_wat_1045219.pdf http://http.cs.berkeley.edu/~hodes/watermarking.ps (Source: Computer Science Division, University of California, Berkeley).
  • 7Robert Krenn, “Steganography and steganalysis”, An Article, January 2004. http://www.krenn.nl/univ/cry/steg/article.pdf
  • 8Francesco Queirolo, “Steganography in Images”, Final Communications Report. http://eric.purpletree.org/file/Steganography%20In%20Images.pdf
  • 9Ingemar J. Cox, Ton Kalker, Georg Pakura and Mathias Scheel. “Information Transmission and Steganography”, Springer, Vol. 3710/2005, pp. 15‐29.
  • 10LoboGuerrero, A., Marques, F., Lienard, P.B.J., “Enhanced audio data hiding synchronization using non linear filters”, ICASSP '04, 17‐21 May 2004, pp. ii‐ 885‐8 vol.2.
  • 11Data Hiding in Audio Signal : A Reviewearticle 원문 이동

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

0개의 논문이 장바구니에 담겼습니다.