A secure audio hiding method using amobile device
Other Title(s)
طريقة إخفاء صوتي أمينة باستخدام جهاز الهاتف النقال
Dissertant
Thesis advisor
Comitee Members
al-Shikh, Asim
al-Shruf, Fayiz Muhad
University
Amman Arab University
Faculty
Collage of Computer Sciences and Informatics
Department
Department of Computer Science
University Country
Jordan
Degree
Master
Degree Date
2014
English Abstract
During the past decade, the evolution of the technology has become very fast.
The Internet is one of the major impacts of technology revolutions and world becomes just like a small village, so people can access any data any time to serve the requirements of each person such as receiving data about anything or forwarding data to anyone with low cost.
The Internet is a good tool of communication between people and it is a good way to increase the speed of transferring data.
On the other hand, the process of transferring data caused many challenges because it occurs in general environment.
The multi-media area type of transferring data through the Internet, and the process of transferring becomes one of the most important types of threatened data.
This data is very important to the sender and the receiver because it may contain important personal information.
The threats can occur by listening or reading the data without giving any notification to the two parties, the person who threats the data called intruder, and it is the most dangerous type of threats.
Therefore, we will find a specific solution to maintain the security of audio during the process of transferring between the two parties.
Although, there are many methods to provide secured transferring, the steganography is the best way to hide the audio inside another audio and it is the best solution to minimize the risk of intruders.
In this study, we will use one type of steganography techniques that is called Least Significant Bit (LSB).
This process includes two parts: the first part is original audio.
It is visible for the intruders or authorized user and it is called cover.
The second part is embedded into the original audio that is called secret audio.
The result of this process is called stego audio.
We implemented our application by using two devices that support the android operating system.
Then we chose the Skype program as a host program.
The main goal of using the host program is transmitting the audio between two devices, because each device located on separate network
Main Subjects
Topics
No. of Pages
69
Table of Contents
Table of contents.
Abstract.
Abstract in Arabic.
Chapter One : Introduction.
Chapter Two : Literature review.
Chapter Three : Theoretical design.
Chapter Four : The experimental works.
Chapter Five : Conclusion and future work.
References.
American Psychological Association (APA)
Uraji, Avan Sabah. (2014). A secure audio hiding method using amobile device. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-561819
Modern Language Association (MLA)
Uraji, Avan Sabah. A secure audio hiding method using amobile device. (Master's theses Theses and Dissertations Master). Amman Arab University. (2014).
https://search.emarefa.net/detail/BIM-561819
American Medical Association (AMA)
Uraji, Avan Sabah. (2014). A secure audio hiding method using amobile device. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-561819
Language
English
Data Type
Arab Theses
Record ID
BIM-561819