Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image

Abstract

Information transmission is increasing with grow of using WEB. So, information security has become very important. Security of data and information is the major task for scientists and political and military people. One of the most secure methods is embedding data (steganography) in different media like text, audio, digital images. this paper present two experiments in steganography of digital audio data file. It applies empirically, two algorithms in steganography in images through random insertion of digital audio data using bytes and pixels in image files. Finally, it evaluates both experiments, in order to enhance security of transmitted data.

Authors and Affiliations

Khaled ElSayed

Keywords

Related Articles

Indirect Substitution Method in Combinable Services by Eliminating Incompatible Services

Service-oriented architecture is a style in information systems architecture with the aim of achieving loose coupling in communication between software components and services. Service, here means software implementation...

LeafPopDown: Leaf Popular Down Caching Strategy for Information-Centric Networking

Information-Centric Networking is a name based internet architecture and is considered as an alternate of IP base internet architecture. The in-network caching feature used in ICN has attracted research interests as it r...

Segmentation of the Breast Region in Digital Mammograms and Detection of Masses 

 The mammography is the most effective procedure for an early diagnosis of the breast cancer. Finding an accurate and efficient breast region segmentation technique still remains a challenging problem in digital mam...

Online Paper Review Analysis

Sentiment analysis or opinion mining is used to automate the detection of subjective information such as opinions, attitudes, emotions, and feelings. Hundreds of thousands care about scientific research and take a long t...

Classifying Personalization Constraints in Digital Business Environments through Case Study Research

To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of...

Download PDF file
  • EP ID EP111216
  • DOI 10.14569/IJACSA.2015.060305
  • Views 117
  • Downloads 0

How To Cite

Khaled ElSayed (2015). Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image. International Journal of Advanced Computer Science & Applications, 6(3), 34-40. https://europub.co.uk/articles/-A-111216