2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN)
Download PDF

Abstract

There are several uses for information concealing today. The use of data hiding knowledge may be morally or immorally acceptable. Data hiding methods, however, are difficult to classify into either the steganography or the watermarking categories because there is no clear distinction between these two concepts, and classification mostly depends on algorithmic application. Hence, regardless of how data concealing is classified, the most popular data hiding applications include copyright protection, covert communication, safe storage, and fingerprinting. Messages are altered by cryptography so they can't be understood. Secured data, varied size keys for data concealment, and quick and flexible ease of design are some of cryptography's main benefits. The biggest drawback of cryptography is that it is not suitable for the internet and is only compatible with devices like mobile phones, has complicated hardware, and uses unusual cypher patterns. Steganography is a centuries-old technique for obscuring data. In this essay, a survey of current audio steganography research is presented.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles