Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 3
Abstract
Information transmission is increasing with grow of using WEB. So, information security has become very important. Security of data and information is the major task for scientists and political and military people. One of the most secure methods is embedding data (steganography) in different media like text, audio, digital images. this paper present two experiments in steganography of digital audio data file. It applies empirically, two algorithms in steganography in images through random insertion of digital audio data using bytes and pixels in image files. Finally, it evaluates both experiments, in order to enhance security of transmitted data.
Authors and Affiliations
Khaled ElSayed
Design and Simulation of Robust Controllers for Power Electronic Converters used in New Energy Architecture for a (PVG)/ (WTG) Hybrid System
The use of the combination of photovoltaic energy source and the wind energy source as a hybrid configuration has become an alternative solution to produce power energy to fed industrial and domestic applications. In ord...
A Flexible Approach to Modelling Adaptive Course Sequencing based on Graphs implemented using XLink
A major challenge in developing systems of distance learning is the ability to adapt learning to individual users. This adaptation requires a flexible scheme for sequencing the material to teach diverse learners. This is...
Classification of Affective States via EEG and Deep Learning
Human emotions play a key role in numerous decision-making processes. The ability to correctly identify likes and dislikes as well as excitement and boredom would facilitate novel applications in neuromarketing, affectiv...
GDPI: Signature based Deep Packet Inspection using GPUs
Deep Packet Inspection (DPI) is necessitated for many networked application systems in order to prevent from cyber threats. The signature based Network Intrusion and etection System (NIDS) works on packet inspection and...
On the Parallel Design and Analysis for 3-D ADI Telegraph Problem with MPI
In this paper we describe the 3-D Telegraph Equation (3-DTEL) with the use of Alternating Direction Implicit (ADI) method on Geranium Cadcam Cluster (GCC) with Message Passing Interface (MPI) parallel software. The algor...