Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Steganography is an art and a science of communicating in a way, which hides the existence of thecommunication. It is also called as “covered writing”, because it uses a “cover” of a message for sending anyimportant secret message. In the steganographic scenario, the secret data is first concealed within anotherobject which is called “cover object”, to form “stego-object” and then this new object can be transmitted orsaved. Using different techniques, we can send secret data in the form of an image, a music file or even a videofile by embedding it into the carrier, forming a stego-signal. At the receiver’s end, the secret data can berecovered from the stego-signal using different algorithms. The main goal of Steganography is to communicatesecurely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hiddendata. It is not only prevents others from knowing the hidden information, but it also prevents others fromthinking that the information even exists. If a Steganography method causes someone to suspect there is secretinformation in a carrier medium, then the method has failed.
Authors and Affiliations
Sumeet Gupta , Dr. Namrata Dhanda
Content Based Image Retrieval for Unlabelled Images
Recently, content-based image retrieval has become hot topic and the techniques of content-based image retrieval have been achieved good development. Content-based image retrieval systems were introduced to...
A review of the existing state of Personality prediction of Twitterusers with Machine Learning Algorithms
Abstract: Twitter is a popular social media platform with millions of users. The tweets shared by these usershave recently attracted the attention of researchers from diverse fields. In this paper, we focus primarily onp...
An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash functions (MD5 and SHA variants
Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....
Analysis of Time Complexities and Accuracy of Depression FillingAlgorithms in DEM
Abstract: The recent development of digital representation has stimulated the development of automaticextraction of topographic and hydrologic information from Digital Elevation Model (DEM). A DEM is used tocreate hydrol...
A Exploratory Review on Soft Computing SegmentationTechniques
Abstract: Segmentation is a process to divides the images into its regions or objects that have similar featuresor characteristics. Segmentation has no single standard procedure and it is very difficult in non-trivial im...