Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Steganography is an art and a science of communicating in a way, which hides the existence of thecommunication. It is also called as “covered writing”, because it uses a “cover” of a message for sending anyimportant secret message. In the steganographic scenario, the secret data is first concealed within anotherobject which is called “cover object”, to form “stego-object” and then this new object can be transmitted orsaved. Using different techniques, we can send secret data in the form of an image, a music file or even a videofile by embedding it into the carrier, forming a stego-signal. At the receiver’s end, the secret data can berecovered from the stego-signal using different algorithms. The main goal of Steganography is to communicatesecurely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hiddendata. It is not only prevents others from knowing the hidden information, but it also prevents others fromthinking that the information even exists. If a Steganography method causes someone to suspect there is secretinformation in a carrier medium, then the method has failed.
Authors and Affiliations
Sumeet Gupta , Dr. Namrata Dhanda
The Development of A Project Based Learning (PJBL) Models To Build An Attitude of Obedience To The traffic Rules Of two Wheeled Vehicles For Junior High School Students
This study aims to produce a product in the form of a Project Based Learning model to build a compliant attitude to traffic regulations. The study subjects were taken as many as 42 students consisting of 9 limited test s...
A Logical Issue for the Internet Community to Address Is That of Effective Cryptography Standards for the Conduct of Business and Personal Communications
Many organizations are working hard to secure themselves from the growing threats of message hacking through various trends in cryptography. Yet the headlines are dominated with the latest news of message pass...
Positional Prediction of Individuals Present In a Crime Scene
Abstract: The scientific study/interpretation of bloodstain patterns at a crime scene, provide invaluable evidence for sequencing, reconstruction of events that might have occurred at the crime scene. the authors have tr...
An Efficient Face Tracker Using Active Shape Model
To perform tracking in an illumination insensitive feature space, called the gradient logarithm field (GLF) feature space. The GLF feature mainly depends on the intrinsic characteristics of a face and is only marginally...
Non-Intrusive Speech Quality with Different Time Scale
Speech quality evaluation is an extremely important problem in modern communication networks. Service providers always strive to achieve a certain Quality of Service (QoS) in order to ensure customer satisfaction...