-
Mathematical Biosciences and Engineering, 2019, 16(4): 3183-3194. doi: 10.3934/mbe.2019158
Research article Special Issues
-
Export file:
Format
- RIS(for EndNote,Reference Manager,ProCite)
- BibTex
- Text
Content
- Citation Only
- Citation and Abstract
High capacity reversible data hiding in MP3 based on Huffman table transformation
National University of Defense Technology, Hefei 230037, China
Received: , Accepted: , Published:
Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication
References
1 I. Cox, M. Miller, J. Bloom, et al., Digital watermarking and steganography, 2008.
2 V. Viswanathan, Information hiding in wave files through frequency domain, Appl. Math. Comput., 201 (2008), 121–127.
3 O. T. C. Chen and W. C. Wu, Highly robust, secure, and perceptual-quality echo hiding scheme, IEEE Transact. Audio Speech Language Process., 16 (2008), 629–638.
4 M. L. Wang, H. X. Lin and M. T. Lee, Robust audio watermarking based on mdct coefficients, in International Conference on Genetic and Evolutionary Computing, 2013.
5 M. Bellaaj and K. Ouni, A robust audio watermarking technique operates in mdct domain based on perceptual measures, Int. J. Adv. Comput. Sci. Appl., 7 (2016), 169–178.
6 F. Petitcolas, Mp3stego. computer laboratory, cambridge.
7 H. Y. Gao, The mp3 steganography algorithm based on huffman coding, Acta Sci. Nat. Uni. Sunyatseni, 46 (2007), 32–35.
8 D. Q. Yan, R. D. Wang and L. G. Zhang, A high capacity mp3 steganography based on huffman coding, J. Sichuan Uni..
9 K. Yang, X. Yi, X. Zhao, et al., Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution, 2017.
10 Z. Ru, J. Liu and Z. Feng, A steganography algorithm based on mp3 linbits bit of huffman codeword, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2017.
11 D. Yan and R. Wang, Huffman table swapping-based steganograpy for mp3 audio, Multim. Tools Appl., 52 (2011), 291–305.
12 ISO/IEC, Information technologycoding of moving pictures and associated audio for digital storage media at up to about 1.5 mbit/s, 11172–3.
13 ITU, Methods for objective measurements of perceived audio quality, BS.1387.
14 C. Cachin, An Information-Theoretic Model for Steganography, 1998.
15 M. S. Atoum, A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography, 2015.
16 X. Yan, X. Liu and C. N. Yang, An enhanced threshold visual secret sharing based on random grids, J. Real-Time Image Process., 14 (2018), 61–73.
17 J. S. Pan, P. W. Tsai and H. C. Huang, Advances in intelligent information hiding and multimedia signal processing, Smart Innovat. System. Technol., 81.
18 M. Hanspach and M. Goetz, On covert acoustical mesh networks in air, arXiv preprint arXiv:1406.1213.
19 M. Guri, Y. Solwicz, A. Daidakulov, et al., Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication.
© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)