Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018


Lomov I.S.  

UDC 681.3

  • Abstract
  • List of references
  • About authors

The paper examines the main characteristics of the approaches that allow to hide information in audio files. The requirements under which the information will not be detected are shown.

1. Klenyaeva G.V., Preobrazhensky A.P. Contemporary issues speech acoustics and building automatic systems speech recognition / Bulletin of the Voronezh Institute of High technology. 2007. No. 2-1. S. 71-74.

2. Golovinov S.O., Mironchenko S.G., Schepilov E.V., Preobrazhensky A.P. Digital signal processing / Bulletin of Voronezh Institute of High Technologies. 2009. No. 4. P. 64-65.

3. Kaydakova K.V. Problems of information security in modern electronic documents / Successes in modern science. 2012. No.6. p. 107-108.

4. Oleinik D.Yu. Some issues of using information technologies in the tourism industry / Successes of the modern natural sciences. 2012. No.6. p.110.

5. Zemlyanukhina N.S. On the application of information technology in Management / Successes of modern natural sciences. 2012. No.6. p. 106-107.

6. Beketnova Yu.M., Lvovich I.Ya. The solution to the problem of early detection risks of violation of financial and information security legal entity in terms of the theory of pattern recognition // Information and security. 2013.V. 16. No. 2. P. 191-194.

7. Ermilov E.V., Popov E.A., Zhukov M.M., Choporov O.N. Risk analysis distributed systems based on their risk parameters components // Information and security. 2013.V. 16. No. 1. P. 123- 126.

8. Zhukov M.M., Ermilov E.V., Choporov O.N., Baburin A.V. Building dynamic risk models for distributed system components based on a given law of distribution of damage // Information and safety. 2012.Vol. 15. No. 4. P. 449-460.

Lomov Ivan Sergeevich

Email: tregubenko.aleshka@yandex.ru

Company «Proektinzhiniring»

Voronezh, Russian Federation

Keywords: information security, audio files, workflow, masking signal

For citation: Lomov I.S. THE ANALYSIS OF POSSIBILITIES OF HIDING INFORMATION IN AUDIOFILES. Modeling, Optimization and Information Technology. 2013;1(2). Available from: https://moit.vivt.ru/wp-content/uploads/2013/08/lomov_2_13_1.pdf DOI: (In Russ).


Full text in PDF