Analysis of Wavelet Families on Audio Steganography Using AES

With the growing trends in wireless network in this modern era, more and more multimedia data are generated and transmitted. So the effective ways to ensure their security are increased. This can be achieved by implementing steganography techniques. Audio steganography is more challenging compared to image or video steganography. There are number of audio steganography methods. In this paper, the authors focus on different wavelet families for embedding secret message in audio file. The advantage of wavelet is due to its reconstruction property and its capacity of capturing the low frequency component.

Spotlight

Cybage

Cybage Software Pvt. Ltd. is a technology consulting organization specializing in outsourced product engineering services. As a leader in hi-tech and product engineering space, Cybage works with some of the world’s best Independent Software Vendors (ISVs). Our solutions are focused on modern technologies, and are enabled by a scientific, data driven system called ExcelShore® Model of Operational Excellence. This unique model de-risks our approach, provides better predictability, and ensures a better value per unit cost to our clients.

OTHER WHITEPAPERS
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

Multiverse Security: Easy, Built-in, Comprehensive and Continuous

whitePaper | December 12, 2022

In the evolution of Internet-based technologies, Web 2.0 introduced popular decentralized services that accelerated interactivity between websites and users. Looking to capitalize on this innovation, businesses rushed to launch applications to the market. However, both the Web 2.0 architecture and dependent businesses failed to incorporate key security principles into the design and implementation of these services, resulting in critical vulnerabilities.

Read More
news image

Identity and Zero Trust: A Health-ISAC Guide for CISOS

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Cloud Native Security Model

whitePaper | December 23, 2022

Moving to the cloud is more than a technical transition to a new platform. It is a core part of an enterprise's growth strategy and while strategically important, it can also be potentially disruptive.

Read More
news image

Dell VxRail: Comprehensive Security by Design

whitePaper | September 29, 2022

In today’s world, business organizations and individuals have become accustomed to accessing the information they need 24 hours a day, seven days a week, often within seconds of making a request. To illustrate, an ad marketing study conducted by Google found that 53% of website sessions are terminated if pages take longer than three seconds to load.

Read More
news image

Amplify Your Ransomware Defenses: Protect, Detect and Recover

whitePaper | December 28, 2022

The Cohesity platform provides exceptional value for organizations to protect and manage vast enterprise data stores. But cyber criminals target data stores for various nefarious activities, most notably ransomware and data theft. Ransomware continues as the leading threat as it provides easy monetization, and therefore cyber criminals work non-stop to compromise organizations.

Read More

Spotlight

Cybage

Cybage Software Pvt. Ltd. is a technology consulting organization specializing in outsourced product engineering services. As a leader in hi-tech and product engineering space, Cybage works with some of the world’s best Independent Software Vendors (ISVs). Our solutions are focused on modern technologies, and are enabled by a scientific, data driven system called ExcelShore® Model of Operational Excellence. This unique model de-risks our approach, provides better predictability, and ensures a better value per unit cost to our clients.

Events