Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Mohammed Ibrahim Ahmed Alfakey"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Thumbnail Image
    Item
    الكشف عن الكانئن المخفي في ملف الصوت علي اساس خوارزمية تحويل فوريير السريعة علميا
    (جامعة النيلين, 206) Mohammed Ibrahim Ahmed Alfakey
    Abstract The main problem of the study is difficulty of recognition algorithms of art of hiding because it depends on predisposition of design and implementation using all kinds of multimedia for information hiding. The process of analysis and recognition of exchanged hidden messages from its attackers takes very long time. So it's discovering with as short time as possible and with high speed. In this research steganalysis technique is proposed on the basis of spectral domain analysis using Discrete Fourier Transform, Fast Fourier Transform Algorithm (DFT_FFTA). The aim from using this algorithm is to provide robust evidence for presence of hidden object in speech segment. The Discrete Wavelet Transform (DWT) is used to decompose the speech segment, 20 seconds in length. Speech is a type of audio wav file, An image of 160x160 pixels, type of file formats PNG (Portable Network Graphics), Types of Digital Images Grayscale. The speech is decomposed to the third level. embedded in the Data speech. Reverse Discrete Wavelet Transform (RDWT) is applied to get a speech with hidden object (image) called stego-speech. DFT_FFTA is used to analyze the stego-speech to discover an evidence of hidden object in the stego-speech. The technique has been used provide, very strong evidence that it can be successfully employed to detect hidden object in a speech signal. Because the technique utilizes the frequency components of the stego file as a base for comparison with the original file spectrum. Theoretically it is impossible the two files can be identical, this because they are represent different information. Spectrum analysis process was based on the fast Fourier algorithm in terms of sound characteristics and Determination hidden location in the stego-speech. '

DSpace software copyright © 2002-2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify