IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Turkish Journal of Electrical Engineering and Computer Science
  • Volume:25 Issue:3
  • A steganographic approach to hide secret data in digital audio based on XOR operands triplet propert...

A steganographic approach to hide secret data in digital audio based on XOR operands triplet property with high embedding rate and good quality audio

Authors : Krishna BHOWAL, Debasree Chanda SARKAR, Sushanta BISWAS, Partha Pratim SARKAR
Pages : 2136-2148
View : 19 | Download : 11
Publication Date : 0000-00-00
Article Type : Research Paper
Abstract :In this paper, a unique and transparent data hiding algorithm based on XOR operands triplet insert ignore into journalissuearticles values(XOT); is proposed. In XOT, an XOR operation applied on any two members of a triplet provides the third member of the same triplet. Taking advantage of the low computational complexity and fascinating properties of the XOR operator, it is possible to embed 4-ary secret digits with negligible changes in the host digital audio. The proposed scheme has been designed to ensure that a minimum number of bit alterations happen in the host digital audio during the data hiding process, which also increases the security of the scheme and provides high quality embedded audio without compromising the statistical property of host audio signals. The scheme confirms that the maximum change is less than 12.5% of the digital audio samples and the average error for the individual digital audio sample is less than 6.25%. The experimental results show that the scheme has a high capacity insert ignore into journalissuearticles values(88 kbps); without perceptual distortion insert ignore into journalissuearticles values(objective difference grades are -0.1 to -0.31); and provides robustness against intentional or unintentional attack detection. Comparative analysis shows that our method has better performance than data hiding techniques reported recently in terms of imperceptibility, capacity, and security.
Keywords : Embedding capacity, imperceptibility, steganography, watermarking, computational complexity, XOR operands triplet

ORIGINAL ARTICLE URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025