dc.contributor.author |
ismail, Mohammed alfath ahmed |
|
dc.contributor.author |
Supervisor, -Faisal Mohamed Abdallah Ali |
|
dc.date.accessioned |
2022-08-28T12:24:40Z |
|
dc.date.available |
2022-08-28T12:24:40Z |
|
dc.date.issued |
2021-09-22 |
|
dc.identifier.citation |
ismail, Mohammed alfath ahmed . Secure audio Steganography using modified LSB and DCT \ Mohammed alfath ahmed ismail ; Faisal Mohamed Abdallah Ali .- Khartoum:Sudan University of Science & Technology,College of Computer Science and Information Technology,2021.-67.p.:ill.;28cm.-M.Sc. |
en_US |
dc.identifier.uri |
http://repository.sustech.edu/handle/123456789/27436 |
|
dc.description |
Thesis |
en_US |
dc.description.abstract |
In a world of digital technology, maintaining the security of the secret data has become a big challenge. One way to achieve this is to encrypt the message before it is sent. But encryption draws the attention of third parties, which may cause the third party to seek breaking the encryption and detecting the original message. Another way is steganography, steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. In this thesis a concept for performing hidden secret data, called secure audio Steganography using modified Least Significant Bit (LSB) and Discrete Cosine Transform (DCT), was presented. Which is consist of two stenographic methods utilized respectively. Two-levels of stenography have been applied; the first level is called (the lower-level), and it has been applied using DCT. In this level three different plain texts are used as a secret data, and the cover is gray scale image, the output from the first level is a stego image. The second level is called (the Upper-level); it has been applied using modified Least Significant Bit. In this level Wav file has been used as a cover media and embeds (the gray scale image output from the first level) as a secret data.
After implementation of the proposed method, many experiments have been conducted. Different sizes of plain texts and different sizes of cover have been experimented. Finally comparative analysis had been applied to experiments results and illustration to strengthand weakness points of proposed system against existing systems is obtained. |
en_US |
dc.description.sponsorship |
Sudan University of Science & Technology |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Sudan University of Science & Technology |
en_US |
dc.subject |
Computer Science and Information Technology |
en_US |
dc.subject |
Secure audio Steganography |
en_US |
dc.subject |
modified LSB |
en_US |
dc.subject |
DCT |
en_US |
dc.title |
Secure audio Steganography using modified LSB and DCT |
en_US |
dc.title.alternative |
إخفاء البيانات في الصوت باستخدام خوارزميتي البت الأقل اهمية المعدله و تحويل جيب التمام المتقطع |
en_US |
dc.type |
Thesis |
en_US |