Mostrar el registro sencillo del ítem
Comunicación encubierta de mensajes de voz dentro de audio
dc.contributor.advisor | Ballesteros Larrota, Dora Maria | spa |
dc.contributor.author | Vargas Hernandez, Carlos Steven | |
dc.coverage.spatial | Calle 100 | spa |
dc.date.accessioned | 2017-03-31T14:18:17Z | |
dc.date.accessioned | 2019-12-26T22:06:16Z | |
dc.date.available | 2017-03-31T14:18:17Z | |
dc.date.available | 2019-12-26T22:06:16Z | |
dc.date.issued | 2016-02-25 | |
dc.identifier.uri | http://hdl.handle.net/10654/15176 | |
dc.description.abstract | En este trabajo se presenta una mejora de la capacidad de ocultamiento del método Quantization Index Modulation (QIM) para ocultar señales de voz dentro de audio. La principal razón para mejorar la capacidad de ocultamiento del método QIM es que sea viable aplicarlo en esteganografía de audio, ya que su baja capacidad de ocultamiento suele ser un impedimento ya que puede generar señales Stego demasiado grandes y por tanto generar que la comunicación sea lenta debido a la gran cantidad de información que tiene que viajar por el canal. La mejora realizada al método QIM es evaluada por medio de diferentes pruebas para asegurar que la información secreta sea imperceptible y que el método es transparente desde el punto de vista estadístico. | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | spa | spa |
dc.title | Comunicación encubierta de mensajes de voz dentro de audio | spa |
dc.type | info:eu-repo/semantics/bachelorThesis | spa |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
dc.subject.lemb | PROTECCION DE DATOS | spa |
dc.subject.lemb | SEGURIDAD DE COMPUTADORES | spa |
dc.publisher.department | Facultad de Ingeniería | spa |
dc.type.local | Trabajo de grado | spa |
dc.description.abstractenglish | This study shows an improvement of the hiding capacity of the Quantization Index Modulation (QIM) method to hide voice signals into audio. The main reason to improvement the hiding capacity of the QIM method is that be feasible apply it in audio steganography, because its hiding capacity low usually is an impediment because can create Stego signals very big and then cause a slow communication because there is a big amount of information on the channel information. The improvement done to QIM method is evaluated by different tests to ensure that the secret information is imperceptible and that the method is transparent from the statistical viewpoint. | eng |
dc.title.translated | covert communication of voice messages into audio | spa |
dc.subject.keywords | audio steganography | spa |
dc.subject.keywords | imperceptibility | spa |
dc.subject.keywords | quantization step | spa |
dc.subject.keywords | host signal | spa |
dc.subject.keywords | stego signal | spa |
dc.publisher.program | Ingeniería en Telecomunicaciones | spa |
dc.creator.degreename | Ingeniero en Telecomunicaciones | spa |
dc.description.degreelevel | Pregrado | spa |
dc.type.version | info:eu-repo/semantics/acceptedVersion | spa |
dc.relation.references | Bilal, I., Roj, M. S., Kumar, R., & Mishra, P. K. (2014, 11-13 Dec. 2014). Recent advancement in audio steganography. Paper presented at the Parallel, Distributed and Grid Computing (PDGC), 2014 International Conference on. | spa |
dc.relation.references | Chen, B., & Wornell, Gregory W. (2001). Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. Information Theory, IEEE Transactions on, 47(4), 1423-1443. doi: 10.1109/18.923725 | spa |
dc.relation.references | Izadinia, H., Sadeghi, F., & Rahmati, M. (2009, 8-10 March 2009). A New Steganographic Method Using Quantization Index Modulation. Paper presented at the Computer and Automation Engineering, 2009. ICCAE '09. International Conference on. | spa |
dc.relation.references | Phadikar, Amit. (2013). Multibit quantization index modulation: A high-rate robust data-hiding method. Journal of King Saud University - Computer and Information Sciences, 25(2), 163-171. doi: http://dx.doi.org/10.1016/j.jksuci.2012.11.005 | spa |
dc.relation.references | Noda, Hideki, Niimi, Michiharu, & Kawaguchi, Eiji. (2006). High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters, 27(5), 455-461. doi: http://dx.doi.org/10.1016/j.patrec.2005.09.008 | spa |
dc.relation.references | J. Vimal and A. M. Alex, "Audio steganography using dual randomness LSB method," in Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014 International Conference on, 2014, pp. 941-944. | spa |
dc.relation.references | Jayaram, Ranganatha, & Anupama,. (2011). Information Hiding Using Audio Steganography - A Survey. IJMA, 3(3), 86-96. http://dx.doi.org/10.5121/ijma.2011.3308 | spa |
dc.relation.references | Mahajan, M., & Kaur, N. (2012). Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques. International Journal of Computer Network and Information Security, 4(10), 76-92. http://dx.doi.org/10.5815/ijcnis.2012.10.08 | spa |
dc.relation.references | Sakthisudhan, K., Prabhu, P., Thangaraj, P., & Marimuthu, C. M. (2012). Dual Steganography Approach for Secure Data Communication. Procedia Engineering, 38, 412-417. doi: http://dx.doi.org/10.1016/j.proeng.2012.06.051 | spa |
dc.relation.references | Hemalatha, S., Acharya, U. Dinesh, & Renuka, A. (2015). Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image. Procedia Computer Science, 47, 272-281. doi: http://dx.doi.org/10.1016/j.procs.2015.03.207 | spa |
dc.subject.proposal | esteganografía de audio | spa |
dc.subject.proposal | imperceptibilidad | spa |
dc.subject.proposal | paso de cuantización | spa |
dc.subject.proposal | señal huésped | spa |
dc.subject.proposal | señal stego | spa |
dc.publisher.grantor | Universidad Militar Nueva Granada | spa |