Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 3
Abstract
Information transmission is increasing with grow of using WEB. So, information security has become very important. Security of data and information is the major task for scientists and political and military people. One of the most secure methods is embedding data (steganography) in different media like text, audio, digital images. this paper present two experiments in steganography of digital audio data file. It applies empirically, two algorithms in steganography in images through random insertion of digital audio data using bytes and pixels in image files. Finally, it evaluates both experiments, in order to enhance security of transmitted data.
Authors and Affiliations
Khaled ElSayed
Indirect Substitution Method in Combinable Services by Eliminating Incompatible Services
Service-oriented architecture is a style in information systems architecture with the aim of achieving loose coupling in communication between software components and services. Service, here means software implementation...
LeafPopDown: Leaf Popular Down Caching Strategy for Information-Centric Networking
Information-Centric Networking is a name based internet architecture and is considered as an alternate of IP base internet architecture. The in-network caching feature used in ICN has attracted research interests as it r...
Segmentation of the Breast Region in Digital Mammograms and Detection of Masses
The mammography is the most effective procedure for an early diagnosis of the breast cancer. Finding an accurate and efficient breast region segmentation technique still remains a challenging problem in digital mam...
Online Paper Review Analysis
Sentiment analysis or opinion mining is used to automate the detection of subjective information such as opinions, attitudes, emotions, and feelings. Hundreds of thousands care about scientific research and take a long t...
Classifying Personalization Constraints in Digital Business Environments through Case Study Research
To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of...