Audio Steganography

  • Unique Paper ID: 144526
  • Volume: 3
  • Issue: 12
  • PageNo: 115-119
  • Abstract:
  • Drastic increase in the usage of electronic communication needed security of data being transmitted. Steganography is one such technique of hiding the message in a chosen carrier such that no one except the intended receiver is aware of its existence and hence prevents unauthorized access. The goal of Audio steganographic technique is to embed data in audio cover file that must be robust and resistant to malicious attacks. This paper presents various audio steganographic methods like LSB, echo hiding, spread spectrum etc. Merits and demerits of each method are described.
add_icon3email to a friend

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{144526,
        author = {Neeraj Kumari and Babita Yadav},
        title = {Audio Steganography},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {3},
        number = {12},
        pages = {115-119},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=144526},
        abstract = {Drastic increase in the usage of electronic communication needed security of data being transmitted. Steganography is one such technique of hiding the message in a chosen carrier such that no one except the intended receiver is aware of its existence and hence prevents unauthorized access. The goal of Audio steganographic technique is to embed data in audio cover file that must be robust and resistant to malicious attacks. This paper presents various audio steganographic methods like LSB, echo hiding, spread spectrum etc. Merits and demerits of each method are described.},
        keywords = {Audio steganography, steganalysis, HVS, HAS, embedding capacity, robustness},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 3
  • Issue: 12
  • PageNo: 115-119

Audio Steganography

Related Articles

Join Our IPN

IJIRT Partner Network

Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.

Join Now arrowright18x

Recent Conferences

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024

Submit inquiry arrowright18x