An overview of digital audio steganography

H Dutta, RK Das, S Nandi… - IETE Technical Review, 2020 - Taylor & Francis
Steganography deals with concealing of some messages via some media, which in digital
domain is made over speech, image, or video. In the current generation, privacy-related …

Adaptive digital audio steganography based on integer wavelet transform

A Delforouzi, M Pooyan - Circuits, Systems & Signal Processing, 2008 - Springer
In this paper a novel method for digital audio steganography is presented where encrypted
covert data is embedded into the coefficients of the host audio (cover signal) in the integer …

LSB-based audio steganography method based on lifting wavelet transform

M Pooyan, A Delforouzi - 2007 IEEE International Symposium …, 2007 - ieeexplore.ieee.org
In this paper we present a novel method for digital audio steganography where encrypted
covert data is embedded into the wavelet coefficients of host audio signal. To avoid …

An exponential jerk system, its fractional-order form with dynamical analysis and engineering application

K Rajagopal, A Akgul, S Jafari, A Karthikeyan… - Soft Computing, 2020 - Springer
A simple jerk system with only one exponential nonlinearity is proposed and discussed.
Dynamic analysis of the integer-order jerk system shows the existence of chaotic …

On embedding of text in audio a case of steganography

PN Basu, T Bhowmik - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
A steganographic method of embedding textual information in an audio file is presented in
this paper. In the proposed technique, first the audio file is sampled and then an appropriate …

Adaptive wavelet packet based audio steganography using data history

P Shah, P Choudhari… - 2008 IEEE Region 10 and …, 2008 - ieeexplore.ieee.org
In this paper we present a novel method for digital audio steganography where encrypted
covert data is embedded by adaptively modifying wavelet packet coefficients of host audio …

[PDF][PDF] An optimized method for concealing data using audio steganography

MS Khan, MVV Bhaskar, SN MV - International Journal of Computer …, 2011 - Citeseer
In this paper, we propose a new approach which is sophisticated for concealing the data.
We are using Audio Steganography to make the confidential data more secure, so that the …

Heart sound analysis using neural and statistical classifiers: a comparison

D Barschdorff, A Bothe… - … Computers in Cardiology, 1989 - ieeexplore.ieee.org
The results of a classical pattern recognition approach to heart sound analysis are
compared with those of a trained neural network classifier. Noise not correlated with the …

Data hiding in audio based on audio-to-image wavelet transform and vector quantization

W Sun, RJ Shen, FX Yu, ZM Lu - 2012 Eighth International …, 2012 - ieeexplore.ieee.org
This paper presents a new approach for hiding information in digital audio based on the
audio-to-image wavelet transform (A2IWT) and vector quantization (VQ). In our scheme, the …

A novel DRM framework for peer-to-peer music content delivery

JS Li, CJ Hsieh, CF Hung - Journal of Systems and Software, 2010 - Elsevier
Due to rapid advances in the network communications field in recent years, the distribution
of large-scale music contents has become easier and more efficient than ever before …