{"title":"简单回顾音频隐写术","authors":"Dingwei Tan, Yuliang Lu, Xuehu Yan, Xiaoping Wang","doi":"10.1109/ITNEC.2019.8729476","DOIUrl":null,"url":null,"abstract":"Stegnography is very important because it conceals the existence of communication itself. Nowadays, people use a variety of multimedia files as stegnography carriers. Recently, audio as a type of stegnography carrier has attracted more and more attention because of its unique characteristics. The growing popularity of VOIP has also pushed audio into more applications. Audio information hiding technology has its strengths and weaknesses. This paper begins with a brief introduction of basic stegnography methods. Then, the related evaluation indexes of audio stegnography are introduced. Next, the papar summarizes the performance of main audio stegnograhy methods. Finally, the paper concludes with recommendations and puts forward suggestions for the coming research focus.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"A Simple Review of Audio Steganography\",\"authors\":\"Dingwei Tan, Yuliang Lu, Xuehu Yan, Xiaoping Wang\",\"doi\":\"10.1109/ITNEC.2019.8729476\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Stegnography is very important because it conceals the existence of communication itself. Nowadays, people use a variety of multimedia files as stegnography carriers. Recently, audio as a type of stegnography carrier has attracted more and more attention because of its unique characteristics. The growing popularity of VOIP has also pushed audio into more applications. Audio information hiding technology has its strengths and weaknesses. This paper begins with a brief introduction of basic stegnography methods. Then, the related evaluation indexes of audio stegnography are introduced. Next, the papar summarizes the performance of main audio stegnograhy methods. Finally, the paper concludes with recommendations and puts forward suggestions for the coming research focus.\",\"PeriodicalId\":202966,\"journal\":{\"name\":\"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNEC.2019.8729476\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNEC.2019.8729476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Stegnography is very important because it conceals the existence of communication itself. Nowadays, people use a variety of multimedia files as stegnography carriers. Recently, audio as a type of stegnography carrier has attracted more and more attention because of its unique characteristics. The growing popularity of VOIP has also pushed audio into more applications. Audio information hiding technology has its strengths and weaknesses. This paper begins with a brief introduction of basic stegnography methods. Then, the related evaluation indexes of audio stegnography are introduced. Next, the papar summarizes the performance of main audio stegnograhy methods. Finally, the paper concludes with recommendations and puts forward suggestions for the coming research focus.