Ifra Bilal, Mahendra Singh Roj, Rajiv Kumar, P. K. Mishra
{"title":"音频隐写术的最新进展","authors":"Ifra Bilal, Mahendra Singh Roj, Rajiv Kumar, P. K. Mishra","doi":"10.1109/PDGC.2014.7030779","DOIUrl":null,"url":null,"abstract":"Communication of data in public requires data to be transmitted in robust and secure manner. Also, excessive use of digital data in various fields of life demands a secure system. Various techniques such as cryptography, steganography and watermarking have been established. Among these steganography provides better confidentiality as it is the practice of hiding data within data. In digital media steganography, text files, images, audio as well as video are used as carrier. We focus in this paper on digital audio as the carrier. In this paper, a survey on latest audio steganographic methods is carried out along with their strength and weakness. Also, comparison between various steganographic methods based on robustness is carried out. Another contribution of this paper is evaluation of performance of various reviewed steganography techniques.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"30","resultStr":"{\"title\":\"Recent advancement in audio steganography\",\"authors\":\"Ifra Bilal, Mahendra Singh Roj, Rajiv Kumar, P. K. Mishra\",\"doi\":\"10.1109/PDGC.2014.7030779\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Communication of data in public requires data to be transmitted in robust and secure manner. Also, excessive use of digital data in various fields of life demands a secure system. Various techniques such as cryptography, steganography and watermarking have been established. Among these steganography provides better confidentiality as it is the practice of hiding data within data. In digital media steganography, text files, images, audio as well as video are used as carrier. We focus in this paper on digital audio as the carrier. In this paper, a survey on latest audio steganographic methods is carried out along with their strength and weakness. Also, comparison between various steganographic methods based on robustness is carried out. Another contribution of this paper is evaluation of performance of various reviewed steganography techniques.\",\"PeriodicalId\":311953,\"journal\":{\"name\":\"2014 International Conference on Parallel, Distributed and Grid Computing\",\"volume\":\"85 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"30\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Parallel, Distributed and Grid Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PDGC.2014.7030779\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Parallel, Distributed and Grid Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDGC.2014.7030779","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Communication of data in public requires data to be transmitted in robust and secure manner. Also, excessive use of digital data in various fields of life demands a secure system. Various techniques such as cryptography, steganography and watermarking have been established. Among these steganography provides better confidentiality as it is the practice of hiding data within data. In digital media steganography, text files, images, audio as well as video are used as carrier. We focus in this paper on digital audio as the carrier. In this paper, a survey on latest audio steganographic methods is carried out along with their strength and weakness. Also, comparison between various steganographic methods based on robustness is carried out. Another contribution of this paper is evaluation of performance of various reviewed steganography techniques.