SUST Repository

Secure audio Steganography using modified LSB and DCT

Show simple item record

dc.contributor.author ismail, Mohammed alfath ahmed
dc.contributor.author Supervisor, -Faisal Mohamed Abdallah Ali
dc.date.accessioned 2022-08-28T12:24:40Z
dc.date.available 2022-08-28T12:24:40Z
dc.date.issued 2021-09-22
dc.identifier.citation ismail, Mohammed alfath ahmed . Secure audio Steganography using modified LSB and DCT \ Mohammed alfath ahmed ismail ; Faisal Mohamed Abdallah Ali .- Khartoum:Sudan University of Science & Technology,College of Computer Science and Information Technology,2021.-67.p.:ill.;28cm.-M.Sc. en_US
dc.identifier.uri http://repository.sustech.edu/handle/123456789/27436
dc.description Thesis en_US
dc.description.abstract In a world of digital technology, maintaining the security of the secret data has become a big challenge. One way to achieve this is to encrypt the message before it is sent. But encryption draws the attention of third parties, which may cause the third party to seek breaking the encryption and detecting the original message. Another way is steganography, steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. In this thesis a concept for performing hidden secret data, called secure audio Steganography using modified Least Significant Bit (LSB) and Discrete Cosine Transform (DCT), was presented. Which is consist of two stenographic methods utilized respectively. Two-levels of stenography have been applied; the first level is called (the lower-level), and it has been applied using DCT. In this level three different plain texts are used as a secret data, and the cover is gray scale image, the output from the first level is a stego image. The second level is called (the Upper-level); it has been applied using modified Least Significant Bit. In this level Wav file has been used as a cover media and embeds (the gray scale image output from the first level) as a secret data. After implementation of the proposed method, many experiments have been conducted. Different sizes of plain texts and different sizes of cover have been experimented. Finally comparative analysis had been applied to experiments results and illustration to strengthand weakness points of proposed system against existing systems is obtained. en_US
dc.description.sponsorship Sudan University of Science & Technology en_US
dc.language.iso en en_US
dc.publisher Sudan University of Science & Technology en_US
dc.subject Computer Science and Information Technology en_US
dc.subject Secure audio Steganography en_US
dc.subject modified LSB en_US
dc.subject DCT en_US
dc.title Secure audio Steganography using modified LSB and DCT en_US
dc.title.alternative إخفاء البيانات في الصوت باستخدام خوارزميتي البت الأقل اهمية المعدله و تحويل جيب التمام المتقطع en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Share

Search SUST


Browse

My Account