Analysis of Affine and Hill Cipher Method using Audio Steganography

[1]  Kamred Udham Singh,et al.  A Survey on Audio Steganography Approaches , 2014 .

[2]  Abikoye OluwakemiC.,et al.  Efficient Data Hiding System using Cryptography and Steganography , 2012 .

[3]  L. DoraM.Ballesteros,et al.  Highly transparent steganography model of speech signals using Efficient Wavelet Masking , 2012, Expert Syst. Appl..

[4]  Wei Zeng,et al.  A Novel Steganalysis Algorithm of Phase Coding in Audio Signal , 2007, Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007).

[5]  Ali Al-Haj,et al.  DWT-based audio watermarking , 2011, Int. Arab J. Inf. Technol..

[6]  G. Aghila,et al.  Robust Audio steganography based on Advanced Encryption standards in temporal domain , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[7]  Tapio Seppänen,et al.  Increasing robustness of LSB audio steganography using a novel embedding method , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[8]  Samir Kumar Bandyopadhyay,et al.  Robust high capacity audio steganography using modulo operator , 2015, Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT).

[9]  Anirban Bhowmick,et al.  Encrypted Information Hiding using Audio Steganography and Audio Cryptography , 2015 .

[10]  Vipul Sharma,et al.  LSB modification based Audio Steganography using Trusted Third Party Key Indexing method , 2015, 2015 Third International Conference on Image Information Processing (ICIIP).

[11]  Abdullah Gani Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .

[12]  Christian Fabian,et al.  Secure Hybrid Spread Spectrum System for Steganography in Auditive Media , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[13]  Debnath Bhattacharyya,et al.  A GA based audio steganography with enhanced security , 2013, Telecommun. Syst..

[14]  Saroj Kumar Panigrahy,et al.  Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm , 2007 .

[15]  Tanmaiy G. Verma,et al.  A Unique Approach for Data Hiding Using Audio Steganography , 2013 .

[16]  Tanmay Bhowmik,et al.  On Embedding of Text in Audio A Case of Steganography , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[17]  Jinshu Su,et al.  Adaptive VoIP Steganography for Information Hiding within Network Audio Streams , 2011, 2011 14th International Conference on Network-Based Information Systems.

[18]  Abdulaleem Z. Al-Othmani,et al.  A survey on steganography techniques in real time audio signals and evaluation , 2012 .

[19]  A. A. Zaidan,et al.  A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .

[20]  Mohammed M. Nasef,et al.  An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys , 2015 .

[21]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[22]  Tarun Khanna,et al.  Audio Steganography Using DES Algorithm , 2011 .

[23]  M. Asad,et al.  Three layered model for audio steganography , 2012, 2012 International Conference on Emerging Technologies.

[24]  Sajad Shirali-Shahreza,et al.  Steganography in Silence Intervals of Speech , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[25]  Asha Ambhaikar,et al.  Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security , 2012 .

[26]  Akram M. Zeki,et al.  Robust audio steganography via genetic algorithm , 2009, 2009 International Conference on Information and Communication Technologies.

[27]  Kaliappan Gopalan Audio steganography by cepstrum modification , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[28]  K. Gopalan,et al.  STEGANOGRAPHY FOR COVERT DATA TRANSMISSION BY IMPERCEPTIBLE TONE INSERTION , 2004 .

[29]  Shafakhatullah Khan,et al.  An Optimized Method for Concealing Data using Audio Steganography , 2011 .

[30]  Navneet Kaur,et al.  Audio Steganography Using LSB Edge Detection Algorithm , 2014 .

[31]  Sangita Roy,et al.  A novel approach to format based text steganography , 2011, ICCCS '11.