共 26 条
- [1] Balgurgi P.P., Jagtap S.K., Audio Steganography used for secure data transmission, Proceedings of International Conference on Advances in Computing, pp. 699-706, (2013)
- [2] Djebbar F., Ayad B., Hamam H., Abed-Meraim K., A view on the latest audio steganography techniques, 2011 International Conference on Innovations in Information Technology, pp. 409-414, (2011)
- [3] Djebbar F., Ayad B., Meraim K.A., Hamam H., Comparative study of digital audio steganography techniques, EURASIP J. Audio Speech Music Process, 2012, 1, pp. 1-16, (2012)
- [4] Jayaram Ranganatha, Information hiding using audio steganogra-phy-a survey, Int. J. Multimed. Appl, 3, 3, pp. 86-96, (2011)
- [5] Su Z., Zhang G., Yue F., Chang L., Jiang J., Yao X., SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking, IEEE Trans. Multimed, 20, 10, pp. 2631-2644, (2018)
- [6] Tanwar R., Singh K., Zamani M., Verma A., Kumar P., An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer, J. Comput. Netw. Commun, 2019, (2019)
- [7] Olawale A., Adebayo A., Arome G., Embedding text in audio steganography system using advanced encryption standard, text compression and spread spectrum techniques in mp3 and mp4 file formats, Int. J. Comput. Appl, 177, 41, pp. 46-51, (2020)
- [8] Thakur A., Enhanced steganographic method using lsb, parity and spread spectrum technique for audio signals, Thapar Institute of Engineering and Technology, (2014)
- [9] William S., Cryptography and network security: For VTU, (2011)
- [10] Abdullah H.A., Abdulameer A.A., Hussein I.F., Audio ste-ganography and security by using cryptography,” i-manager’s, J. Inf. Technol, 4, 4, pp. 17-24, (2015)