DWT and LSB based Audio Steganography- A Review
Journal Title: International Journal of Engineering and Management Research - Year 2018, Vol 8, Issue 1
Abstract
Steganography may be a technique for hiding data in a host signal. The host signal may be a still image, speech or video and therefore the message signal that's hidden within the host signal can be a text, image or an audio signal. For data hiding in acoustic, discrete cosine transform (DCT) and discrete wavelet transform (DWT) both are used. Perfect audio Steganography technique aim at embedding data in an imperceptible, robust and secure way and so extracting it by authorized people. Hence, up to this point the main challenge in digital audio steganography is to get robust high capacity steganography systems. Leaning towards designing a system that ensures high capacity or robustness and security of embedded data has LED to great diversity within the existing steganography techniques. In this paper, we tend to present a existing position of art literature in digital audio steganography technique. In this paper a completely unique methodology for digital audio steganography someplace encrypted concealed data is embedded by adaptively modifying wavelet packet coefficients of host audio signal. Steganography is an information hiding technique where secret message is embedded into unsuspecting cover signal. Measuring of fine steganography algorithmic rule includes security, capacity, robustness and imperceptibility.
Electrical Power Theft Intimation Over SMS
Theft Intimations based Electricity Theft Identification system. This project will not only useful to electricity theft, and but also calculating the fare, and using the prepaid card for transfer the SMS to the centre ob...
Algorithm Decision Support in Determining Bidikmisi Scholarship Receive (Case Study: Bidikmisi Scholarship)
The purpose of this research is to find a better method for decision making of Bidikmisi scholarship by comparing FCM and AHP methods. The result show that AHP better then FCM method, where the suitable of decision makin...
Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2) using VHDL Implemented on FPGA of SHA-224/256 Core
Cryptography plays an important role in the security of data. Even though the data is encrypted it can be altered while transmitting on the network so data should be verified using a digital signature. Hashing algorithms...
Importance of ARIMA Model in Prediction of Jute Production
Jute palys an important role in the development of economy in Bangladesh and thus the forecasting of jute production by applying scientific process will definitely contribute to the upliftment of the socio economic condi...
A Brief Survey on Impact of Flood on Children, Water Sanitation and Hygiene in Kashmir Valley
Considerable rainfall raises the water level. When the water level is higher than the conduit bank, the water diverts out from the stream, there will surge. Surges are caused by atmosphere ponders and events that pass on...