Robust high capacity audio steganography using modulo operator
暂无分享,去创建一个
[1] Mark F. Bocko,et al. Data hiding via phase manipulation of audio signals , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[2] Sajad Shirali-Shahreza,et al. Steganography in Silence Intervals of Speech , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[3] N. Cvejic,et al. A wavelet domain LSB insertion algorithm for high capacity audio steganography , 2002, Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop..
[4] Litao Gang,et al. MP3 resistant oblivious steganography , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[5] D. Kahn. Cryptology and the origins of spread spectrum: Engineers during World War II developed an unbreakable scrambler to guarantee secure communications between Allied leaders; actress Hedy Lamarr played a role in the technology , 1984, IEEE Spectrum.
[6] Tanmay Bhowmik,et al. On Embedding of Text in Audio A Case of Steganography , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[7] S. Bandyopadhyay,et al. Higher LSB Layer Based Audio Steganography Technique , 2011 .
[8] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[9] Debnath Bhattacharyya,et al. A GA based audio steganography with enhanced security , 2013, Telecommun. Syst..
[10] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[11] N. Cvejic,et al. Reduced distortion bit-modification for LSB audio steganography , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..
[12] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[13] Kaliappan Gopalan,et al. Covert speech communication via cover speech by tone insertion , 2003, 2003 IEEE Aerospace Conference Proceedings (Cat. No.03TH8652).
[14] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[15] Yousof Erfani,et al. Robust audio watermarking using improved TS echo hiding , 2009, Digit. Signal Process..
[16] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[17] Tapio Seppänen,et al. Increasing robustness of LSB audio steganography using a novel embedding method , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[18] Ronak Karimi,et al. Audio Steganography: A Survey on Recent Approaches - TI Journals , 2012 .
[19] Tapio Seppänen,et al. Increasing the capacity of LSB-based audio steganography , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[20] Nedeljko Cvejic,et al. ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY , 2004 .
[21] Rashid Ansari,et al. Data-hiding in audio using frequency-selective phase alteration , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[22] K. Gopalan,et al. STEGANOGRAPHY FOR COVERT DATA TRANSMISSION BY IMPERCEPTIBLE TONE INSERTION , 2004 .
[23] Mohammad Pooyan,et al. Adaptive Digital Audio Steganography Based on Integer Wavelet Transform , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[24] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..