Bhattacharyya et al., 2010 - Google Patents
Hiding data in audio signalBhattacharyya et al., 2010
- Document ID
- 16279856308376503702
- Author
- Bhattacharyya D
- Dutta P
- Balitanas M
- Kim T
- Das P
- Publication year
- Publication venue
- International Conference on Advanced Communication and Networking
External Links
Snippet
This paper describes the LSB technique for secure data transfer. Secret information can be hidden inside all sorts of cover information: text, images, audio, video and more. Embedding secret messages in digital sound is usually a more difficult process. Varieties of techniques …
- 230000005236 sound signal 0 title description 6
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dutta et al. | Data hiding in audio signal: A review | |
Dutta et al. | An overview of digital audio steganography | |
Al-Othmani et al. | A survey on steganography techniques in real time audio signals and evaluation | |
JP4186531B2 (en) | Data embedding method, data extracting method, data embedding extracting method, and system | |
Kekre et al. | Information hiding in audio signals | |
Balgurgi et al. | Audio steganography used for secure data transmission | |
Tayel et al. | A proposed implementation method of an audio steganography technique | |
Chauhan et al. | A survey: Digital audio watermarking techniques and applications | |
Tanwar et al. | Audio steganography | |
Singh | A comparative study of audio steganography techniques | |
Meligy et al. | An efficient method to audio steganography based on modification of least significant bit technique using random keys | |
Malviya et al. | Audio steganography by different methods | |
Mane et al. | Data hiding technique: Audio steganographyusing lsb technique | |
Basu et al. | On embedding of text in audio a case of steganography | |
Bhattacharyya et al. | Hiding data in audio signal | |
Singh | A survey on audio steganography approaches | |
Bhattacharyya et al. | A method of data hiding in audio signal | |
Dastoor | Comparative analysis of Steganographic algorithms intacting the information in the speech signal for enhancing the message security in next generation mobile devices | |
Mohamad et al. | Information hiding based on audio steganography using least significant bit | |
Bhattacharyya et al. | A novel audio steganography technique by M16MA | |
Srivastava et al. | A novel approach to secure communication using audio steganography | |
Erçelebi et al. | Robust multi bit and high quality audio watermarking using pseudo-random sequences | |
Kurzekar et al. | A proposed method for audio steganography using digital information security | |
Malviya et al. | Audio steganography in a nutshell | |
Singh et al. | A survey on Steganography in Audio |