A secure audio hiding method using amobile device

Other Title(s)

طريقة إخفاء صوتي أمينة باستخدام جهاز الهاتف النقال

Dissertant

Uraji, Avan Sabah

Thesis advisor

al-Hamami, Ala H.

Comitee Members

al-Shikh, Asim
al-Shruf, Fayiz Muhad

University

Amman Arab University

Faculty

Collage of Computer Sciences and Informatics

Department

Department of Computer Science

University Country

Jordan

Degree

Master

Degree Date

2014

English Abstract

During the past decade, the evolution of the technology has become very fast.

The Internet is one of the major impacts of technology revolutions and world becomes just like a small village, so people can access any data any time to serve the requirements of each person such as receiving data about anything or forwarding data to anyone with low cost.

The Internet is a good tool of communication between people and it is a good way to increase the speed of transferring data.

On the other hand, the process of transferring data caused many challenges because it occurs in general environment.

The multi-media area type of transferring data through the Internet, and the process of transferring becomes one of the most important types of threatened data.

This data is very important to the sender and the receiver because it may contain important personal information.

The threats can occur by listening or reading the data without giving any notification to the two parties, the person who threats the data called intruder, and it is the most dangerous type of threats.

Therefore, we will find a specific solution to maintain the security of audio during the process of transferring between the two parties.

Although, there are many methods to provide secured transferring, the steganography is the best way to hide the audio inside another audio and it is the best solution to minimize the risk of intruders.

In this study, we will use one type of steganography techniques that is called Least Significant Bit (LSB).

This process includes two parts: the first part is original audio.

It is visible for the intruders or authorized user and it is called cover.

The second part is embedded into the original audio that is called secret audio.

The result of this process is called stego audio.

We implemented our application by using two devices that support the android operating system.

Then we chose the Skype program as a host program.

The main goal of using the host program is transmitting the audio between two devices, because each device located on separate network

Main Subjects

Mathematics

Topics

No. of Pages

69

Table of Contents

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Literature review.

Chapter Three : Theoretical design.

Chapter Four : The experimental works.

Chapter Five : Conclusion and future work.

References.

American Psychological Association (APA)

Uraji, Avan Sabah. (2014). A secure audio hiding method using amobile device. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-561819

Modern Language Association (MLA)

Uraji, Avan Sabah. A secure audio hiding method using amobile device. (Master's theses Theses and Dissertations Master). Amman Arab University. (2014).
https://search.emarefa.net/detail/BIM-561819

American Medical Association (AMA)

Uraji, Avan Sabah. (2014). A secure audio hiding method using amobile device. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-561819

Language

English

Data Type

Arab Theses

Record ID

BIM-561819