A secure audio hiding method using amobile device

العناوين الأخرى

طريقة إخفاء صوتي أمينة باستخدام جهاز الهاتف النقال

مقدم أطروحة جامعية

Uraji, Avan Sabah

مشرف أطروحة جامعية

al-Hamami, Ala H.

أعضاء اللجنة

al-Shikh, Asim
al-Shruf, Fayiz Muhad

الجامعة

جامعة عمان العربية

الكلية

كلية العلوم الحاسوبية و المعلوماتية

القسم الأكاديمي

قسم علم الحاسوب

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2014

الملخص الإنجليزي

During the past decade, the evolution of the technology has become very fast.

The Internet is one of the major impacts of technology revolutions and world becomes just like a small village, so people can access any data any time to serve the requirements of each person such as receiving data about anything or forwarding data to anyone with low cost.

The Internet is a good tool of communication between people and it is a good way to increase the speed of transferring data.

On the other hand, the process of transferring data caused many challenges because it occurs in general environment.

The multi-media area type of transferring data through the Internet, and the process of transferring becomes one of the most important types of threatened data.

This data is very important to the sender and the receiver because it may contain important personal information.

The threats can occur by listening or reading the data without giving any notification to the two parties, the person who threats the data called intruder, and it is the most dangerous type of threats.

Therefore, we will find a specific solution to maintain the security of audio during the process of transferring between the two parties.

Although, there are many methods to provide secured transferring, the steganography is the best way to hide the audio inside another audio and it is the best solution to minimize the risk of intruders.

In this study, we will use one type of steganography techniques that is called Least Significant Bit (LSB).

This process includes two parts: the first part is original audio.

It is visible for the intruders or authorized user and it is called cover.

The second part is embedded into the original audio that is called secret audio.

The result of this process is called stego audio.

We implemented our application by using two devices that support the android operating system.

Then we chose the Skype program as a host program.

The main goal of using the host program is transmitting the audio between two devices, because each device located on separate network

التخصصات الرئيسية

الرياضيات

الموضوعات

عدد الصفحات

69

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Literature review.

Chapter Three : Theoretical design.

Chapter Four : The experimental works.

Chapter Five : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Uraji, Avan Sabah. (2014). A secure audio hiding method using amobile device. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-561819

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Uraji, Avan Sabah. A secure audio hiding method using amobile device. (Master's theses Theses and Dissertations Master). Amman Arab University. (2014).
https://search.emarefa.net/detail/BIM-561819

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Uraji, Avan Sabah. (2014). A secure audio hiding method using amobile device. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-561819

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-561819