PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Współczesne techniki steganograficzne w dźwięku

Autorzy
Identyfikatory
Warianty tytułu
EN
The modern steganographic techniques in sound
Języki publikacji
PL
Abstrakty
PL
Artykuł prezentuje przegląd współczesnych metod steganograficznych stosowanych w różnych zastosowaniach steganografii, takich jak: znakowanie wodne, tajna komunikacja, odciski palca, tworzenie ukrytych wolumenów danych. Każda grupa zastosowań została scharakteryzowana pod kątem wymagań kluczowych ze względu na pełnione funkcje.
EN
Some modern steganographic techniques are presented in the article. These methods can be used for various purposes: hidden communication, watermark-ing, fingerprinting, hidden data volumes creation. The most important requirements for each of the above applications were examined and are presented.
Czasopismo
Rocznik
Strony
325--336
Opis fizyczny
Bibliogr. 37 poz.
Twórcy
autor
  • Politechnika Lubelska, Instytut Informatyki
Bibliografia
  • 1. Agaian S., Akopian D., Caglayan O., D'souza S.: Lossless adaptive digital audio ste-ganography. Proc. IEEE Int. Conf. Signals, Systems and Computers. IEEE, 2005, s. 903÷906.
  • 2. Alla K., Prasad R.: An Evolution of Hindi Text Steganography. Sixth International Con-ference Information Technology: New Generations, 2009.
  • 3. Anckaert B., De Sutter B., Chanet D., De Bosschere K.: Steganography for Executables and Code Transformation Signatures. Lecture Notes in Computer Science, Vol. 3506, Springer, 2005, s. 425÷439.
  • 4. Aoki N.: A band extension technique for G.711 speech using steganography. IEICE Tran-sactions on Communications, Vol. E89-B, No.6, 2006, s. 1896÷1898.
  • 5. Aoki N.: A technique of lossless steganography for g.711 telephony speech. Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, ser. IIH-MSP ’08. IEEE Computer Society, Washington, DC, USA 2008, s. 608÷611.
  • 6. Banerjee D.: Asymmetric key steganography. International Conference on Information and Electronics Engineering, IPCSIT, Vol. 6, 2011, http://www.ipcsit.com/vol6/47-E20010.pdf.
  • 7. Changder S., Ghosh D., Debnath N. C.: LCS based text steganography through Indian Languages. Computer Science and Information Technology (ICCSIT), 3rd IEEE International Conference, 2010.
  • 8. Changder S., Ghosh D., Debnath N. C.: A Greedy Approach to Text Steganography Using Properties of Sentences. Eighth International Conference Information Technology: New Generations (ITNG), 2011.
  • 9. Ciobanu R.-I., Tirsa M., Lupu R., Stan S., Andreica M. I.: SCONeP: Steganography and Cryptography approach for UDP and ICMP. Roedunet International Conference (RoEdu-Net), 2011.
  • 10. Cvejic N., Seppanen T.: A wavelet domain LSB insertion algorithm for high capacity audio steganography. Proc. IEEE Digital Signal Processing Workshop. IEEE, 2002, s. 53÷55.
  • 11. Cvejic N., Seppanen T.: Increasing the capacity of LSB-based audio steganography. IEEE Workshop on Multimedia Signal Processing. IEEE, 2002, s. 336÷338.
  • 12. Cvejic N., Seppanen T.: Increasing robustness of LSB audio steganography using a novel embedding method. Proc. IEEE Int. Conf. Info. Tech. Coding and Computing, 2. IEEE, 2004, s. 533÷537.
  • 13. Delforouzi A., Pooyan M.: Adaptive Digital Audio Steganography Based on Integer Wavelet Transform. Circuits Syst. Signal Process., Vol. 27, 2008, s. 247÷259.
  • 14. Ding F., Wang X., Shen Y., Lu Y., Hu J.: Non-embedded audio watermark based on wavelet transform. IEEE 3rd International Conference Software Engineering and Service Science (ICSESS), IEEE, 2012.
  • 15. Dymarski P.: Filtracja sygnałów dźwiękowych jako metoda znakowania wodnego i stega-nografii. Krajowe Sympozjum Telekomunikacji, Bydgoszcz. Akademia Techniczno-Rolnicza w Bydgoszczy, 2006, s. 12÷23.
  • 16. Dymarski P., Pobłocki A., Baras C., Moreau N.: Algorytmy znakowania wodnego sygna-łów dźwiękowych. Krajowe Sympozjum Telekomunikacji, Bydgoszcz. Akademia Tech-niczno-Rolnicza w Bydgoszczy, 2003, s. 26÷34.
  • 17. Hamdaqua M., Tahvildari L.: ReLACK: A Reliable VoIP Steganography Approach. Fifth International Conference Secure Software Integration and Reliability Improvement (SSIRI), 2011.
  • 18. Johnson N., Katzenbeisser S.: A survey of steganographic techniques. Information hiding: Techniques for steganography and digital watermarking. Artech House, London 2000.
  • 19. Katzenbeisser S., Petricolas A.: Information Hiding. Artech House, London 2000.
  • 20. Kim S., Kwon H., Bae K.: Modification of polar echo kernel for performance improve-ment of audio watermarking. International Workshop on Digital Watermarking, No. 2, LNCS 2939, Springer, 2004, s. 456÷466.
  • 21. Koziel G.: Increasing steganographic capacity of the MF method. Actual Problems of Economics, No. 6, Vol. 132, 2012, s. 367÷373.
  • 22. Koziel G.: Steganographic algorithm of hiding information in sound based on Fourier transform and masking. Control and Cybernetics, No. 4, Vol. 40, 2011, s. 1231÷1247.
  • 23. Lie W. N., Chang L. C.: Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification. IEEE Trans. on Multimedia, Vol. 8, No. 1, 2006, s. 46÷59.
  • 24. Lucena N., Lewandowski G., Chapin S.: Covert Channels in IPv6. Proc. of 5th Privacy Enhancing Technologies Workshop, Lecture Notes in Computer Science, Vol. 3856, Springer, 2005, s. 147÷166.
  • 25. Matsuka H.: Spread spectrum audio steganography using subband phase shifting. IEEE Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP ‘06). IEEE, 2006, s. 3÷6.
  • 26. Mazurski W., Szczypiorski K.: Steganography of VoIP Streams. Lecture Notes in Com-puter Science, Vol. 5332, Springer, 2008, s. 1001÷1018.
  • 27. Murata H., Ogihara X., Iwata M, Shiozaki A.: Sound quality improvement of multiple audio watermarking by using DC component. IEICE(A), Vol. J93-A, No. 3, 2010, s. 171÷180.
  • 28. Murdoch S., Lewis S.: Embedding Covert Channels into TCP/IP. Information Hiding, 200 29. Shirali-Shahreza M.: Steganography in MMS. Multitopic Conference, INMIC 2007. IEEE International Conference, 2007.
  • 30. Tachibana R., Shimizu S., Nakamura T., Kobayashi S.: An audio watermarking method robust against time and frequency fluctuation. Proc. of SPIE Int. Conf. on Security and Watermarking of Multimedia Contents III, Security Professionals Information Exchange, Vol. 4314, 2001, s. 104÷115.
  • 31. Tian H., Zhou K., Huang Y., Feng D., Liu J.: A covert communication model based on least significant bits steganography in voice over IP. Proceedings of the 9th International Conference for Young Computer Scientists, IEEE Computer Society, Washington, DC, USA 2008, s. 647÷652.
  • 32. Tian H., Zhou K., Jiang H., Feng D.: Digital logic based encoding strategies for steganog-raphy on voice-over-ip. Proceedings of the 17th ACM international conference on Multi-media, ser. MM ’09, New York, NY, USA 2009, s. 777÷780.
  • 33. Xiang S., Huang J., Yang R.: Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain. Artificial Intelligence and Lecture Notes in Bioin-formatics, Springer 2007, s. 93÷108.5, s. 247÷261.
  • 34. Xiang S., Kim H., Huang J.: Audio watermarking robust against time scale modification and MP3 compression. Signal Processing, Vol. 88, No. 10, 2008, s. 2372÷2387.
  • 35. Xu E., Liu B., Xu L., Wei Z.: Adaptive VoIP Steganography for Information Hiding with-in Network Audio Streams. Proc. NBiS, Tirana, Albania 2011.
  • 36. Wang Z., Zhao X., Wang H., Cui G.: Information hiding based on DNA steganography. 4th IEEE International Conference Software Engineering and Service Science (ICSESS), 2013.
  • 37. Hollister S.: D-Wave sells first commercial quantum computer to Lockheed Martin, http://www.engadget.com/2011/05/29/d-wave-sells-first-commercial-quantum-computer-to-lockheed-marti/.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-3f331669-92ca-4359-9e48-bd43c1e16294
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.