• فهرست مقالات LSB

      • دسترسی آزاد مقاله

        1 - Providing an Optimal Way to Increase the Security of Data Transfer using Watermarking in Digital Audio Signals
        Saeed Talati Pouriya Etezadifar
        The human ear is aware of a wide range of sound signal amplitudes, so signal-based amplitude marking techniques have their own complexity. This article uses Watermarking to insert the message in the audio coverage and its main purpose is to keep this information hidden چکیده کامل
        The human ear is aware of a wide range of sound signal amplitudes, so signal-based amplitude marking techniques have their own complexity. This article uses Watermarking to insert the message in the audio coverage and its main purpose is to keep this information hidden for others. There are many benchmarks for evaluating insertion and extraction algorithms that, by performing multiple attacks on an algorithm, increase the ability of the method. (Resilience, Transparency and Capacity for Use). Although the LSB method is superior to other encryption techniques, it is highly vulnerable to all kinds of attacks and attacks, including Additive White Gaussian Noise. This article introduces a new idea for Watermarking voice data encryption, based on the LSB method, which follows similar bits with bits instead of pasting information. The message will be in 16-bit samples, given the introduction of the distortion reduction algorithm for the changes we have made to the signal bits for the receiver's awareness, which could be a new way of causing F Of its resistance additive white Gaussian noise and LSB standard will also improve the transparency of the procedure and the method for reducing the capacity has been used. پرونده مقاله
      • دسترسی آزاد مقاله

        2 - Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP
        Saeed Talati Pouria EtezadiFar Mohammad Reza Hassani Ahangar Mahdi Molazade
        Information security is currently one of the most important issues that have been considered by many researchers. The purpose of Steganography is to hide hidden messages in a non-secret file. In general, information Steganography is a method of secure communication that چکیده کامل
        Information security is currently one of the most important issues that have been considered by many researchers. The purpose of Steganography is to hide hidden messages in a non-secret file. In general, information Steganography is a method of secure communication that aims to hide data so that no data appears to be hidden. The principle of Steganography is to use spaces from the information carrier that do not harm the identity of the carrier. By Steganography information from unauthorized recipients, the information is hidden and hidden inside it without harming the signals. This information may be transmitted around us and wherever any file is sent. It may contain very dangerous content for the security of the space in which we live. Audio signals are very used for steganography because Digital audio signals have higher redundancy and higher data transfer speeds, making them suitable for use as a cover. The LPC10, CELP, and MELP audio standards are widely used in audio and speech processing and are powerful high-quality speech coding methods that provide highly accurate estimates of audio parameters and are widely used in communications. Therefore, since considering that these audio standards are used in commercial and military telecommunication systems, they can be considered a suitable platform for sending the following message of audio content. We try to carefully examine these standards and the audio Steganography done in these standards. پرونده مقاله
      • دسترسی آزاد مقاله

        3 - Secret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability
        Farhad Narimani Mohammad Esmaeel Akbari Hamid Vahdati
        In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby چکیده کامل
        In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded. پرونده مقاله
      • دسترسی آزاد مقاله

        4 - Design and Analyses of a PWM based Seven Level CascadeCombination Inverter
        Mortaza Sefidi Mehdi Jarahi
        Multilevel Inverters has big placement advantages in Power Electronics and its application can be mentioned to FACTS tools such as UPFC – D-STATCOM. Therefore, nowadays Multilevel Inverters have created vast field’s research and researchers are trying to pre چکیده کامل
        Multilevel Inverters has big placement advantages in Power Electronics and its application can be mentioned to FACTS tools such as UPFC – D-STATCOM. Therefore, nowadays Multilevel Inverters have created vast field’s research and researchers are trying to present appropriate structures with fewer keys and greater advantages. The main advantages of Multilevel Inverters mentioned are low-key voltage stress and low harmonic content of the output voltage. Multilevel Inverters, having many advantages, can be referred to have low volume, low EMI, low losses and high efficiency. In this study, all equations dominating the circuit have been investigated and main and effective parameters have been identified in suggested Invertors and this method has been extended for use in n levels Invertors. Then it has investigated the changes possibility in the Invertors’ structure aiming to reduce dc voltage and to increase the number of output voltage levels. The results of simulations have emphasized the suggested structures. پرونده مقاله