Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/27436
Full metadata record
DC FieldValueLanguage
dc.contributor.authorismail, Mohammed alfath ahmed-
dc.contributor.authorSupervisor, -Faisal Mohamed Abdallah Ali-
dc.date.accessioned2022-08-28T12:24:40Z-
dc.date.available2022-08-28T12:24:40Z-
dc.date.issued2021-09-22-
dc.identifier.citationismail, Mohammed alfath ahmed . Secure audio Steganography using modified LSB and DCT \ Mohammed alfath ahmed ismail ; Faisal Mohamed Abdallah Ali .- Khartoum:Sudan University of Science & Technology,College of Computer Science and Information Technology,2021.-67.p.:ill.;28cm.-M.Sc.en_US
dc.identifier.urihttp://repository.sustech.edu/handle/123456789/27436-
dc.descriptionThesisen_US
dc.description.abstractIn a world of digital technology, maintaining the security of the secret data has become a big challenge. One way to achieve this is to encrypt the message before it is sent. But encryption draws the attention of third parties, which may cause the third party to seek breaking the encryption and detecting the original message. Another way is steganography, steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. In this thesis a concept for performing hidden secret data, called secure audio Steganography using modified Least Significant Bit (LSB) and Discrete Cosine Transform (DCT), was presented. Which is consist of two stenographic methods utilized respectively. Two-levels of stenography have been applied; the first level is called (the lower-level), and it has been applied using DCT. In this level three different plain texts are used as a secret data, and the cover is gray scale image, the output from the first level is a stego image. The second level is called (the Upper-level); it has been applied using modified Least Significant Bit. In this level Wav file has been used as a cover media and embeds (the gray scale image output from the first level) as a secret data. After implementation of the proposed method, many experiments have been conducted. Different sizes of plain texts and different sizes of cover have been experimented. Finally comparative analysis had been applied to experiments results and illustration to strengthand weakness points of proposed system against existing systems is obtained.en_US
dc.description.sponsorshipSudan University of Science & Technologyen_US
dc.language.isoenen_US
dc.publisherSudan University of Science & Technologyen_US
dc.subjectComputer Science and Information Technologyen_US
dc.subjectSecure audio Steganographyen_US
dc.subjectmodified LSBen_US
dc.subjectDCTen_US
dc.titleSecure audio Steganography using modified LSB and DCTen_US
dc.title.alternativeإخفاء البيانات في الصوت باستخدام خوارزميتي البت الأقل اهمية المعدله و تحويل جيب التمام المتقطعen_US
dc.typeThesisen_US
Appears in Collections:Masters Dissertations : Computer Science and Information Technology

Files in This Item:
File Description SizeFormat 
Secure audio .....pdfResearch1.61 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.