Essays about: "Audio Steganography"

Found 3 essays containing the words Audio Steganography.

  1. 1. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : John Alanko Öberg; Carl Svensson; [2023]
    Keywords : Coverless audio steganography; information hiding; covert communication; effective capacity; behavioral; Täcklös ljudsteganografi; informationsdöljning; hemlig kommunikation; effektiv kapacitet; beteendemässig;

    Abstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE

  2. 2. ARMAS: Active Reconstruction of Missing Audio Segments

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Sachin Pokharel; Muhammad Ali; [2021]
    Keywords : Audio Reconstruction; Audio Inpainting; Deep Learning; Machine Learning; Audio Steganography;

    Abstract : Background: Audio signal reconstruction using machine/deep learning algorithms has been explored much more in the recent years, and it has many applications in digital signal processing. There are many research works on audio reconstruction with linear interpolation, phase coding, tone insertion techniques combined with AI models. READ MORE

  3. 3. Information Hiding : Steganografic Content in Streaming Media

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik och datavetenskap

    Author : Peter Bayer; Henrik Widenfors; [2002]
    Keywords : Information hiding; steganography; information security; hidden communication;

    Abstract : For a long time, information hiding has focused on carriers like images and audio files. A problem with these carriers is that they do not support hiding in new types of network-based services. Nowadays, these services often arise as a consequence of the increasingly demand for higher connection speed to the Internet. READ MORE