Acknowledgement
This work was funded by the University of Jeddah, Jeddah, Saudi Arabia, under grant No. (UJ-22-DR-63). The authors, therefore, acknowledge with thanks the University of Jeddah technical and financial support.
References
- Fridrich, J. & Goljan, M.(2002). Practical steganalysis of digital images: State of the art. Electronic Imaging 2002, International Society for Optics and Photonics, 1-13.
- Kim, D.-S., Lee, G.-J. & Yoo, K.-Y.(2014). A reversible data hiding scheme based on histogram shifting using edge direction predictor. Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, ACM, 126-131.
- Atoum, M. S.(2015) New MP3 Steganography Data Set. IT Convergence and Security (ICITCS), 2015 5th International Conference on, 2015b. IEEE, 1-7.
- Quackenbush, S. (2012). MPEG Audio Compression Advances. The MPEG Representation of Digital Media. Springer.
- Sterne, J. (2012). Mp3: The meaning of a format, Duke University Press.
- Sayood, K. (2012). Introduction to data compression, Newnes.
- Brandenburg, K.(1999). MP3 and AAC explained. Audio Engineering Society Conference: 17th International Conference: High-Quality Audio Coding, Audio Engineering Society.
- Sinder, D. J., Varga, I., Krishnan, V., Rajendran, V. & Villette, S. (2015). Recent speech coding technologies and standards. Speech and Audio Processing for Coding, Enhancement and Recognition. Springer.
- Supurovic, P. (1998). MPEG audio frame header. Available In Internet.
- Nilsson, M. (2000). ID3 tag version 2.4. 0-Main Structure. http//www. id3. org/id3v2.
- Salih, M. M. (2015). A New Audio Steganography Method Using Bi-LSB Embedding and Secret Message Integrity Validation. Middle East University.
- Jhaveri, N. V., Vaughan, G. B., Anderson, I. W., Gardner, J. J., & Tao, P. T. (2019). U.S. Patent Application No. 16/357,128.
- Di Angelo, M., & Salzer, G. (2019, July). Mayflies, breeders, and busy bees in Ethereum: smart contracts over time. In Proceedings of the Third ACM Workshop on Blockchains, Cryptocurrencies and Contracts (pp. 1-10).
- Castelan, Y. & Khodja, B. (2015) MP3 Steganography Techniques. Proceedings of the 4th Annual ACM Conference on Research in Information Technology, ACM, 51-54.
- Zebari, D. A., Zeebaree, D. Q., Saeed, J. N., Zebari, N. A., & Adel, A. Z. (2020). Image Steganography Based on Swarm Intelligence Algorithms: A Survey. people, 7(8), 9.
- Fridrich, J. (2009). Steganography in digital media: principles, algorithms, and applications. Cambridge University Press.
- Chhikara, S. & Singh, P. (2013b.) SBHCS: Spike based Histogram Comparison Steganalysis Technique. International Journal of Computer Applications, 75.
- Kekre, H. B., Athawale, A., Rao, B. S. & Athawale, U. (2010). Increasing the capacity of the cover audio signal by using multiple LSBs for information hiding. Emerging Trends in Engineering and Technology (ICETET), 2010 3rd International Conference on, 2010. IEEE, 196-201.
- Ozighor, E. R., & Izegbu, I. (2020). INFORMATION PROTECTION AGAINST SECURITY THREATS IN AN INSECURE ENVIRONMENT USING CRYPTOGRAPHY AND STEGANOGRAPHY. GSJ, 8(5).
- Devaraj, S., Singh, U. & Jialal, I. (2009). The evolving role of C-reactive protein in atherothrombosis. Clinical Chemistry, 55, 229-238. https://doi.org/10.1373/clinchem.2008.108886
- Shirali-Shahreza, S., Manzuri-Shalmani, M. & Shirali-Shahreza, M. H. (2007). A Skew resistant method for persian text segmentation. Computational Intelligence in Image and Signal Processing, 2007. CIISP 2007. IEEE Symposium on, 2007. IEEE, 115-120.
- Gopalan, K. & Shi, Q. (2010). Audio Steganography Using Bit Modification-A Tradeoff on Perceptibility and Data Robustness for Large Payload Audio Embedding. ICCCN, 2010.
- Fan, X., Cao, J.: A Survey of Mobile Cloud Computing. ZTE Communications 9(1), 4-8 (2011)
- Huerta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proc. of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond (2010)
- Giurgiu, I., Riva, O., Juric, D., Krivulev, I., Alonso, G.: Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications. In: Bacon, J.M., Cooper, B.F. (eds.) Middleware 2009. LNCS, vol. 5896, pp. 83-102. Springer, Heidelberg (2009)