The Evaluation of Image Messages in MP3 Audio Steganography Using Modified Low-Bit Encoding
Abstract
Keywords
Full Text:
Link DownloadReferences
Ashari, I. F. (2018). Graph Steganography Based On Multimedia Cover To Improve Security and Capacity. 2018 International Conference on Applied Information Technology and Innovation (ICAITI), April 2019, 194–201. doi: 10.1109/ICAITI.2018.8686741
Bansal K., Agrawal A., and Bansal N.. (2020) "A Survey on Steganography using Least Significant bit (LSB) Embedding Approach," 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), pp. 64-69, doi: 10.1109/ICOEI48184.2020.9142896.
Chakraborty, R. (2019). Audio Steganography- A Review. International Journal of Trend in Research and Development, Volume 6(3), ISSN: 2394-9333, 6(July).
Choi, J. R., Straubhaar, J., Skouras, M., Park, S., Santillana, M., & Strover, S. (2020). Techno-capital: Theorizing media and information literacy through information technology capabilities. New Media & Society. https://doi.org/10.1177/1461444820925800
Chowdhury, R., Bhattacharyya, D., Bandyopadhyay, S. K., & Kim, T. H. (2016). A view on LSB based audio steganography. International Journal of Securitdy and Its Applications, 10(2), 51–62. https://doi.org/10.14257/ijsia.2016.10.2.05
Datta, B., Pal, P., & Bandyopadhyay, S. K. (2015). Robust multi layer audio steganography. 12th IEEE International Conference Electronics, Energy, Environment, Communication, Computer, Control: (E3-C3), INDICON 2015, 1–6. https://doi.org/10.1109/INDICON.2015.7443342
Denegri-knott, J. (2015). MP3. Taylor and Francis Group, 3866(September), 397–401. https://doi.org/10.1080/10253866.2015.1048962
Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data.
Multimedia Tools and Applications, 77(13), 17333–17373. https://doi.org/10.1007/s11042-017-5308-3
Dutta, H., Das, R. K., Nandi, S., & Prasanna, S. R. M. (2019). An Overview of Digital Audio Steganography. IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 0(0), 1–19. https://doi.org/10.1080/02564602.2019.1699454
Gaikwad, T., Patil, M., Sagvekar, P. V., & Racha, P. D. (2015). Network Security : A Study Using Cryptography. International Journal for Research in Applied Science & Engineering Technology (IJRASET), 3(II), 392–398.
Gurgaon, I. (2017). International Journal of Computer Science and Mobile Computing An Overview Of Network Security-Its Types And Techniques Nishu SethI Types of Security: Fig: Types of Security. International Journal of Computer Science and Mobile Computing, 6(5), 235–237.
www.ijcsmc.com
Hussain, M., Wahab, A. W. A., Idris, Y. I. Bin, Ho, A. T. S., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66. https://doi.org/10.1016/j.image.2018.03.012
Jasvir Singh, Gaganjot Kaur, & Manveer Kaur Garcha. (2015). Review of Spatial and Frequency Domain Steganographic Approaches. International Journal of Engineering Research And, 4(06), 1122–1124. https://doi.org/10.17577/ijertv4is061082
Jenkins, B., & Laurier, W. (2013). MP3: THE MEANING OF A FORMAT. Canadian Journal of Communication, 30(2), 1–2.
Kadhim, B. A. (2017). High Security Steganography Model Based on DWT,
DCT and RSA. Journal of Engineering and Applied Science, 10, 8875–8881.
Malviya, S., Saxena, M., & Khare, A. (2012). Audio Steganography by Different Methods. International Journal of Emerging Technology and Advanced Engineering, 2(7), 371--375. http://www.ijetae.com/files/Volume2Issue7/IJETAE_0712_64.pdf
Mulyono, I. U. W., Susanto, A., Anggraeny, T., & Sari, C. A. (2019). Encryption of Text Message on Audio Steganography Using Combination Vigenere Cipher and LSB (Least Significant Bit). Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 4(1), 63–74. https://doi.org/10.22219/kinetik.v4i1.701
Parthasarathi, M., Shreekala, T., Nadu, T., & Nadu, T. (2017). Secured Data Hiding in Audio Files Using Audio Steganography Algorithm. International Journal of Pure and Applied Mathematics, 116(21), 619–627.
Payam H, Samira G and Masoud A. (2017). Impact of Information Technology on Lifestyle: A Literature Review and Classification Int. Journal of Virtual Communities and Social Networking (IJVCSN) 9 pp 1-23. doi: 10.1088/1757-899X/1073/1/012056
Rehman, A., Saba, T., Mahmood, T., Mehmood, Z., Shah, M., & Anjum, A. (2018). Data hiding technique in steganography for information security using number theory. Journal of Information Science, 45(6), 1–12. https://doi.org/10.1177/0165551518816303
Rojali, Salman, A. G., & George, G. (2017). Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods. AIP Conference Proceedings, 1867, 1–11. https://doi.org/10.1063/1.4994462
Rokhman, N., & Maharanti, J. (2011). Deteksi Steganografi Berbasis Least Significant Bit (LSB) Dengan Menggunakan Analisis Statistik. IJCSS (Indonesia Journal of Computing and Cybernatics Systems), 5(1), 57–62. https://doi.org/10.1111/een.12476
Roy, R., & Changder, S. (2016). Quality evaluation of image steganography techniques: A heuristics based approach. International Journal of Security and Its Applications, 10(4), 179–196. https://doi.org/10.14257/ijsia.2016.10.4.18
Sagarmay Deb. (2014). Information Technology, Its Impact on Society and
Its Future. Advances in Computing, 4(1), 25–29. https://doi.org/10.5923/j.ac.20140401.07
Sairam, T. ., & Bhoopaty, B. (2018). Comparative Analysis of Spatial and Frequency Domain Based Data Hiding 1. International Journal of Pure and Applied Mathematics, 119(15), 2353–2359.
Setiaji, H. C. F., Tjondronegoro, S., & Hidayat, B. (2015). Audio Steganography using Modified Enhanced Least Significant Bit in 802.11n. Journal of Measurements, Electronics, Communications, and Systems, 2(3), 7465–7474. https://doi.org/10.25124/jmecs.v1i1.1479
Taha, M. S., Mohd Rahim, M. S., Lafta, S. A., Hashim, M. M., & Alzuabidi, H. M. (2019). Combination of Steganography and Cryptography: A short Survey. IOP Conference Series: Materials Science and Engineering, 518(5), 1–13. https://doi.org/10.1088/1757-899X/518/5/052003
DOI: http://dx.doi.org/10.35671/telematika.v14i2.1031
Refbacks
- There are currently no refbacks.
Indexed by:
Telematika
ISSN: 2442-4528 (online) | ISSN: 1979-925X (print)
Published by : Universitas Amikom Purwokerto
Jl. Let. Jend. POL SUMARTO Watumas, Purwonegoro - Purwokerto, Indonesia
This work is licensed under a Creative Commons Attribution 4.0 International License .