Providing an Optimal Way to Increase the Security of Data Transfer using Watermarking in Digital Audio Signals

Publish Year: 1399
نوع سند: مقاله ژورنالی
زبان: English
View: 86

This Paper With 12 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_TDMA-9-1_005

تاریخ نمایه سازی: 31 اردیبهشت 1402

Abstract:

The human ear is aware of a wide range of sound signal amplitudes, so signal-based amplitude marking techniques have their own complexity. This article uses Watermarking to insert the message in the audio coverage and its main purpose is to keep this information hidden for others. There are many benchmarks for evaluating insertion and extraction algorithms that, by performing multiple attacks on an algorithm, increase the ability of the method. (Resilience, Transparency and Capacity for Use). Although the LSB method is superior to other encryption techniques, it is highly vulnerable to all kinds of attacks and attacks, including Additive White Gaussian Noise. This article introduces a new idea for Watermarking voice data encryption, based on the LSB method, which follows similar bits with bits instead of pasting information. The message will be in ۱۶-bit samples, given the introduction of the distortion reduction algorithm for the changes we have made to the signal bits for the receiver's awareness, which could be a new way of causing F Of its resistance additive white Gaussian noise and LSB standard will also improve the transparency of the procedure and the method for reducing the capacity has been used.

Authors

Pouriya Etezadifar

imam hussein university

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Alanizy N, Alanizy A, Baghoza N, “ ۳-Layer PC Text ...
  • Prita Roy: New Steganography approach using encrypted secret message inside ...
  • Verma, S.S., R. Gupta and G. Shrivastava. A novel technique ...
  • Ratul Chowdhury: A View on LSB Based Audio Steganography international ...
  • Youssef Bassil: “A two intermediates Audio steganography technique” LACSC—Lebanese Association ...
  • Dong L, Yan Q, Lv Y, "Deng S Full band ...
  • . Aljuaid N, Gutub A, Khan E “ Enhancing PC ...
  • Christian, Kraetzer. Jana, Dittmann. “Mel-Cepstrum Based Steganalysis for VoIP-Steganography”. Paper.۱۲.(۲۰۰۹) ...
  • نمایش کامل مراجع