Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Comparative study of digital audio steganography techniques

Publication Type:

Journal Article

Authors:

Fatiha Djebbar; Beghdad Ayad; Karim Abed Meraim; Habib Hamam

Source:

EURASIP Journal on Audio, Speech, and Music Processing, Volume 1, p.25 (2012)
  • 2042 reads
  • Google Scholar
  • RTF
  • EndNote XML

Check also our Google Scolar profile

  • Downloads
  • Cited in
  • How to cite
No files have yet been downloaded.
Bajor, Michał, and Marcin Niemiec. "A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020): 261-275.
APA style: Djebbar, F., Ayad B., Meraim K. Abed, & Hamam H. (2012).  Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech, and Music Processing. 1, 25.
Chicago style: Djebbar, Fatiha, Beghdad Ayad, Karim Abed Meraim, and Habib Hamam. "Comparative study of digital audio steganography techniques." EURASIP Journal on Audio, Speech, and Music Processing 1 (2012): 25.
IEEE style: Djebbar, F., B. Ayad, K. Abed Meraim, and H. Hamam, "Comparative study of digital audio steganography techniques", EURASIP Journal on Audio, Speech, and Music Processing, vol. 1, pp. 25, 2012.
  • Trending
  • Latest
  • Most cited
  • Indonesian Intelligence Reform: Recent Challenges and Opportunities for Encouraging Democratic and Professional Intelligence (3,843)
  • Lessons Learned from Military Intelligence Services Reform in Hungary (3,588)
  • Intelligence and Security Services Reform and Oversight in Ukraine – An Interim Report (3,294)
  • Governance Challenges of Transformative Technologies (3,229)
  • Lessons from the Post-Totalitarian Transformation of Intelligence Services (2,430)
view all
  • Future Development of Quantum Computing and Its Relevance to NATO
  • Corruption as a Cybersecurity Threat in the New World Order
  • Social Media – Hate Speech – Hate Crime
  • Disinformation: Policy Responses to Building Citizen Resiliency
  • Cyber Skills Gaps – A Systematic Review of the Academic Literature
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2022
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal