Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Steganography is an art and a science of communicating in a way, which hides the existence of thecommunication. It is also called as “covered writing”, because it uses a “cover” of a message for sending anyimportant secret message. In the steganographic scenario, the secret data is first concealed within anotherobject which is called “cover object”, to form “stego-object” and then this new object can be transmitted orsaved. Using different techniques, we can send secret data in the form of an image, a music file or even a videofile by embedding it into the carrier, forming a stego-signal. At the receiver’s end, the secret data can berecovered from the stego-signal using different algorithms. The main goal of Steganography is to communicatesecurely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hiddendata. It is not only prevents others from knowing the hidden information, but it also prevents others fromthinking that the information even exists. If a Steganography method causes someone to suspect there is secretinformation in a carrier medium, then the method has failed.
Authors and Affiliations
Sumeet Gupta , Dr. Namrata Dhanda
Detecting Masquerade in Face Recognition System – A Literature survey
A masquerader is an (often external) attacker is one who, after succeeding in obtaining a legitimateuser’s credentials, attempts to use the stolen identity to carry out malicious actions.Automatic detection of masq...
A Method of View Materialization Using Genetic Algorithm
A data warehouse is a very large database system that collects, summarizes and stores data from multiple remote and heterogeneous information sources. Data warehouses are used for supporting decision making operation on...
Fuzzy Querying Based on Relational Database
The traditional query in relational database is unable to satisfy the needs for dealing with fuzzy linguistic values. In this paper, a new data query technique composed of fuzzy theory and MS-SQL is provided. &nb...
Intelligent Fire Extinguisher System
The multisensor fire-detection algorithm is one of the current important issues in the field of firedetection systems for intelligent buildings. This paper proposes an adaptive fusion algorithm for fire detection,...
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...