Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
An Approach for Securing Voice Communication via Image Watermarking Technique
Miran Baban, Mahdi Younis
Pages - 1 - 8 | Revised - 31-12-2018 | Published - 01-02-2019
MORE INFORMATION
KEYWORDS
Watermarking, Binary, Voice, Hide, Image, Security, Communication, Stenography.
ABSTRACT
Nowadays, Internet users use many social websites for communication with each other, and some of the users may live in another part of the world. Thus, communication becomes much easier and faster. However, with internet growing and their users, it becomes more likely to be attacked by hackers and intruders to access people personal data. Also, some professional hackers can detect the entire communication component for instance; text, image, video and voice messages.
In this paper, it is focused on one component, which is voice communication; and the main idea of this work is to hide the voice message that generated from one side and convert to a wave data, then to the binary code consequently on the receiver side. Later, the generated code will hide inside an image before reaching the destination. The final step is to reverse the whole security process that has been done in the source side. Therefore it can provide a safe environment for voice communication among the internet client.
In this paper, it is focused on one component, which is voice communication; and the main idea of this work is to hide the voice message that generated from one side and convert to a wave data, then to the binary code consequently on the receiver side. Later, the generated code will hide inside an image before reaching the destination. The final step is to reverse the whole security process that has been done in the source side. Therefore it can provide a safe environment for voice communication among the internet client.
A Study of Various Steganographic Techniques Used for Information Hiding. C.P.Sumathi, T.Santanam, G.Umamaheswari. 6, s.l. : International Journal of Computer Science & Engineering Survey (IJCSES), 2013, Vol. 4. | |
A Survey of Digital Watermarking Techniques and its Applications. Lalit Kumar Saini, Vishal Shrivastava. 3, s.l. : International Journal of Computer Science Trends and Technology (IJCST), 2014, Vol. 2. | |
A Survey: Digital Image Watermarking Techniques. Preeti Parashar, Rajeev Kumar Singh. 6, s.l. : International Journal of Signal Processing, Image Processing, and Pattern Recognition, 2014, Vol. 7. | |
Boontawan, R., Tooprakai, S., Dejhan, K. and Yimman, S. (2016). Algorithmic Scheme- Integrated Bandwidth Compensatory Reconstruction Filter of Digital Signal Processing System. Journal of Signal Processing, 20(3), pp.91-103. | |
Future of Internet technologies. Daniel Pavlic, Mile Pavlic, Vladan Jovanovic. s.l. : IEEE, 2012. | |
Hanai, S. and Suzuki, M. (2013). SOUND PROCESSING APPARATUS, SOUND PROCESSING METHOD, AND SOUND PROCESSING PROGRAM. The Journal of the Acoustical Society of America, 134(5), p.3962. | |
HIGH-SPEED DIGITAL SIGNAL PROCESSING ELECTRONICS FOR THE TLS LONGITUDINAL FEEDBACK SYSTEM. M. S. Yeh, K. T. Hsu, C. H. Kuo, W. K. Lau, J. F. Lee, H. J. Tsai, SRRC, Hsinchu. New York: IEEE, 1999. | |
Hussein. Rustom, N. (2017). A Review in Using Steganography Applications in Hiding Text Inside Digital Image (BMP). International Journal of Advanced Research in Computer Science and Software Engineering, 7(1), pp.36-41. | |
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. Olanrewaju R.F., Khalifa O., Rahman H.A. s.l. : World Applied Sciences Journal 21, 2013. | |
Internet technologies in depth. the technique of spam recognition based on header investigating. Adamov, Abzetdin. Azerbaijan, Baku: IEEE, 2011. | |
K., Z. (2016). Text Encryption using Modified AES-2 Keys. International Journal of Computer Applications, 149(4), pp.27-31. | |
Meng, P., Hang, L., Yang, W., Chen, Z. and Zheng, H. (2009). Linguistic Steganography Detection Algorithm Using Statistical Language Model. 2009 International Conference on Information Technology and Computer Science. | |
Provided security measures of enabling technologies in Internet of Things (IoT): A survey. Minela Grabovica, Srđan Popić, Dražen Pezer, Vladimir Knežević. Serbia : Zooming Innovation in Consumer Electronics International Conference (ZINC), 2016. | |
Rawat, D. and Bhandari, V. (2013). Steganography Technique for Hiding Text Information in Color Image using Improved LSB Method. International Journal of Computer Applications, 67(1), pp.22-25. | |
Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. AL-Nabhani, Yahya, et al., et al. 4, Saudia Arabia: Journal of King Saud University, 2015, Vol. 27. | |
Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. Yahya AL-Nabhani, Hamid A. Jalab *, Ainuddin Wahid, Rafidah Md Noor. s.l. : Journal of King Saud University Computer and Information Sciences, 2015, Vol. 27. | |
Security System for Sending Information Containing Hidden Voice Data by Steganography (SIOVE) Using Matlab. Rinza, Bàrbara Emma Sànchez, Salgado, Marìa del Rocìo Guadalupe Morales and Olguìn, Cristian Omar Cortez. 1, Bàrbara Emma Sànchez Rinza, Marìa del Rocìo Guadalupe Morales Salgado*, Cristian Omar Cortez Olguìn Faculty of Computer Science, Benemèrita Universidad Autònoma de Puebla, Universidad Popular Autònoma del Estado de Puebla Puebla, Puebla : International Journal of Engineering and Innovative Technology (IJEIT), 2015, Vol. 5. | |
Steganography Techniques-A Review Paper. Jaslen Kour, Deepankar Verma. 5, s.l. : International Journal of Emerging Research in Management and Technology, 2014, Vol. 3. | |
The visions, technologies, applications and security issues of Internet of Things. Shen Guicheng, Liu Bingwu. s.l. : Institute of Electrical and Electronics Engineers (IEEE), 2011. | |
Zhi-Hui Wang, The Duc Kieu, Chin-Chen Chang and Ming-Chu Li (2009). Emoticon-based text steganography in chat. 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA). | |
Mr. Miran Baban
Basic Science Department
University of Sulaimani
Sulaimani, Iraq - Iraq
miran.mohammed@univsul.edu.iq
Mr. Mahdi Younis
Information Technology
University of Sulaimani
Sulaimani, Iraq - Iraq
|
|
|
|
View all special issues >> | |
|
|