Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "c252a6ee-62b8-474e-a4ae-7ff73fceb847"}, "_deposit": {"id": "4491", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4491"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4491", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "An Audio Steganography Scheme Robust to White Gaussian Noise Attack", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "An innovative audio Steganographyscheme based on optimize algorithm asProbabilistic Global Search Lausanne (PGSL) inmodified discrete cosine transform domain(MDCT) is proposed. Inaudibility and robustnessare two main important requirements for audioSteganography. The major contribution of theproposed system is to embed the secret data inthe best MDCT coefficients against secretmessage detection from unauthorized users.Embed the secret data by employing originalsignal transformation with MDCT and best pointsearching process through PGSL Algorithm toachieve high inaudible and robustness. Results ofthe experimental test using clean utterances fromTexas Instruments Massachusetts Institute ofTechnology (TIMIT) databases and music filesshow error-free data recovery from noiseaddition attack stego audio. Robustness of thesystem is evaluated with BER (bit error rate).Spectrogram and Informal listening test alsoshowed that the distortions in the stego audiofrom the original cover speech and music files isimperceptible and inaudible even with highpayload."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "MDCT"}, {"interim": "PGSL Algorithm"}, {"interim": "Secret data communication"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-11-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "10068.pdf", "filesize": [{"value": "499 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 499000.0, "url": {"url": "https://meral.edu.mm/record/4491/files/10068.pdf"}, "version_id": "7458ef53-7016-4994-89ed-9b0c072d8304"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Su, Ei Thin"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2419"}, "item_title": "An Audio Steganography Scheme Robust to White Gaussian Noise Attack", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004491", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-11-14"}, "publish_date": "2019-11-14", "publish_status": "0", "recid": "4491", "relation": {}, "relation_version_is_last": true, "title": ["An Audio Steganography Scheme Robust to White Gaussian Noise Attack"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

An Audio Steganography Scheme Robust to White Gaussian Noise Attack

http://hdl.handle.net/20.500.12678/0000004491
http://hdl.handle.net/20.500.12678/0000004491
5e72b746-e73d-45ab-9d8f-dfc55c895cb5
c252a6ee-62b8-474e-a4ae-7ff73fceb847
None
Preview
Name / File License Actions
10068.pdf 10068.pdf (499 Kb)
Publication type
Article
Upload type
Publication
Title
Title An Audio Steganography Scheme Robust to White Gaussian Noise Attack
Language en_US
Publication date 2012-02-28
Authors
Su, Ei Thin
Description
An innovative audio Steganographyscheme based on optimize algorithm asProbabilistic Global Search Lausanne (PGSL) inmodified discrete cosine transform domain(MDCT) is proposed. Inaudibility and robustnessare two main important requirements for audioSteganography. The major contribution of theproposed system is to embed the secret data inthe best MDCT coefficients against secretmessage detection from unauthorized users.Embed the secret data by employing originalsignal transformation with MDCT and best pointsearching process through PGSL Algorithm toachieve high inaudible and robustness. Results ofthe experimental test using clean utterances fromTexas Instruments Massachusetts Institute ofTechnology (TIMIT) databases and music filesshow error-free data recovery from noiseaddition attack stego audio. Robustness of thesystem is evaluated with BER (bit error rate).Spectrogram and Informal listening test alsoshowed that the distortions in the stego audiofrom the original cover speech and music files isimperceptible and inaudible even with highpayload.
Keywords
MDCT, PGSL Algorithm, Secret data communication
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2419
Journal articles
Tenth International Conference On Computer Applications (ICCA 2012)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:56:10.646190
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL