scholarly journals An Approach to Hide an Audio File in Image Using LSB Technique

Author(s):  
Mohammed Majid Msallam
Keyword(s):  
Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 371
Author(s):  
Yerin Lee ◽  
Soyoung Lim ◽  
Il-Youp Kwak

Acoustic scene classification (ASC) categorizes an audio file based on the environment in which it has been recorded. This has long been studied in the detection and classification of acoustic scenes and events (DCASE). This presents the solution to Task 1 of the DCASE 2020 challenge submitted by the Chung-Ang University team. Task 1 addressed two challenges that ASC faces in real-world applications. One is that the audio recorded using different recording devices should be classified in general, and the other is that the model used should have low-complexity. We proposed two models to overcome the aforementioned problems. First, a more general classification model was proposed by combining the harmonic-percussive source separation (HPSS) and deltas-deltadeltas features with four different models. Second, using the same feature, depthwise separable convolution was applied to the Convolutional layer to develop a low-complexity model. Moreover, using gradient-weight class activation mapping (Grad-CAM), we investigated what part of the feature our model sees and identifies. Our proposed system ranked 9th and 7th in the competition for these two subtasks, respectively.


2018 ◽  
Vol 38 (2) ◽  
pp. 207-224 ◽  
Author(s):  
Melanie Revilla ◽  
Mick P. Couper ◽  
Oriol J. Bosch ◽  
Marc Asensio

We implemented an experiment within a smartphone web survey to explore the feasibility of using voice input (VI) options. Based on device used, participants were randomly assigned to a treatment or control group. Respondents in the iPhone operating system (iOS) treatment group were asked to use the dictation button, in which the voice was translated automatically into text by the device. Respondents with Android devices were asked to use a VI button which recorded the voice and transmitted the audio file. Both control groups were asked to answer open-ended questions using standard text entry. We found that the use of VI still presents a number of challenges for respondents. Voice recording (Android) led to substantially higher nonresponse, whereas dictation (iOS) led to slightly higher nonresponse, relative to text input. However, completion time was significantly reduced using VI. Among those who provided an answer, when dictation was used, we found fewer valid answers and less information provided, whereas for voice recording, longer and more elaborated answers were obtained. Voice recording (Android) led to significantly lower survey evaluations, but not dictation (iOS).


Author(s):  
Heidi Biseth ◽  
Halla Holmarsdottir
Keyword(s):  

Editorial discussion in an audio file - available for download on the right-hand side column - 7,5 minutes.


2021 ◽  
Vol 26 (1) ◽  
pp. 135-142
Author(s):  
Kanusu Srinivasa Rao ◽  
Mandapati Sridhar

The current era is mainly focused on secured data transmission and every organization takes preventive measures to protect network’s private data. Among different techniques visual cryptography is a prominent one that that encrypts the visual information and decrypts secret using mechanical operations without any computation, but each share need pixel expansion. In the current work, we propose an Image encryption technique using (n, n) Visual cryptography based on simple operations without pixel expansion. The proposed novel technique gives an image encryption using visual cryptography based on Least significant bit (LSB) technique in spatial domain and parity mechanism using Exclusive-OR(XOR) operation. developed for encrypting grey scale image. Image encryption and decryption uses simple Boolean operations. The technique provides better quality of shares and recovers without any loss.


Author(s):  
Pinky Saikia Dutta ◽  
Sauvik Chakraborty

Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.


Author(s):  
Jawwad Ali Baloch ◽  
Awais Khan Jumani ◽  
Asif Ali Laghari ◽  
Vania V. Estrela ◽  
Ricardo T. Lopes

Author(s):  
Muhammad Yaasir Khodabacchus

In our global community, the Internet, the issue of copyright is increasing. The International Maritime Bureau (IMB) reported over thousands of incidents this year compared to three hundred only ten years ago. Although laws and other ways have been intended to protect the rights of content developers and describe restrictions that can be placed on copying materials, pirate users always find a way to breach the protection. Base on this fact, a new method has been implemented using biometrics as it is described in the following chapters. This paper was developed taking into consideration one of the most widely used biometrics which is the fingerprint. Precisely, the aim of the system includes embedding the fingerprint into an audio file which can only be read using the fingerprint of the registered user.


Author(s):  
Anna C. McFadden

The simple nature of podcasting and Really Simple Syndication (RSS) belies the power for change embodied in them, either singly or in tandem. On the surface, podcasting is merely the recording of an audio file in MP3 format for sharing on the Internet, an MP3 player or some other device; this chapter covers the history and technical aspects of that process. Podcasting and the RSS feeds that keep consumers of podcasting connected to the source are examined as part of a larger movement in computer mediated collaboration that centers on mobility, immediacy, and interactivity. Podcasting, as a personal tool or an organizationally managed one is examined in terms of types of podcasts, their current applications and future trends that can be anticipated in their use..


Sign in / Sign up

Export Citation Format

Share Document