Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/342124
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | A novel optimal soft computing algorithms based data hiding in audio for steganography applications | |
dc.date.accessioned | 2021-09-27T04:06:33Z | - |
dc.date.available | 2021-09-27T04:06:33Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/342124 | - |
dc.description.abstract | There have been extensive efforts in the field of data hidden by using hacking technology by hazards to steal valuable information through the website. In the area of the Internet also, data must be protected to prevent unauthorized or illegal access and misconduct. In the meantime, the Internet will become very fast and become the essential medium for digital data transfer. Over the past few years, several approaches have been developed and proposed to continue with information security. Many data hiding techniques have been developed to embed various types of data, such as text, image, audio, video, etc., using cryptography, steganography and watermarking. In these, steganography has significant repercussions. Steganography is an art that conceals other text, images, audio, and video. Such as audio-based steganography Optimal Genetic Based Shuffled Data Hiding (OGSDH), Optimized Audio Embeddingand Extraction Technique (OAET) and Optimal Reversible Crosswise Matrix Key (ORCMDH) were proposed and compared with the existing Reversible data hiding (RDH) and Adaptive least significant bit steganography (ALSBS) technique, etc. newline | |
dc.format.extent | xiv, 106p. | |
dc.language | English | |
dc.relation | p.95-105 | |
dc.rights | university | |
dc.title | A novel optimal soft computing algorithms based data hiding in audio for steganography applications | |
dc.title.alternative | ||
dc.creator.researcher | Anguraj S | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Information Systems | |
dc.subject.keyword | Soft Computing | |
dc.subject.keyword | Soft Computing Algorithms | |
dc.subject.keyword | Steganography Applications | |
dc.subject.keyword | Data Hiding | |
dc.description.note | ||
dc.contributor.guide | Shantharajah S P and Jebaemilyn J | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | ||
dc.date.completed | 2020 | |
dc.date.awarded | 2020 | |
dc.format.dimensions | 21cm | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.01 kB | Adobe PDF | View/Open |
02_certificates.pdf | 514.43 kB | Adobe PDF | View/Open | |
03_abstracts.pdf | 8.86 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 10.36 kB | Adobe PDF | View/Open | |
05_contents.pdf | 361.79 kB | Adobe PDF | View/Open | |
06_listoftables.pdf | 5.43 kB | Adobe PDF | View/Open | |
07_listoffigures.pdf | 294.64 kB | Adobe PDF | View/Open | |
08_listofabbreviations.pdf | 7.95 kB | Adobe PDF | View/Open | |
09_chapter1.pdf | 274.1 kB | Adobe PDF | View/Open | |
10_chapter2.pdf | 197.15 kB | Adobe PDF | View/Open | |
11_chapter3.pdf | 288.83 kB | Adobe PDF | View/Open | |
12_chapter4.pdf | 244.02 kB | Adobe PDF | View/Open | |
13_chapter5.pdf | 470.86 kB | Adobe PDF | View/Open | |
14_chapter6.pdf | 674.41 kB | Adobe PDF | View/Open | |
15_conclusion.pdf | 12.82 kB | Adobe PDF | View/Open | |
16_references.pdf | 166.61 kB | Adobe PDF | View/Open | |
17_listofpublications.pdf | 122.08 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 126.99 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: