Abstract
The aim of this study is to present different types of steganography in brief and to give a special attention\rto audio steganography technique because a huge number of audio files are exchanged through the networks.\rNowadays the widening of attacker's abilities to access the private and public information transmitted over public\rcommunication system makes way for highlighting a tool that guarantees the secure transmission of hidden\rinformation. Information hiding was a common security term that mainly includes three techniques: cryptography,\rsteganography and watermark. Cryptography was an ancient form that is used for confidential data. Steganography\ris a popular tool that uses digital medium to hide confidential data in innocent carrier such as image, audio, text and\rvideo. Steganography is in fact a complement for the earlier data hiding technique cryptography. However\rwatermark is used for copyright protection. Audio steganography is technique that hides any type of secret data in\rcover audio file. This study also discusses the main requirements of steganography methods and how those methods\rachieve them. Furthermore it shows steganography domain and, carriers and information hiding techniques used in\raudio.
Cite
CITATION STYLE
Hussain Ali, A., MohdRosmadiMokhtar, M., & George, L. (2016). A Review on Audio Steganography Techniques. Research Journal of Applied Sciences, Engineering and Technology, 12(2), 154–162. https://doi.org/10.19026/rjaset.12.2316
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.