A Review on Audio Steganography Techniques

  • Hussain Ali A
  • MohdRosmadiMokhtar M
  • George L
N/ACitations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

The aim of this study is to present different types of steganography in brief and to give a special attention\rto audio steganography technique because a huge number of audio files are exchanged through the networks.\rNowadays the widening of attacker's abilities to access the private and public information transmitted over public\rcommunication system makes way for highlighting a tool that guarantees the secure transmission of hidden\rinformation. Information hiding was a common security term that mainly includes three techniques: cryptography,\rsteganography and watermark. Cryptography was an ancient form that is used for confidential data. Steganography\ris a popular tool that uses digital medium to hide confidential data in innocent carrier such as image, audio, text and\rvideo. Steganography is in fact a complement for the earlier data hiding technique cryptography. However\rwatermark is used for copyright protection. Audio steganography is technique that hides any type of secret data in\rcover audio file. This study also discusses the main requirements of steganography methods and how those methods\rachieve them. Furthermore it shows steganography domain and, carriers and information hiding techniques used in\raudio.

Cite

CITATION STYLE

APA

Hussain Ali, A., MohdRosmadiMokhtar, M., & George, L. (2016). A Review on Audio Steganography Techniques. Research Journal of Applied Sciences, Engineering and Technology, 12(2), 154–162. https://doi.org/10.19026/rjaset.12.2316

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free