The developed method of steganographic hiding of text information in an audio signal based on the wavelet transform acquires a deep meaning in the conditions of the use by an attacker of deliberate unauthorized manipulations with a steganocoded audio signal to distort the text information embedded in it. Thus, increasing the robustness of the stego-system by compressing the steganocoded audio signal subject to the preservation of the integrity of text information, taking into account the features of the psychophysiological model of sound perception, is the main objective of this scientific research. The task of this scientific research is effectively solved using a multilevel discrete wavelet transform using adaptive block normalization of text information with subsequent recursive embedding in the low-frequency component of the audio signal and further scalar product of the obtained coefficients with the Daubechies wavelet filters. The results of the obtained experimental studies confirm the hypothesis, namely that it is proposed to use recursive embedding in the low-frequency component (approximating wavelet coefficients) followed by their scalar product with wavelet filters at each level of the wavelet decomposition, which will increase the average power of hidden data. It should be noted that upon analyzing the existing method, which is based on embedding text information in the high-frequency component (detailed wavelet coefficients), at the last level of the wavelet decomposition, we obtained the limit CR = 6, and in the developed, CR = 20, with full integrity of the text information in both cases. Therefore, the resistance of the stego-system is increased by 3.3 times to deliberate or passive compression of the audio signal in order to distort the embedded text information.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9371059 | PMC |
http://dx.doi.org/10.3390/s22155832 | DOI Listing |
Psychol Res
January 2025
Department of Neurology and Clinical Neurophysiology Unit, Faculty of Medicine-Cairo University, Cairo, Egypt.
J Vis Exp
December 2024
Department of Epigenetics and Molecular Carcinogenesis, University of Texas MD Anderson Cancer Center; Department of Gynecologic Oncology and Reproductive Medicine, University of Texas MD Anderson Cancer Center;
The CUT&RUN technique facilitates detection of protein-DNA interactions across the genome. Typical applications of CUT&RUN include profiling changes in histone tail modifications or mapping transcription factor chromatin occupancy. Widespread adoption of CUT&RUN is driven, in part, by technical advantages over conventional ChIP-seq that include lower cell input requirements, lower sequencing depth requirements, and increased sensitivity with reduced background signal due to a lack of cross-linking agents that otherwise mask antibody epitopes.
View Article and Find Full Text PDFJ Vis Exp
December 2024
School of Life Science, Beijing University of Chinese Medicine;
J Vis Exp
December 2024
Cognitive and Neural Sciences, Department of Psychology, University of South Carolina;
J Vis Exp
December 2024
Department of Biological and Environmental Sciences and Technologies (DiSTeBA), University of Salento; NBFC, National Biodiversity Future Center;
Hemocytes are the circulating immune-competent cells in bivalve mollusks and play a key role in several important functions of cell-mediated innate immunity. During the early stages of the immune response, hemocytes actively migrate to the site of infection. This inherent motility is a fundamental characteristic of these cells.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!