The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, an algorithm has been proposed to provide security to digital songs through generating a correlation between amplitude and phase components of song signal without changing its audible quality. Generating interrelationship between amplitude and phase signals with the help of wavelet transform (symmetrization mode) is the first phase of proposed technique followed by fabrication of authenticating...
In this paper a DCT based gray scale image authentication technique in frequency domain, termed as AINCDCT has been proposed. The cover image transformed into the spectral domain through 2 × 2 mask in row major order using nonconventional DCT, resulting corresponding frequency components. Higher frequency components having less energy, replaced by secret bits using secret key and a hash function....
In this paper, an approach has been made to provide security to digital songs through embedding authenticating secret code from another strip of song signal into the original signal without changing its audible quality. Embedding secrete song into original signal is the first phase of the proposed technique followed by fabrication of authenticating code. The embedded unique secret audio is used to...
In this paper a DCT based steganographic technique in frequency domain, termed as SADCT has been proposed for authentication of color images. The cover image transformed into the time domain using 8×8 mask in row major order using DCT resulting its corresponding frequency components. Highest frequency values are fetched from red and green components of transformed RGB matrix as watermark. Using a...
In this paper a minimum deviation of fidelity based data embedding technique (STMDF) has been proposed where two bits per byte have been replaced by choosing the position randomly between LSB and up to fourth bit towards MSB. This technique also optimized the intensity value of pixel after embedding by comparing it with original pixel value. STMDF technique has been compared with existing Wu-Tsai's...
In this paper a DWT based frequency domain steganographic technique, termed as WTSIC has been proposed where the cover PPM image transform into the time domain through DWT, resulting four sub-image components as `Low resolution', `Horizontal orientation', `Vertical orientation' and `Diagonal orientation'. Secret message/image bits stream in varying positions are embedded in all three components and...
The importance of identifying a song from similar songs is increasing with the growing importance of high quality editing and processing of audio signals. In this paper a novel technique to protect piracy of quality songs has been derived using amplitude manipulation. A technique to identify a particular song by enforcing authentication via amplitude manipulation has been developed based on sampled...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.