Abstract

In recent years, the wide applications of the wireless sensor networks have achieved great success. However, the security is a critical issue in many scenarios ranging from covert military operations to the organization of the social unrest. Because the traditional encrypting methods are easy to arouse suspicion, an adaptive audio steganography method is proposed. The method is based on interval and variable low bit coding, which can be applied to covert wireless communication. The interval for embedding secret messages into the audio file and the threshold in variable low bit coding are used for selecting the embedding location and embedding bits adaptively; thus the embedding capacity and the embedding rate are variable. Experimental results demonstrate that the proposed method has better performance in embedding rate and invisibility than other audio steganography methods.

Highlights

  • Nowadays, wireless sensor networks (WSNs) and multimedia are getting increasing attention from both academic and industry communities, which hold the promise of facilitating large-scale and real-time data processing including video and audio in complex real-time multimedia environments, retrieving multimedia content, and object detection [1,2,3]

  • The program is composed of two parts, the ordinary wireless communication and the application of steganography

  • signal-to-noise ratio (SNR), mean square error (MSE), bit error rate (BER), and the waveform are widely used to evaluate the imperceptibility of the audio steganography methods

Read more

Summary

Introduction

Wireless sensor networks (WSNs) and multimedia are getting increasing attention from both academic and industry communities, which hold the promise of facilitating large-scale and real-time data processing including video and audio in complex real-time multimedia environments, retrieving multimedia content, and object detection [1,2,3]. The security for real-time communication is a critical issue that must be resolved. Cryptography techniques are utilized for the security of WSNs, which are based on rendering the content of a message garbled to unauthorized people [4]. Steganography, which is a process of embedding secret messages into a cover signal to avoid illegal detection [5], was introduced to ensure the transmission safety of the secret information and authenticate the multimedia data in WSNs [6, 7]. A verifiable diversity ranking search scheme over encrypted outsourced data is proposed while preserving privacy in cloud computing, which supports search results verification [8]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call