{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:24:23Z","timestamp":1743081863391,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030588168"},{"type":"electronic","value":"9783030588175"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58817-5_31","type":"book-chapter","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T16:46:50Z","timestamp":1601398010000},"page":"412-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Development of an Audio Steganography System Using Discrete Cosine Transform and Spread Spectrum Techniques"],"prefix":"10.1007","author":[{"given":"Olawale Timothy","family":"Adeboje","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6665-9308","authenticated-orcid":false,"given":"Arome Junior","family":"Gabriel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5524-6804","authenticated-orcid":false,"given":"Adebayo Olusola","family":"Adetunmbi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,30]]},"reference":[{"issue":"2","key":"31_CR1","first-page":"59","volume":"25","author":"BM Kuboye","year":"2018","unstructured":"Kuboye, B.M., Gabriel, A.J., Thompson, A.F., Joseph, V.O.: Analysis of algorithms in long term evolution (LTE) network. J. Comput. Sci. Appl. 25(2), 59\u201371 (2018)","journal-title":"J. Comput. Sci. Appl."},{"issue":"33","key":"31_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5120\/cae2020652866","volume":"7","author":"O Alabi","year":"2020","unstructured":"Alabi, O., Thompson, A.F., Alese, B.K., Gabriel, A.J.: Cloud application security using hybrid encryption. Commun. Appl. Electron. 7(33), 25\u201331 (2020)","journal-title":"Commun. Appl. Electron."},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1515\/comp-2019-0018","volume":"9","author":"AJ Gabriel","year":"2019","unstructured":"Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S., Sarumi, O.A.: Post-quantum crystography system for secure electronic voting. Open Comput. Sci. 9, 292\u2013298 (2019)","journal-title":"Open Comput. Sci."},{"issue":"2","key":"31_CR4","first-page":"65","volume":"13","author":"AJ Gabriel","year":"2015","unstructured":"Gabriel, A.J., Egwuche, S.O.: Modelling the employees\u2019 activities of public service sector using production rules. Anale. Seria Informatic\u0103 13(2), 65\u201368 (2015). Vol. XIII fasc. 2 \u2013 2015 Annals. Computer Science Series, University of Timisoara, Romania","journal-title":"Anale. Seria Informatic\u0103"},{"issue":"1","key":"31_CR5","first-page":"79","volume":"8","author":"GB Iwasokun","year":"2015","unstructured":"Iwasokun, G.B., Egwuche, O.S., Gabriel, A.J.: Neural network-based health personnel monitoring system. Afr. J. Comput. ICT 8(1), 79\u201387 (2015)","journal-title":"Afr. J. Comput. ICT"},{"key":"31_CR6","unstructured":"Alese, B.K., Gabriel, A.J., Olukayode, O., Daramola, O.A.: Modelling of risk management procedures for cybercrime control systems. In: Proceedings of the World Congress on Engineering (WCE 2014), London, United Kingdom (2014). ISBN 978-988-19252-7-5"},{"issue":"4","key":"31_CR7","first-page":"427","volume":"3","author":"AH Agboola","year":"2013","unstructured":"Agboola, A.H., Gabriel, A.J., Aliyu, E.O., Alese, B.K.: Development of a fuzzy logic based rainfall prediction model. Int. J. Eng. Technol. 3(4), 427\u2013435 (2013). ISSN 2049-3444","journal-title":"Int. J. Eng. Technol."},{"issue":"2","key":"31_CR8","first-page":"53","volume":"14","author":"MN Daodu","year":"2016","unstructured":"Daodu, M.N., Gabriel, A.J., Alese, B.K., Adetunmbi, A.O.: A data encryption standard (DES) based web services security architecture. Ann. Comput. Sci. Ser. 14(2), 53\u201358 (2016)","journal-title":"Ann. Comput. Sci. Ser."},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Gabriel, A.J. Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography; a combination of post-quantum cryptography and steganography. In: The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Technically Co-Sponsored by IEEE UK\/RI Computer Chapter, London, UK, 9\u201312 December 2013, pp. 454\u2013457 (2013)","DOI":"10.1109\/ICITST.2013.6750240"},{"issue":"1","key":"31_CR10","doi-asserted-by":"publisher","first-page":"351","DOI":"10.20533\/jitst.2046.3723.2015.0044","volume":"4","author":"AJ Gabriel","year":"2015","unstructured":"Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography based security framework for cloud computing. J. Internet Technol. Secur. Trans. (JITST) 4(1), 351\u2013357 (2015)","journal-title":"J. Internet Technol. Secur. Trans. (JITST)"},{"key":"31_CR11","unstructured":"Wheeler, D. Johnson, D., Yuan, B., Lutz, P.: Audio steganography using high frequency noise introduction. Thomas Golisano College of Computing & Information Sciences Rochester Institute of Technology, Rochester, NY, RIT Scholar Works (2012). http:\/\/scholarworks.rit.edu\/other\/302. Accessed 14 Sept 2018"},{"issue":"4","key":"31_CR12","first-page":"66","volume":"2","author":"D Ghanwat","year":"2013","unstructured":"Ghanwat, D., Rajan, R.S.: Spread spectrum-based audio steganography in the transformation domain. Glob. J. Adv. Eng. Technol. 2(4), 66\u201377 (2013)","journal-title":"Glob. J. Adv. Eng. Technol."},{"issue":"26","key":"31_CR13","first-page":"79","volume":"21","author":"RF Olanrewaju","year":"2013","unstructured":"Olanrewaju, R.F., Othman-Khalifa, H.A., Suliman, R.: Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Appl. Sci. J. 21(26), 79\u201383 (2013)","journal-title":"World Appl. Sci. J."},{"key":"31_CR14","unstructured":"Kresnha, P.E., Mukaromah, A.: A robust method of encryption and steganography using ElGamal and spread spectrum technique on MP3 audio file. In: Proceeding of Conference on Application of Electromagnetic Technology, vol. 3, no. 9, pp. 11\u201315 (2014)"},{"issue":"2","key":"31_CR15","first-page":"44","volume":"2","author":"L Kumari","year":"2013","unstructured":"Kumari, L., Goyal, D., Gyan, S.: Analysis and design of three LSB techniques for secure audio steganography. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(2), 44\u201355 (2013)","journal-title":"Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET)"},{"issue":"11","key":"31_CR16","first-page":"55","volume":"3","author":"AN Pratibha","year":"2016","unstructured":"Pratibha, A.N., Belagali, P.P.: Data concealing using speech steganography. Int. Res. J. Eng. Technol. (IRJET) 3(11), 55\u201366 (2016)","journal-title":"Int. Res. J. Eng. Technol. (IRJET)"},{"issue":"8","key":"31_CR17","first-page":"55","volume":"7","author":"K Sakthisudhan","year":"2012","unstructured":"Sakthisudhan, K., Prabhu, P., Thangaraj, P.: Secure audio steganography for hiding secret information. Int. J. Comput. Appl. 7(8), 55\u201387 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"31_CR18","series-title":"AISC","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/978-81-322-0740-5_83","volume-title":"Proceedings of International Conference on Advances in Computing","author":"PP Balgurgi","year":"2013","unstructured":"Balgurgi, P.P., Jagtap, S.K.: Audio steganography used for secure data transmission. In: Aswatha Kumar, M., Selvarani, R., Suresh Kumar, T.V. (eds.) Proceedings of International Conference on Advances in Computing. AISC, vol. 174, pp. 699\u2013706. (2013). https:\/\/doi.org\/10.1007\/978-81-322-0740-5_83"},{"issue":"41","key":"31_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.5120\/ijca2020919","volume":"177","author":"OT Adeboje","year":"2020","unstructured":"Adeboje, O.T., Adetunmbi, A.O., Gabriel, A.J.: Embedding text in audio steganography system using advanced encryption standard and spread spectrum. Int. J. Comput. Appl. 177(41), 46\u201351 (2020). https:\/\/doi.org\/10.5120\/ijca2020919. (0975-8887)","journal-title":"Int. J. Comput. Appl."},{"key":"31_CR20","doi-asserted-by":"publisher","unstructured":"Snasel, V., Kromer, P., Safarik, J., Platos, J.: JPEG steganography with particle swarm optimization accelerated by AVX (2019). https:\/\/doi.org\/10.1002\/cpe.544. Wiley: https:\/\/onlinelibrary.wiley.com","DOI":"10.1002\/cpe.544"},{"key":"31_CR21","doi-asserted-by":"publisher","first-page":"11747","DOI":"10.1007\/s11042-019-08472-6","volume":"79","author":"A Chatterjee","year":"2020","unstructured":"Chatterjee, A., Ghosal, S.K., Sarkar, R.: LSB based steganography with OCR: an intelligent amalgamation. Multimed. Tools Appl. 79, 11747\u201311765 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08472-6","journal-title":"Multimed. Tools Appl."},{"key":"31_CR22","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1007\/978-3-030-30577-2_97","volume-title":"Proceedings of ICETIT 2019","author":"O Rachael","year":"2020","unstructured":"Rachael, O., Misra, S., Ahuja, R., Adewumi, A., Ayeni, F., Mmaskeliunas, R.: Image steganography and steganalysis based on least significant bit (LSB). In: Singh, P.K., Panigrahi, B.K., Suryadevara, N.K., Sharma, S.K., Singh, A.P. (eds.) Proceedings of ICETIT 2019. LNEE, vol. 605, pp. 1100\u20131111. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-30577-2_97"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58817-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T14:34:12Z","timestamp":1619188452000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58817-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030588168","9783030588175"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58817-5_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"30 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cyber chair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1450","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}