Stega Audio ; Data within Audio (SADA) for Dr. Yanga's

Type
Thesis
Authors
Agoyaoy, Lhirie R. et al ( Agoyaoy. Lhirie R. et al )
Category
CCS
[ Browse Items ]
Abstract
Stega-Audio; Data within audio is a security application that hides a file or data into an audio file and confidential files from the unwanted users. Users can hide thier important files from their different audio.
The proposed study was chosen by the proponents to think of a way that will help the people who are using computer to secure their files because they wantto prevent illegal copying or duplication of their copyrighted materials. To develop and give the users idea on how they can protect their files. There are alot of file protections available in the net that they can download.
Users have many confidential files or documents that should be protected and prevented from damage or loss. There are some instances that there is unauthorized creature that might manipulate information, comprehend, move or unintentionally delete user's important files.
It will the computer users to protect their confidential/important files from unwanted users and hackers.
The proponets conducted some information and methods to develop and design a stega-audio: Data within audio software for the computer users for the proposed system to become succesful to the input and output of such study. There are methods that serve as instruments used in gathering information to become successful the study which were: the internet research, questionnaire,survey forms and descriptive methods
The proposed study was chosen by the proponents to think of a way that will help the people who are using computer to secure their files because they wantto prevent illegal copying or duplication of their copyrighted materials. To develop and give the users idea on how they can protect their files. There are alot of file protections available in the net that they can download.
Users have many confidential files or documents that should be protected and prevented from damage or loss. There are some instances that there is unauthorized creature that might manipulate information, comprehend, move or unintentionally delete user's important files.
It will the computer users to protect their confidential/important files from unwanted users and hackers.
The proponets conducted some information and methods to develop and design a stega-audio: Data within audio software for the computer users for the proposed system to become succesful to the input and output of such study. There are methods that serve as instruments used in gathering information to become successful the study which were: the internet research, questionnaire,survey forms and descriptive methods
Number of Copies
1
Library | Accession No | Call No | Copy No | Edition | Location | Availability |
---|---|---|---|---|---|---|
Main | 6141546 | T St817 2012 | 1 | Yes |