A Two Intermediates Audio Steganography Technique

On the rise of the Internet, digital data became openly public which has driven IT industries to pay special consideration to data confidentiality. At present, two main techniques are being used: Cryptography and Steganography. In effect, cryptography garbles a secret message turning it into a meaningless form; while, steganography hides the very existence of the message by embedding it into an intermediate such as a computer file. In fact, in audio steganography, this computer file is a digital audio file in which secret data are concealed, predominantly, into the bits that make up its audio samples.

Provided by: Cornell University Topic: Security Date Added: Nov 2012 Format: PDF

Find By Topic