CFP last date
20 January 2025
Reseach Article

Translation and Retrieval of Image Information to and from Sound

by Kunal Hossain, Jyotismita Chaki, Ranjan Parekh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 21
Year of Publication: 2014
Authors: Kunal Hossain, Jyotismita Chaki, Ranjan Parekh
10.5120/17132-7761

Kunal Hossain, Jyotismita Chaki, Ranjan Parekh . Translation and Retrieval of Image Information to and from Sound. International Journal of Computer Applications. 97, 21 ( July 2014), 24-29. DOI=10.5120/17132-7761

@article{ 10.5120/17132-7761,
author = { Kunal Hossain, Jyotismita Chaki, Ranjan Parekh },
title = { Translation and Retrieval of Image Information to and from Sound },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 21 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number21/17132-7761/ },
doi = { 10.5120/17132-7761 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:24:44.052646+05:30
%A Kunal Hossain
%A Jyotismita Chaki
%A Ranjan Parekh
%T Translation and Retrieval of Image Information to and from Sound
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 21
%P 24-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid growth of both Internet and Multimedia the subject of hidden exchange of information has gained a great importance. The current work is based on translation of information of a digitized image into a sound file. Later the image file can be retrieved by authorized personnel by performing the reverse process on the sound file. The three dimensional RGB image matrix is converted into a two dimensional sound file. During the retrieving time, the reverse procedure is performed on the sound file in order to get back the original image file.

References
  1. Cachin C. , May 1998. An Information-Theoretic Model for Steganography. Proceedings of 2nd Workshop on, Information Hiding, MIT Laboratory for Computer Science.
  2. Herodotus, 1992. The Histories, chap. 5 - The fifth book entitled Terpsichore, 7 - The seventh book entitled Polymnia, J. M. Dent & Sons, Ltd.
  3. Anderson J. Ross, Petitcolas Fabien A. P. 1998. On the Limits of Steganography. IEEE Journal of Selected Areas in Communications, 16(4):474-481.
  4. Provos Niels. August 2001. Defending against statistical steganalysis. In Proceedings of the 10th USENIX Security Symposium, pp. 323-335.
  5. Raja K. B. , Chowdary C. R. , Patnaik Venugopal K R, L. M. 2005. A Secure Image Steganography using LSB, DCT, and Compression Techniques on Raw Images. In Proceedings of Third International Conference Intelligent Sensing and Information Processing. ICISIP, pp. 170-176.
  6. Amin M. M. Salleh M. , Ibrahim S. , Katmin M. R. , Shamsuddin M. Z. I. 2003. Information hiding using Steganography. In Proceedings of Fourth National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia, pp. 21-25
  7. Shirali-Shehreza Mohammad. 2007. Steganography in MMS. In Proceedings of International Multitopic Conference, pp. 1-4.
  8. Chen Mei-Ching, Agaian Sos S. , Chen C. L. Philip. 2008. Generalized Collage Steganography on Images. In Proceedings of International Conference on Systems, Man and Cybernetics, pp. 1043-1047.
  9. Marwaha Piyush, Marwaha Paresh. 2010. Visual Cryptographic Steganography in Images. In Proceedings of Second International Conference on Computing, Communication and Networking Technologies, pp. 1-6.
  10. Zheng Yongzhen, Liu Fenlin, Yang Chunfang, Luo Xiangyang, Zhao Kun. 2011. Identification of steganography software Based on Core Instructions Template Matching. In Proceedings of Third International Conference on Multimedia Information Networking and Security, pp. 494-498.
  11. Thanikaiselvan V. , Arulmozhivarman P. 2013. High Security Image Steganography Using IWT and Graph Theory. In Proceedings of International Conference on Signal and Image Processing Applications (lCSIPA), pp. 337-342.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Encoding Decoding Data Security Information Hiding Image to Sound Mapping Additive White Gaussian Noise RGB Values Correlation Degradation.