@article { author = {rafiee, hanieh and fakhredanesh, mohammad}, title = {Presenting a Method for Improving Echo Hiding}, journal = {Computer and Knowledge Engineering}, volume = {2}, number = {1}, pages = {11-24}, year = {2019}, publisher = {Ferdowsi University of Mashhad}, issn = {2538-5453}, eissn = {2717-4123}, doi = {10.22067/cke.v2i1.74388}, abstract = {In this article, one of the most important methods of steganography on VoIP called echo hiding is improved. This method has advantages in maintaining the statistical and perceptual characteristics of audio signals as well as security against the sensitivity of human audio system (HAS). However, it has lots of errors in detecting coded and hidden messages, which is detectable using existing steganalysis methods. The percentage of extracting messages in these improved methods of echo hiding is high, but they lower the security of the method. In this article, a method is presented to improve the method of extracting echo hiding, and enhance its security through a combined method based on spread spectrum. To improve the extraction, a wrong hypothesis is corrected and substituted. To improve security using a pseudo-random key generation algorithm, spread spectrum and echo hiding methods are used randomly. To evaluate the proposed extraction, numerous extraction tests are carried out in the normal state and in the event of attacks. A steganalyser has also been used to assess security improvements. The results gained through different experiments on the security of steganography indicate a 3-percent increase in steganalysis errors. The proposed extraction method was modified based on the main method and resulted in more than 10% improvement.}, keywords = {steganography,Echo hiding,spread spectrum,safety,Cepstral coefficients,and self-symmetric}, url = {https://cke.um.ac.ir/article_26682.html}, eprint = {https://cke.um.ac.ir/article_26682_8030efc3e6ff90ae93c9680e994c73ba.pdf} }