-
دسترسی آزاد مقاله
1 - Providing an Optimal Way to Increase the Security of Data Transfer using Watermarking in Digital Audio Signals
Saeed Talati Pouriya EtezadifarThe human ear is aware of a wide range of sound signal amplitudes, so signal-based amplitude marking techniques have their own complexity. This article uses Watermarking to insert the message in the audio coverage and its main purpose is to keep this information hidden چکیده کاملThe human ear is aware of a wide range of sound signal amplitudes, so signal-based amplitude marking techniques have their own complexity. This article uses Watermarking to insert the message in the audio coverage and its main purpose is to keep this information hidden for others. There are many benchmarks for evaluating insertion and extraction algorithms that, by performing multiple attacks on an algorithm, increase the ability of the method. (Resilience, Transparency and Capacity for Use). Although the LSB method is superior to other encryption techniques, it is highly vulnerable to all kinds of attacks and attacks, including Additive White Gaussian Noise. This article introduces a new idea for Watermarking voice data encryption, based on the LSB method, which follows similar bits with bits instead of pasting information. The message will be in 16-bit samples, given the introduction of the distortion reduction algorithm for the changes we have made to the signal bits for the receiver's awareness, which could be a new way of causing F Of its resistance additive white Gaussian noise and LSB standard will also improve the transparency of the procedure and the method for reducing the capacity has been used. پرونده مقاله -
دسترسی آزاد مقاله
2 - Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP
Saeed Talati Pouria EtezadiFar Mohammad Reza Hassani Ahangar Mahdi MolazadeInformation security is currently one of the most important issues that have been considered by many researchers. The purpose of Steganography is to hide hidden messages in a non-secret file. In general, information Steganography is a method of secure communication that چکیده کاملInformation security is currently one of the most important issues that have been considered by many researchers. The purpose of Steganography is to hide hidden messages in a non-secret file. In general, information Steganography is a method of secure communication that aims to hide data so that no data appears to be hidden. The principle of Steganography is to use spaces from the information carrier that do not harm the identity of the carrier. By Steganography information from unauthorized recipients, the information is hidden and hidden inside it without harming the signals. This information may be transmitted around us and wherever any file is sent. It may contain very dangerous content for the security of the space in which we live. Audio signals are very used for steganography because Digital audio signals have higher redundancy and higher data transfer speeds, making them suitable for use as a cover. The LPC10, CELP, and MELP audio standards are widely used in audio and speech processing and are powerful high-quality speech coding methods that provide highly accurate estimates of audio parameters and are widely used in communications. Therefore, since considering that these audio standards are used in commercial and military telecommunication systems, they can be considered a suitable platform for sending the following message of audio content. We try to carefully examine these standards and the audio Steganography done in these standards. پرونده مقاله -
دسترسی آزاد مقاله
3 - Secret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability
Farhad Narimani Mohammad Esmaeel Akbari Hamid VahdatiIn this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby چکیده کاملIn this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded. پرونده مقاله -
دسترسی آزاد مقاله
4 - Design and Analyses of a PWM based Seven Level CascadeCombination Inverter
Mortaza Sefidi Mehdi JarahiMultilevel Inverters has big placement advantages in Power Electronics and its application can be mentioned to FACTS tools such as UPFC – D-STATCOM. Therefore, nowadays Multilevel Inverters have created vast field’s research and researchers are trying to pre چکیده کاملMultilevel Inverters has big placement advantages in Power Electronics and its application can be mentioned to FACTS tools such as UPFC – D-STATCOM. Therefore, nowadays Multilevel Inverters have created vast field’s research and researchers are trying to present appropriate structures with fewer keys and greater advantages. The main advantages of Multilevel Inverters mentioned are low-key voltage stress and low harmonic content of the output voltage. Multilevel Inverters, having many advantages, can be referred to have low volume, low EMI, low losses and high efficiency. In this study, all equations dominating the circuit have been investigated and main and effective parameters have been identified in suggested Invertors and this method has been extended for use in n levels Invertors. Then it has investigated the changes possibility in the Invertors’ structure aiming to reduce dc voltage and to increase the number of output voltage levels. The results of simulations have emphasized the suggested structures. پرونده مقاله