Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Steganography is an art and a science of communicating in a way, which hides the existence of thecommunication. It is also called as “covered writing”, because it uses a “cover” of a message for sending anyimportant secret message. In the steganographic scenario, the secret data is first concealed within anotherobject which is called “cover object”, to form “stego-object” and then this new object can be transmitted orsaved. Using different techniques, we can send secret data in the form of an image, a music file or even a videofile by embedding it into the carrier, forming a stego-signal. At the receiver’s end, the secret data can berecovered from the stego-signal using different algorithms. The main goal of Steganography is to communicatesecurely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hiddendata. It is not only prevents others from knowing the hidden information, but it also prevents others fromthinking that the information even exists. If a Steganography method causes someone to suspect there is secretinformation in a carrier medium, then the method has failed.
Authors and Affiliations
Sumeet Gupta , Dr. Namrata Dhanda
An Efficient Method for Noisy Annotation Data Modeling
Abstract : Probabilistic topic models are used for analyzing and extracting content-related annotations from noisy annotated discrete data like WebPages on WWW and these WebPages are stored using social bookmarking servi...
Performance Comparison of SVM and ANN in Predicting Compressive Strength of Concrete
Abstract : Concrete compressive strength prediction is very important in structure and building design, particularly in specifying the quality and measuring performance of concrete as well as determination of its mix p...
A Review on Content Based Medical Image Retrieval for Different Imaging Modalities, Organs and Diseases
This paper presents a review on Content based medical image retrieval for medical imaging modalities. Theevolution in the field of medical imaging system has lead industries to intellectualize a complete automated system...
Iris recognition by using blood vessel segmentation
Abstract: Among the various biometrics technologies, iris recognition is the most reliable and accurate biometric identification system available. In this paper a novel framework for recognizing and identifying iris is b...
Efficient Data Caching Based On Fuzzy Decision Routing InVehicle Disruption Tolerant Networks
Abstract: Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable nodemobility, and lack of global network information. Most of current research efforts in DTNs focus on dataforward...