Analysis of the smoothing and payload distribution method on reversible audio steganography

Moh Muzayyin Amrulloh*, Tohari Ahmad, Ntivuguruzwa Jean De La Croix

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Along with the rampant theft of confidential data, technological security systems are the most important thing in the digitalization era. Data cannot be said to be safe from third parties, even though it is private or confidential when transmitted through the public network. Several studies have proposed methods of hiding data using steganography to improve data confidentiality. However, it still has quality and capacity results that are relatively inversely proportional. Therefore, it is necessary to analyze several methods to determine which can produce the best capacity and quality. The focus of this research is to seek an understanding of some recently proposed methods concerned with the smoothing and payload distribution on reversible audio steganography and provide an overview of methods suitable for use in steganography with maximum capacity and quality results.

Original languageEnglish
Title of host publication2023 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350335095
DOIs
Publication statusPublished - 2023
Event14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023 - Delhi, India
Duration: 6 Jul 20238 Jul 2023

Publication series

Name2023 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023

Conference

Conference14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
Country/TerritoryIndia
CityDelhi
Period6/07/238/07/23

Keywords

  • data hiding
  • information security
  • infrastructure
  • network security
  • payload distribution
  • steganography

Fingerprint

Dive into the research topics of 'Analysis of the smoothing and payload distribution method on reversible audio steganography'. Together they form a unique fingerprint.

Cite this