I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
pu
t
er
E
ng
ineering
(
I
J
E
CE
)
Vo
l.
15
,
No
.
2
,
A
p
r
il
20
25
,
p
p
.
2
2
3
7
~
2
2
5
3
I
SS
N:
2088
-
8
7
0
8
,
DOI
: 1
0
.
1
1
5
9
1
/ijece.
v
15
i
2
.
pp
2
2
3
7
-
2
2
5
3
2237
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m
An
a
da
ptive a
udi
o
wav
e stega
no
g
ra
phy
using
simula
ted
a
nnea
ling
alg
o
rithm
At
ef
Ahm
ed
O
beida
t
,
M
o
ha
m
m
ed
J
a
zi
B
a
wa
neh,
Sa
wsa
n Y
o
us
ef
Abu
S
hq
a
ir
,
H
a
m
di A.
Al
-
O
m
a
ri,
E
m
a
d
F
a
wzi
Als
ha
la
bi
I
n
f
o
r
mat
i
o
n
T
e
c
h
n
o
l
o
g
y
D
e
p
a
r
t
me
n
t
,
A
l
-
H
u
so
n
U
n
i
v
e
r
s
i
t
y
C
o
l
l
e
g
e
,
A
l
-
B
a
l
q
a
A
p
p
l
i
e
d
U
n
i
v
e
r
si
t
y
,
A
l
-
H
u
so
n
,
J
o
r
d
a
n
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
l 3
,
2
0
2
4
R
ev
is
ed
Dec
5
,
2
0
2
4
Acc
ep
ted
Dec
1
4
,
2
0
2
4
Th
e
sc
ien
c
e
o
f
in
fo
rm
a
ti
o
n
se
c
u
rit
y
h
a
s in
c
re
a
se
d
in
imp
o
rta
n
c
e
to
e
n
c
o
u
n
ter
th
e
e
sp
i
o
n
a
g
e
a
n
d
i
n
fo
rm
a
ti
o
n
th
e
ft.
T
h
is
re
se
a
rc
h
p
ro
p
o
se
s
a
n
e
w
ste
g
a
n
o
g
ra
p
h
y
fra
m
e
wo
rk
t
h
a
t
u
ti
li
z
e
s
sim
u
late
d
a
n
n
e
a
li
n
g
(S
A)
a
s
a
n
a
rti
ficia
l
in
telli
g
e
n
c
e
a
lg
o
rit
h
m
to
su
p
p
o
rt
t
h
e
p
ro
c
e
ss
o
f
h
i
d
in
g
a
b
in
a
ry
se
c
re
t
m
e
ss
a
g
e
fil
e
with
i
n
a
n
a
u
d
io
wa
v
e
f
il
e
.
T
h
e
b
e
st
p
a
t
h
f
o
r
e
m
b
e
d
d
i
n
g
th
e
se
c
re
t
d
a
ta
in
si
d
e
t
h
e
a
u
d
io
f
il
e
is
d
e
term
in
e
d
th
r
o
u
g
h
S
A
th
a
t
se
a
rc
h
e
s
fo
r
th
e
p
re
fe
rre
d
p
a
t
h
a
c
c
o
rd
i
n
g
to
t
h
e
c
o
n
ten
t
o
f
t
h
e
h
o
st
a
u
d
i
o
fil
e
a
nd
se
c
re
t
m
e
ss
a
g
e
to
b
e
h
i
d
d
e
n
.
Th
e
lea
st
sig
n
ifi
c
a
n
t
b
i
t
(L
S
B)
tec
h
n
iq
u
e
wa
s
e
m
p
lo
y
e
d
t
o
h
i
d
e
m
e
ss
a
g
e
b
y
tes
,
in
wh
ich
e
a
c
h
a
u
d
i
o
-
c
h
o
se
n
b
y
te
will
h
o
l
d
o
n
e
b
it
fr
o
m
a
se
c
re
t
m
e
ss
a
g
e
b
y
te.
Th
e
h
id
i
n
g
p
r
o
c
e
ss
c
o
n
stru
c
ts
th
e
ste
g
o
a
u
d
io
fil
e
a
n
d
e
x
trac
ti
o
n
k
e
y
th
a
t
will
b
e
re
q
u
ired
i
n
a
n
e
x
trac
ti
o
n
p
r
o
c
e
ss
.
Th
e
a
u
th
o
rize
d
u
se
r
re
q
u
ires
a
n
e
x
trac
ti
o
n
k
e
y
a
n
d
a
d
e
c
ry
p
ti
o
n
k
e
y
t
o
re
tri
e
v
e
th
e
h
id
d
e
n
m
e
ss
a
g
e
.
On
th
e
o
t
h
e
r
h
a
n
d
,
th
e
a
tt
a
c
k
e
r
re
q
u
ires
k
n
o
wle
d
g
e
o
f
th
e
a
fo
re
m
e
n
ti
o
n
e
d
k
e
y
s
a
n
d
wo
r
k
in
g
a
lg
o
rit
h
m
s
th
a
t
we
re
e
m
p
lo
y
e
d
i
n
th
e
h
id
d
e
n
p
r
o
c
e
ss
.
Ro
b
u
stn
e
ss
a
g
a
in
st
d
a
ta
e
x
trac
ti
o
n
,
d
e
tec
ti
o
n
,
imp
e
rc
e
p
ti
b
i
li
ty
(p
h
o
n
o
lo
g
ica
l
h
e
a
rin
g
),
se
c
u
rit
y
,
p
e
a
k
sig
n
a
l
t
o
n
o
ise
ra
ti
o
(P
S
NR),
m
e
a
n
sq
u
a
re
e
rro
r
(M
S
E)
a
n
d
c
a
p
a
c
it
y
a
s
se
c
u
rit
y
p
e
rfo
rm
a
n
c
e
m
e
a
su
re
s
w
e
re
u
se
d
to
e
v
a
lu
a
te
th
e
sy
ste
m
.
T
h
e
m
a
x
imu
m
siz
e
o
f
t
h
e
d
a
ta
t
o
b
e
h
id
d
e
n
m
a
y
re
a
c
h
1
2
.
5
%
o
f
t
h
e
d
a
ta
siz
e
o
f
th
e
h
o
st
a
u
d
i
o
fil
e
,
in
wh
ic
h
t
h
e
a
v
e
ra
g
e
v
a
lu
e
o
f
M
S
E
a
n
d
P
S
NR
a
re
(0
.
0
0
4
1
,
7
4
.
7
3
),
re
sp
e
c
ti
v
e
ly
.
K
ey
w
o
r
d
s
:
Au
d
io
wav
e
E
n
cr
y
p
tio
n
L
ea
s
t sig
n
if
ican
t b
it
Secu
r
ity
Simu
lated
a
n
n
ea
lin
g
Steg
an
o
g
r
ap
h
y
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Mo
h
am
m
ed
J
az
i
B
awa
n
eh
I
n
f
o
r
m
atio
n
T
ec
h
n
o
lo
g
y
Dep
a
r
tm
en
t,
Al
-
B
alq
a
Ap
p
lied
Un
i
v
er
s
ity
,
Al
-
Hu
s
o
n
Un
iv
e
r
s
ity
C
o
lleg
e
Al
-
Hu
s
o
n
,
2
1
5
1
0
,
J
o
r
d
an
E
m
ail:
d
r
_
m
jab
@
b
au
.
ed
u
.
j
o
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
in
ter
n
et
is
co
n
s
id
er
ed
a
s
h
ar
ed
c
h
an
n
el
to
tr
an
s
m
it
an
d
r
ec
eiv
e
d
ata
b
etwe
en
d
if
f
er
e
n
t
p
ar
ties
,
wh
er
e
d
ata
ac
r
o
s
s
th
is
n
etw
o
r
k
is
o
f
ten
v
io
lated
an
d
att
ac
k
ed
.
Mu
ch
o
f
th
e
d
ata
th
a
t
we
d
ea
l
with
an
d
ex
ch
an
g
e
th
r
o
u
g
h
t
h
e
in
ter
n
e
t
n
ee
d
s
s
o
m
e
k
i
n
d
o
f
p
r
iv
ac
y
an
d
s
ec
u
r
ity
,
esp
ec
ially
th
e
s
en
s
itiv
e
o
n
es.
T
o
ad
d
r
ess
an
d
r
ed
u
ce
d
ata
v
io
la
tio
n
p
r
o
b
lem
s
,
attac
k
s
,
d
ep
r
iv
atio
n
s
,
d
ata
b
lo
ck
in
g
,
d
en
ial
o
f
s
er
v
ices,
an
d
an
y
o
th
er
p
r
o
b
le
m
s
r
elate
d
t
o
cy
b
er
s
p
ac
e
s
ec
u
r
ity
s
ev
er
al
m
eth
o
d
s
an
d
tech
n
o
lo
g
ies
h
a
v
e
b
e
en
in
v
e
n
ted
s
u
c
h
as
cr
y
p
to
g
r
ap
h
y
,
s
teg
an
o
g
r
ap
h
y
,
an
d
wate
r
m
ar
k
in
g
.
T
h
ey
a
r
e
co
n
s
id
er
ed
th
e
m
o
s
t
co
m
m
o
n
an
d
im
p
o
r
tan
t
tech
n
iq
u
es
u
s
ed
in
cy
b
er
s
ec
u
r
ity
to
m
ain
tain
d
ata
an
d
in
f
o
r
m
atio
n
s
ec
u
r
ity
,
as
th
ey
all
s
ee
k
to
ac
h
iev
e
th
e
s
am
e
g
o
al
b
u
t
b
y
p
r
o
ce
s
s
in
g
d
ata
in
d
if
f
er
e
n
t w
ay
s
.
C
r
y
p
to
g
r
ap
h
y
is
th
e
p
r
o
ce
s
s
o
f
co
n
v
er
tin
g
d
ata
in
to
a
v
is
ib
le
f
o
r
m
th
at
ca
n
b
e
r
ea
d
o
n
ly
b
y
au
th
en
ticated
u
s
er
wh
o
h
as
th
e
r
ec
o
n
v
er
tin
g
k
ey
.
C
r
y
p
to
g
r
ap
h
y
m
eth
o
d
d
ep
e
n
d
s
o
n
a
s
in
g
le
k
ey
s
h
ar
e
d
b
etwe
en
th
e
s
en
d
e
r
an
d
th
e
r
ec
eiv
er
,
ca
lled
t
h
e
p
u
b
lic
k
e
y
,
o
r
it
ca
n
d
ep
en
d
o
n
m
o
r
e
th
an
o
n
e
k
ey
,
s
o
th
at
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
2
,
Ap
r
il
20
25
:
2
2
3
7
-
2
2
5
3
2238
th
er
e
is
a
p
r
iv
ate
k
ey
f
o
r
ea
c
h
o
f
th
e
s
en
d
er
an
d
th
e
r
ec
eiv
e
r
in
ad
d
itio
n
to
a
p
u
b
lic
k
ey
s
h
a
r
ed
b
etwe
e
n
th
em
.
Me
th
o
d
s
o
f
cr
y
p
to
g
r
a
p
h
y
r
an
g
e
f
r
o
m
th
e
s
im
p
le,
wh
ich
r
eq
u
ir
e
a
litt
le
p
er
io
d
b
ef
o
r
e
th
e
attac
k
er
ca
n
d
ec
r
y
p
t
d
ata,
to
th
e
co
m
p
le
x
,
wh
ic
h
d
ep
en
d
o
n
m
o
r
e
th
a
n
o
n
e
k
ey
an
d
m
at
h
em
atica
l
ca
lcu
latio
n
s
,
wh
ich
m
ak
es
t
h
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
r
eq
u
ir
e
a
lo
n
g
p
er
io
d
.
I
n
all
ca
s
es,
th
e
at
tack
er
ca
n
s
ee
th
e
d
ata,
b
u
t
in
an
en
cr
y
p
ted
f
o
r
m
th
at
ca
n
n
o
t
b
e
r
ea
d
u
n
til
it
is
d
ec
r
y
p
ted
.
T
h
er
ef
o
r
e,
th
e
e
n
cr
y
p
tio
n
p
r
o
ce
s
s
g
iv
es
th
e
attac
k
er
th
e
im
p
r
ess
io
n
th
at
th
er
e
is
co
m
m
u
n
icatio
n
b
etwe
en
th
e
s
en
d
er
an
d
th
e
r
ec
eiv
er
,
g
iv
i
n
g
h
im
th
e
o
p
p
o
r
tu
n
ity
to
tr
y
to
ac
ce
s
s
th
e
d
ata
[
1
]
.
Dig
ital
wate
r
m
ar
k
in
g
in
s
er
ts
v
is
ib
le
o
r
co
v
e
r
t
co
d
e
o
r
im
a
g
es
in
s
id
e
m
u
ltime
d
ia
f
iles
in
an
aim
to
k
ee
p
th
e
o
f
co
p
y
r
ig
h
t
f
o
r
d
ata.
T
h
e
attac
k
er
o
r
th
ief
ca
n
s
ee
th
e
wate
r
m
ar
k
with
in
t
h
e
d
ata
an
d
ca
n
s
o
m
etim
es
g
et
r
id
o
f
it
b
y
ad
d
in
g
s
o
m
e
d
ata
th
at
wo
r
k
s
to
h
id
e
it,
esp
ec
ially
if
th
is
m
ar
k
is
in
a
n
eu
tr
al
o
r
p
er
ip
h
er
al
ar
ea
an
d
d
o
es
n
o
t
in
ter
f
e
r
e
with
t
h
e
d
ata.
T
h
er
ef
o
r
e,
t
h
e
o
w
n
er
o
f
th
e
r
ig
h
t
o
f
te
n
wo
r
k
s
to
e
n
ter
m
o
r
e
th
a
n
o
n
e
wate
r
m
ar
k
an
d
s
o
m
etim
es
m
ak
es
s
o
m
e
o
f
th
em
in
ter
f
er
e
with
th
e
o
r
ig
in
al
d
ata
f
o
r
th
e
p
u
r
p
o
s
e
o
f
p
r
o
tectio
n
[
2
]
.
Steg
an
o
g
r
ap
h
y
is
co
n
s
id
er
e
d
an
o
ld
an
d
n
ew
tech
n
o
lo
g
y
f
o
r
tr
an
s
m
itti
n
g
in
v
is
ib
le
m
ess
ag
es.
I
n
th
e
p
ast,
wax
,
wo
o
d
,
an
im
al
s
k
i
n
s
,
an
d
s
lav
e
h
ea
d
s
wer
e
u
s
e
d
to
h
id
e
in
f
o
r
m
atio
n
in
a
s
e
cr
et
way
an
d
th
en
tr
an
s
f
er
th
em
to
d
if
f
er
en
t
g
e
o
g
r
ap
h
ical
ar
ea
s
[
1
]
–
[
3
]
.
T
h
ese
d
ay
s
,
in
th
e
d
ig
ital
wo
r
ld
th
at
co
n
tain
s
d
if
f
er
en
t
ty
p
es
o
f
d
ata
f
iles
,
s
u
ch
as
im
ag
es,
au
d
io
,
v
id
e
o
,
an
d
tex
t,
t
h
e
p
r
o
ce
s
s
h
as
s
h
if
ted
f
r
o
m
u
s
in
g
h
ar
d
m
ed
ia
to
s
o
f
t
o
n
es
wh
er
e
an
y
ty
p
e
o
f
f
ile
ca
n
b
e
u
s
ed
as
a
h
o
s
t
f
o
r
s
ec
r
et
m
ess
ag
es.
T
h
e
p
r
o
ce
s
s
o
f
h
id
in
g
m
ess
ag
es
ca
n
b
e
class
if
ied
in
d
if
f
er
en
t
way
s
d
ep
en
d
in
g
o
n
h
o
s
t
f
ile
ty
p
e
o
r
h
i
d
in
g
m
eth
o
d
.
I
f
we
lo
o
k
at
th
e
h
o
s
t
o
f
d
ata,
it
ca
n
b
e
class
if
ied
in
to
tex
t,
im
ag
e,
a
u
d
io
,
v
id
eo
,
o
r
I
P
s
teg
an
o
g
r
ap
h
y
,
w
h
ile
m
eth
o
d
s
u
s
ed
f
o
r
h
i
d
in
g
co
u
ld
b
e
in
jectio
n
,
r
e
p
lace
m
en
t,
d
is
to
r
tio
n
,
o
r
g
en
e
r
atio
n
[
4
]
–
[
6
]
.
T
h
e
m
ain
p
r
o
b
lem
in
t
h
e
I
n
te
r
n
et
is
h
o
w
to
tr
an
s
f
er
a
n
d
ex
c
h
an
g
e
d
ata
s
ec
u
r
ely
b
etwe
en
t
h
e
s
en
d
er
an
d
th
e
r
ec
eiv
er
.
Data
ca
n
b
e
tr
an
s
f
er
r
ed
in
a
v
is
ib
le
b
u
t
e
n
cr
y
p
ted
f
o
r
m
(
cr
y
p
to
g
r
ap
h
y
)
,
in
a
h
i
d
d
en
f
o
r
m
(
s
teg
an
o
g
r
a
p
h
y
)
,
o
r
i
n
a
h
id
d
e
n
an
d
en
c
r
y
p
te
d
f
o
r
m
(
s
teg
an
o
g
r
ap
h
y
an
d
c
r
y
p
to
g
r
ap
h
y
)
.
T
h
is
r
esear
ch
f
o
cu
s
e
d
o
n
th
e
th
ir
d
f
o
r
m
,
wh
ich
is
a
c
o
m
b
in
atio
n
o
f
s
teg
an
o
g
r
ap
h
y
an
d
cr
y
p
to
g
r
a
p
h
y
with
th
e
aim
o
f
p
ar
ticip
atin
g
in
p
r
o
v
id
i
n
g
a
s
o
lu
tio
n
f
o
r
s
ec
u
r
e
co
m
m
u
n
icatio
n
.
T
h
is
p
ap
er
p
r
o
p
o
s
es
a
r
eliab
le
an
d
s
ec
u
r
e
f
r
am
ewo
r
k
th
at
co
m
b
in
es
ar
tific
ial
i
n
tellig
en
ce
,
cr
y
p
to
g
r
ap
h
y
,
an
d
s
teg
an
o
g
r
a
p
h
y
f
o
r
em
b
ed
d
in
g
s
ec
r
et
m
e
s
s
ag
es
with
in
a
wav
e
au
d
io
f
i
le.
T
h
e
f
r
am
ewo
r
k
u
s
es
th
e
s
im
u
lated
an
n
ea
lin
g
(
SA)
alg
o
r
ith
m
,
wh
ich
is
an
o
p
tim
izatio
n
s
ea
r
ch
alg
o
r
ith
m
t
h
at
is
u
s
ed
to
f
in
d
th
e
s
o
lu
tio
n
to
lin
ea
r
an
d
n
o
n
-
lin
ea
r
p
r
o
b
lem
s
[
7
]
.
I
t
d
ep
en
d
s
o
n
co
o
lin
g
,
h
ea
tin
g
,
m
allea
b
ilit
y
,
an
d
p
r
o
ce
s
s
in
g
m
etals,
esp
ec
ially
ir
o
n
.
T
h
e
d
u
ctility
o
f
m
et
al
is
h
ig
h
an
d
ca
n
b
e
ea
s
ily
f
o
r
m
ed
at
h
ig
h
tem
p
er
atu
r
es,
wh
ile
th
e
o
p
p
o
s
ite
is
tr
u
e
at
lo
w
tem
p
er
atu
r
es.
I
n
th
e
in
itial
s
tate
a
t
h
ig
h
tem
p
er
atu
r
e
(
wo
r
s
t
ca
s
e)
,
th
e
SA m
eth
o
d
wo
r
k
s
o
n
ch
o
o
s
in
g
a
r
a
n
d
o
m
s
o
lu
tio
n
o
r
p
ath
an
d
co
n
s
id
er
in
g
it a
s
th
e
b
est s
o
lu
tio
n
an
d
th
en
wo
r
k
s
to
r
ed
u
ce
tem
p
e
r
atu
r
e
a
n
d
r
ep
lace
th
e
c
u
r
r
e
n
t
s
o
lu
tio
n
if
a
b
etter
o
n
e
o
cc
u
r
s
.
T
h
e
p
r
o
ce
s
s
co
n
tin
u
es
with
c
o
o
lin
g
,
co
m
p
ar
is
o
n
,
an
d
s
elec
tio
n
u
n
til
th
e
b
est
s
o
lu
tio
n
is
r
ea
c
h
ed
at
m
i
n
im
u
m
tem
p
er
atu
r
e
(
b
est
ca
s
e)
,
wh
er
e
th
e
co
m
p
ar
is
o
n
p
r
o
ce
s
s
b
etwe
en
s
o
lu
t
io
n
s
is
m
an
ag
ed
th
r
o
u
g
h
a
s
p
ec
if
ic
co
n
ju
n
ctio
n
ca
lled
a
f
itn
ess
f
u
n
ctio
n
.
T
h
e
SA
alg
o
r
ith
m
s
ea
r
ch
es
th
e
b
y
tes
o
f
th
e
h
o
s
t
au
d
i
o
f
ile
i
n
o
r
d
e
r
to
f
in
d
th
e
s
u
itab
le
p
lace
s
f
o
r
th
e
e
m
b
ed
d
in
g
p
r
o
ce
s
s
.
T
h
e
p
ath
o
f
least
s
ig
n
if
ican
t
ch
an
g
e
to
co
n
ten
t
will
b
e
s
elec
ted
f
o
r
s
to
r
in
g
th
e
en
cr
y
p
ted
s
ec
r
et
m
ess
ag
e
b
its
b
y
u
s
in
g
th
e
l
ea
s
t
s
ig
n
if
ican
t
b
it
(
L
SB
)
m
eth
o
d
.
L
SB
as
an
em
b
ed
d
in
g
m
et
h
o
d
wo
r
k
s
b
y
r
ep
lacin
g
t
h
e
last
b
it
o
n
th
e
r
ig
h
t
s
id
e,
as
it
h
as
th
e
least
ef
f
ec
t
o
n
th
e
v
alu
e
o
f
th
e
b
y
te
th
at
is
u
s
ed
t
o
h
id
e
p
ar
t
o
f
th
e
s
ec
r
et
m
ess
ag
e
.
Me
s
s
ag
e
b
y
tes
ar
e
en
cr
y
p
ted
b
y
u
s
in
g
a
r
ep
lace
m
en
t
alg
o
r
ith
m
,
wh
ich
b
ases
o
n
p
r
ed
ef
in
ed
co
m
m
o
n
tab
le
b
etw
ee
n
s
en
d
er
an
d
r
ec
eiv
er
.
I
t
wo
r
k
s
in
a
m
an
n
er
s
im
ilar
to
C
ae
s
ar
alg
o
r
ith
m
s
th
at
u
s
es
s
h
if
tin
g
an
d
r
ep
lace
m
en
t
p
r
o
ce
s
s
f
o
r
d
ata
en
cr
y
p
t
io
n
an
d
d
ec
r
y
p
tio
n
[
4
]
,
[
5
]
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
tem
ca
n
h
an
d
le
an
y
ty
p
e
o
f
s
ec
r
et
m
ess
ag
es
b
ec
au
s
e
th
e
m
ess
ag
e
d
ata
i
s
r
ea
d
an
d
p
r
o
ce
s
s
ed
as
b
in
ar
y
d
ata;
th
er
ef
o
r
e,
th
e
s
ec
r
et
m
ess
ag
e
ca
n
b
e
tex
t,
im
ag
e,
s
o
u
n
d
,
o
r
an
y
o
th
er
ty
p
e
o
f
d
ata.
Hid
d
en
an
d
ex
tr
ac
tio
n
p
r
o
ce
s
s
es
r
eq
u
ir
e
a
s
et
o
f
p
r
e
d
ef
in
ed
in
p
u
ts
to
ac
co
m
p
lis
h
th
eir
task
s
.
Secr
et
m
ess
ag
e
f
ile,
h
o
s
t
wav
e
f
ile,
en
cr
y
p
tio
n
k
ey
an
d
SA
p
ar
am
eter
s
ar
e
th
e
m
ain
r
eq
u
ir
em
e
n
ts
f
o
r
h
id
d
en
p
r
o
ce
s
s
.
On
th
e
o
th
er
h
an
d
,
ex
tr
ac
tio
n
p
r
o
ce
s
s
n
ee
d
s
f
o
r
s
teg
o
wav
e
f
ile,
ex
tr
ac
tio
n
k
ey
,
d
ec
r
y
p
tio
n
k
e
y
,
an
d
SA
p
ar
am
eter
s
as in
p
u
ts
.
2.
RE
L
AT
E
D
WO
RK
S
Ma
n
y
s
tu
d
ies
h
av
e
b
ee
n
p
u
b
lis
h
ed
in
th
e
f
ield
o
f
s
teg
an
o
g
r
ap
h
y
,
wh
eth
er
im
ag
es,
au
d
io
,
v
id
eo
o
r
tex
ts
.
Pre
v
io
u
s
s
tu
d
ies
h
av
e
in
clu
d
ed
wo
r
k
in
g
o
n
th
e
t
o
p
i
c
o
f
s
teg
an
o
g
r
ap
h
y
s
ep
ar
atel
y
o
r
in
teg
r
atin
g
th
e
to
p
ic
o
f
s
teg
an
o
g
r
a
p
h
y
with
cr
y
p
to
g
r
a
p
h
y
o
r
in
teg
r
atin
g
th
e
to
p
ics
o
f
m
ac
h
in
e
lear
n
in
g
an
d
ar
tific
ial
in
tellig
en
ce
f
o
r
im
p
r
o
v
e
m
en
t
an
d
ac
ce
ler
atio
n
.
Sev
e
r
al
r
esear
ch
es
h
av
e
b
ee
n
r
ev
iewe
d
,
w
h
eth
er
s
im
ilar
to
u
s
o
r
d
if
f
er
en
t
i
n
ter
m
s
o
f
th
e
m
ec
h
an
is
m
o
f
wo
r
k
an
d
h
o
s
t
f
iles
o
f
v
a
r
io
u
s
ty
p
es.
B
elo
w,
a
g
r
o
u
p
o
f
th
ese
s
tu
d
ies will b
e
r
ev
iewe
d
,
wh
ic
h
f
o
cu
s
s
p
ec
if
ically
o
n
th
e
t
o
p
ic
o
f
au
d
i
o
s
teg
an
o
g
r
ap
h
y
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
n
a
d
a
p
tive
a
u
d
io
w
a
ve
s
teg
a
n
o
g
r
a
p
h
y
u
s
in
g
s
imu
la
ted
a
n
n
ea
lin
g
a
lg
o
r
ith
m
(
A
tef
A
.
Ob
ei
d
a
t
)
2239
B
awa
n
eh
[
7
]
p
r
o
p
o
s
ed
a
s
teg
a
n
o
g
r
a
p
h
y
f
r
a
m
ewo
r
k
th
at
u
s
es
th
e
SA
alg
o
r
ith
m
a
n
d
lin
ea
r
co
n
g
r
u
en
t
g
en
er
ato
r
(
L
C
G)
to
f
in
d
th
e
b
est
f
o
r
em
b
ed
d
in
g
a
b
in
ar
y
m
ess
ag
e
in
s
id
e
a
h
o
s
t
im
ag
e
.
T
h
e
s
y
s
tem
wo
r
k
s
to
f
in
d
th
e
p
ath
th
at
is
least
af
f
ec
ted
b
y
th
e
m
o
d
if
icatio
n
s
th
at
o
cc
u
r
as
a
r
esu
lt
o
f
em
b
e
d
d
in
g
th
e
s
ec
r
et
m
ess
ag
e
in
s
id
e
th
e
im
ag
e,
wh
er
e
it
wo
r
k
s
to
u
s
e
th
e
SA
alg
o
r
ith
m
to
f
in
d
th
is
p
ath
an
d
th
e
n
em
b
ed
d
in
g
u
s
in
g
th
e
L
SB
alg
o
r
ith
m
.
As
s
h
o
wn
i
n
th
e
r
esu
lts
,
th
e
s
y
s
tem
was
r
o
b
u
s
t
ag
ain
s
t
in
tr
u
d
er
s
b
ec
au
s
e
th
e
d
ec
o
d
in
g
p
r
o
ce
s
s
r
eq
u
ir
es k
n
o
wled
g
e
a
b
o
u
t e
x
tr
ac
tio
n
k
ey
s
an
d
u
s
ed
alg
o
r
ith
m
s
.
Ma
n
ju
n
ath
et
a
l.
[
8
]
p
r
o
p
o
s
ed
a
n
ew
m
eth
o
d
f
o
r
h
id
i
n
g
a
u
d
io
i
n
f
o
r
m
atio
n
u
s
in
g
d
is
cr
ete
wav
es,
wh
ich
wo
r
k
s
to
d
eter
m
in
e
th
e
ap
p
r
o
p
r
iate
lo
ca
tio
n
s
to
h
id
e
d
ata
af
ter
en
c
r
y
p
tin
g
it
to
b
e
m
o
r
e
s
ec
u
r
e
a
n
d
r
ed
u
ce
t
h
e
u
s
ed
s
to
r
ag
e
s
p
ac
e
.
T
h
e
f
ea
s
ib
ilit
y
o
f
t
h
e
p
r
o
p
o
s
ed
m
o
d
el
was
m
ea
s
u
r
ed
th
r
o
u
g
h
a
s
et
o
f
m
etr
ics,
s
u
ch
as
p
ea
k
s
ig
n
al
to
n
o
is
e
r
atio
(
PS
NR
)
an
d
m
ea
n
s
q
u
ar
e
er
r
o
r
(
MSE
)
.
Acc
o
r
d
in
g
to
th
e
ev
alu
atio
n
m
ea
s
u
r
es
u
s
ed
,
t
h
e
p
r
o
p
o
s
ed
s
y
s
tem
h
as
g
o
o
d
r
esu
lts
in
te
r
m
s
o
f
p
er
f
o
r
m
a
n
ce
a
n
d
f
ea
s
ib
ilit
y
co
m
p
a
r
ed
to
o
th
er
m
eth
o
d
s
.
Nasr
et
a
l.
[
9
]
p
r
o
p
o
s
ed
an
in
n
o
v
ativ
e
m
eth
o
d
f
o
r
h
id
in
g
in
f
o
r
m
atio
n
in
a
u
d
io
f
iles
,
wh
ich
f
ilter
s
s
o
u
n
d
wa
v
es
b
ef
o
r
e
i
n
clu
d
in
g
th
e
m
ess
ag
e
i
n
th
e
m
an
d
u
s
es
W
ien
er
f
ilter
in
g
to
r
ed
u
ce
n
o
is
e
o
n
th
e
au
d
io
s
ig
n
al.
T
h
e
s
ec
r
et
m
ess
ag
e
w
as
f
ilter
ed
an
d
co
n
v
er
ted
it
in
to
a
f
o
r
m
th
at
s
u
its
th
e
m
ed
iu
m
u
s
ed
.
Feasib
ilit
y
an
d
ef
f
ec
tiv
en
ess
o
f
th
e
p
r
o
p
o
s
ed
m
eth
o
d
wer
e
m
ea
s
u
r
ed
th
r
o
u
g
h
MSE
an
d
an
o
th
er
g
r
o
u
p
o
f
b
e
n
ch
m
ar
k
s
.
Af
ter
co
m
p
ar
in
g
r
esu
lts
with
p
r
ev
io
u
s
m
eth
o
d
s
,
it
was
r
ev
e
aled
th
at
th
e
p
r
o
p
o
s
ed
tech
n
i
q
u
e
was
s
u
cc
ess
f
u
l
in
h
id
in
g
d
ata.
Mo
h
am
m
ed
[
1
0
]
p
r
esen
ted
a
n
ew
m
eth
o
d
f
o
r
h
i
d
in
g
d
ata
b
ased
o
n
h
id
in
g
th
e
tex
t
in
s
id
e
an
im
ag
e
an
d
th
en
h
id
in
g
it
in
th
e
au
d
io
f
ile.
T
h
e
au
th
o
r
wo
r
k
e
d
o
n
e
n
cr
y
p
tin
g
tex
t
b
y
tak
in
g
th
e
r
ev
er
s
e
co
d
e
o
f
ea
ch
letter
an
d
th
en
r
ep
lacin
g
ea
ch
b
it
f
r
o
m
th
e
r
i
g
h
t
s
id
e
o
f
th
e
t
ex
t,
an
d
f
in
ally
e
m
b
ed
d
in
g
th
e
tex
t
in
an
im
ag
e.
T
h
e
im
ag
e
was
u
s
ed
as
a
tex
t
h
o
s
t
an
d
th
e
au
d
i
o
f
ile
as
an
i
m
ag
e
h
o
s
t,
wh
er
e
th
is
wo
r
k
is
ch
ar
ac
ter
ize
d
u
s
in
g
two
s
tag
es
o
f
m
ask
in
g
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
tem
was
r
o
b
u
s
t
ag
a
in
s
t
d
ata
ex
t
r
ac
tio
n
d
u
e
to
m
u
l
ti
s
tag
es
o
f
h
id
in
g
,
b
u
t slo
w
in
th
e
p
r
o
ce
s
s
o
f
h
i
d
in
g
as sh
o
wn
in
t
h
e
r
esu
lts
.
W
u
et
a
l.
[
1
1
]
p
r
o
p
o
s
ed
a
n
ew
s
teg
an
o
g
r
ap
h
y
m
eth
o
d
f
o
r
au
d
io
b
ased
o
n
th
e
id
ea
o
f
n
eg
ativ
e
ass
au
lts
,
wh
ich
f
ir
s
tly
u
s
es
a
n
eu
r
al
n
etwo
r
k
to
tr
ain
t
h
e
p
r
o
p
o
s
ed
s
y
s
tem
an
d
s
ec
o
n
d
ly
co
n
s
tr
u
cts
s
teg
o
au
d
i
o
f
iles
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
tem
m
er
g
ed
ar
tific
ial
in
tellig
en
ce
(
n
eu
r
al
n
etwo
r
k
)
with
s
teg
an
o
g
r
ap
h
y
in
o
r
d
e
r
to
p
r
o
d
u
ce
r
o
b
u
s
t
an
d
h
ig
h
-
p
er
f
o
r
m
an
ce
s
y
s
tem
.
T
h
e
r
esu
lts
s
h
o
wed
th
at
th
e
p
r
o
p
o
s
ed
s
y
s
tem
g
av
e
g
o
o
d
r
esu
lts
co
m
p
ar
ed
to
o
th
e
r
s
y
s
tem
s
,
as q
u
ality
an
d
s
af
ety
m
ea
s
u
r
es w
er
e
u
s
ed
to
e
x
am
in
e
th
e
s
y
s
te
m
.
J
ian
g
et
a
l.
[
1
2
]
p
r
o
p
o
s
ed
an
au
d
io
s
teg
an
o
g
r
ap
h
y
m
eth
o
d
t
h
at
u
s
es
th
r
ee
n
eu
r
al
n
etwo
r
k
s
:
th
e
f
ir
s
t
o
n
e
was
u
tili
ze
d
f
o
r
em
b
ed
d
in
g
a
s
ec
r
et
m
ess
ag
e
in
th
e
h
o
s
t
f
ile,
t
h
e
s
ec
o
n
d
f
o
r
ex
tr
ac
tin
g
an
d
r
em
o
v
in
g
th
e
s
ec
r
et
m
ess
ag
e,
an
d
th
e
th
ir
d
f
o
r
d
eter
m
in
in
g
th
e
s
ec
r
et
m
ess
ag
e
h
o
s
t.
T
h
e
p
r
o
p
o
s
ed
s
y
s
tem
in
teg
r
ates
n
eu
r
al
n
etwo
r
k
with
s
teg
an
o
g
r
a
p
h
y
t
o
p
r
o
tect
s
ec
r
et
m
ess
ag
e
f
r
o
m
ex
ter
n
al
o
r
in
ter
n
al
attac
k
s
,
wh
ich
r
esu
lts
in
a
r
o
b
u
s
t
s
y
s
tem
.
T
h
e
s
y
s
tem
w
o
r
k
s
th
r
o
u
g
h
s
ev
er
al
lay
er
s
in
t
h
e
n
e
u
r
al
n
etwo
r
k
,
wh
eth
er
at
th
e
lev
el
o
f
h
id
i
n
g
o
r
ex
tr
ac
tio
n
.
T
o
m
ea
s
u
r
e
th
e
ac
cu
r
ac
y
o
f
th
e
s
y
s
tem
,
r
elat
ed
s
ec
u
r
ity
cr
iter
ia
s
u
ch
as
M
SE
an
d
PS
NR
wer
e
u
s
ed
,
an
d
t
h
e
r
esu
lts
s
h
o
wed
t
h
e
q
u
ality
o
f
th
e
s
y
s
tem
co
m
p
ar
ed
to
o
t
h
er
s
y
s
tem
s
.
Yi
et
a
l.
[
1
3
]
p
r
o
p
o
s
ed
an
d
ad
ap
ted
th
e
f
r
am
ewo
r
k
o
f
H
u
f
f
m
an
C
o
d
e,
wh
ic
h
is
a
m
eth
o
d
th
at
co
n
s
tr
u
cts
th
e
co
d
e
s
p
ac
e
ch
e
ck
in
g
d
ata
i
n
s
er
tin
g
p
r
o
ce
s
s
an
d
u
tili
ze
s
an
en
tr
o
p
y
co
d
e
wi
th
th
e
s
am
e
len
g
th
.
I
t
em
p
lo
y
ed
a
s
teg
o
k
e
y
f
o
r
m
o
d
if
y
in
g
Hu
f
f
m
an
co
d
e
m
ap
p
i
n
g
to
m
a
n
ag
e
s
tatis
tical
u
n
d
etec
tab
ilit
y
.
T
h
e
k
ey
was
u
s
ed
o
n
th
e
d
ata
to
b
e
h
id
d
en
in
o
r
d
e
r
to
b
u
ild
a
s
p
ec
ial
s
tr
u
ctu
r
e
f
o
r
th
e
d
ata
th
at
in
tu
r
n
r
e
-
ar
r
an
g
es
th
e
d
ata,
wh
ich
will
r
ed
u
ce
th
e
s
ize
o
f
th
e
d
ata,
wh
ich
r
e
d
u
ce
s
th
e
ch
an
ce
o
f
s
u
s
p
icio
n
i
n
th
e
f
ile
ca
r
r
y
in
g
th
e
h
id
d
en
d
ata.
T
h
e
r
esu
lts
s
h
o
wed
th
e
q
u
ality
o
f
th
e
s
y
s
tem
c
o
m
p
ar
ed
to
o
th
e
r
s
y
s
tem
s
u
s
in
g
s
ec
u
r
ity
s
tan
d
ar
d
s
r
elate
d
to
th
e
s
ize
o
f
t
h
e
h
id
d
e
n
d
ata
as we
ll a
s
th
e
ch
an
ce
o
f
ex
tr
ac
tio
n
an
d
tr
ac
k
i
n
g
it.
W
az
ir
ali
et
a
l.
[
1
4
]
p
r
o
p
o
s
ed
a
s
teg
an
o
g
r
ap
h
y
tech
n
i
q
u
e
t
h
at
u
s
es
a
g
en
etic
alg
o
r
ith
m
an
d
f
itn
ess
f
u
n
ctio
n
to
im
p
r
o
v
e
s
im
ilar
ity
b
etwe
en
th
e
h
o
s
t
f
ile
an
d
s
ec
r
et
m
ess
ag
e
th
r
o
u
g
h
th
e
d
if
f
er
en
t
s
tag
es
o
f
th
e
em
b
ed
d
in
g
p
r
o
ce
s
s
.
I
n
th
is
p
ap
er
,
t
h
e
au
t
h
o
r
s
tr
ie
d
to
f
in
d
th
e
p
o
s
s
ib
ilit
y
o
f
s
im
ilar
ity
with
in
th
e
h
o
s
t
b
y
s
elec
tin
g
r
an
d
o
m
v
ec
to
r
s
an
d
th
en
co
m
p
ar
in
g
t
h
em
with
t
h
e
d
ata
to
b
e
h
id
d
e
n
in
o
r
d
er
to
o
b
tain
th
e
least
p
o
s
s
ib
le
v
ar
iatio
n
s
with
in
th
e
h
o
s
t
m
ed
iu
m
,
wh
ich
in
tu
r
n
w
ill
r
ed
u
ce
t
h
e
s
u
s
p
icio
n
o
f
th
e
p
r
esen
ce
o
f
h
i
d
d
en
d
ata.
T
h
e
r
esu
lts
in
d
icate
th
r
o
u
g
h
th
e
u
s
e
o
f
MSE
an
d
PS
NR
g
o
o
d
r
esu
lts
an
d
h
ig
h
ab
ilit
y
to
s
to
r
e
r
aw
m
ess
ag
es with
m
in
im
al
m
o
d
if
icatio
n
s
.
B
awa
n
eh
[
1
5
]
p
r
o
p
o
s
ed
a
s
t
eg
an
o
g
r
ap
h
y
f
r
am
ewo
r
k
th
at
u
s
es
th
e
in
tellig
en
t
wate
r
d
r
o
p
(
I
W
D)
alg
o
r
ith
m
an
d
L
C
G
to
s
ea
r
ch
f
o
r
th
e
b
est
h
o
s
tin
g
p
ath
in
s
id
e
a
g
r
ay
s
ca
le
im
ag
e.
T
h
e
b
est
p
ath
was
u
tili
ze
d
to
s
to
r
e
th
e
s
ec
r
et
m
ess
ag
e
d
ata
i
n
s
id
e
th
e
h
o
s
t
im
ag
e
.
L
C
G
alg
o
r
ith
m
d
eter
m
in
es
th
e
p
ath
s
r
an
d
o
m
l
y
f
o
r
I
W
D.
T
h
e
co
m
p
ar
is
o
n
b
etwe
en
p
at
h
d
ata
an
d
s
ec
r
et
m
ess
ag
e
d
a
ta
is
d
o
n
e
b
y
I
W
D
in
aim
to
f
in
d
th
e
m
in
im
u
m
m
o
d
if
ied
o
n
e
.
T
h
e
s
y
s
tem
w
as
r
o
b
u
s
t
ag
ain
s
t
in
tr
u
d
er
s
b
e
ca
u
s
e
th
e
d
ec
o
d
i
n
g
p
r
o
ce
s
s
r
eq
u
ir
es
k
n
o
wled
g
e
ab
o
u
t e
x
tr
ac
tio
n
k
e
y
s
an
d
u
s
ed
alg
o
r
ith
m
s
.
Ali
et
a
l.
[
1
6
]
p
r
esen
ted
an
au
d
io
s
teg
an
o
g
r
ap
h
y
f
r
am
ewo
r
k
b
ased
o
n
th
e
id
ea
o
f
em
b
ed
d
i
n
g
a
s
ec
r
et
m
ess
ag
e
au
d
io
with
in
u
n
if
o
r
m
in
p
u
t
a
u
d
io
.
T
h
ey
u
s
ed
f
r
a
ctal
co
d
in
g
f
o
r
d
ata
co
m
p
r
ess
io
n
an
d
p
r
o
d
u
ce
d
a
h
ig
h
lev
el
o
f
it.
T
h
e
f
r
ac
tal
co
d
in
g
was
u
s
ed
to
co
m
p
r
ess
th
e
s
ec
r
et
m
ess
ag
e
b
y
tes
an
d
th
en
r
eo
r
d
e
r
in
g
th
em
in
s
id
e
th
e
h
o
s
t
au
d
io
f
ile
ac
co
r
d
in
g
to
th
is
co
d
in
g
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
tem
,
as
s
tated
in
th
e
r
esu
lts
,
s
u
cc
ee
d
ed
in
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
2
,
Ap
r
il
20
25
:
2
2
3
7
-
2
2
5
3
2240
r
ed
u
cin
g
th
e
s
ize
o
f
t
h
e
s
ec
r
et
m
ess
ag
e
d
ata
th
r
o
u
g
h
t
h
e
co
m
p
r
ess
io
n
p
r
o
ce
s
s
,
wh
ich
led
to
a
r
ed
u
cti
o
n
in
t
h
e
p
er
ce
n
tag
e
o
f
ch
a
n
g
es
in
th
e
h
o
s
t
f
ile,
as
well
as
m
ak
in
g
th
e
p
r
o
ce
s
s
o
f
ex
tr
ac
tin
g
th
e
m
ess
ag
e
b
y
th
e
attac
k
er
m
o
r
e
co
m
p
licated
,
d
u
e
to
its
r
elian
ce
o
n
th
e
f
r
ac
tal
co
d
i
n
g
.
B
awa
n
eh
[
1
7
]
p
r
o
p
o
s
ed
a
r
an
d
o
m
s
teg
an
o
g
r
a
p
h
y
s
y
s
tem
f
o
r
im
ag
es
th
at
u
s
e
L
C
G
to
d
is
tr
ib
u
te
d
ata
r
an
d
o
m
l
y
in
s
id
e
th
e
h
o
s
t
f
ile.
T
h
e
co
n
s
tr
u
cted
s
y
s
tem
in
s
er
ts
d
ata
o
f
s
ec
r
et
m
ess
ag
es
in
s
id
e
co
lo
r
ed
im
a
g
es
ac
co
r
d
in
g
t
o
lo
ca
tio
n
s
s
elec
ted
v
ia
L
C
G.
Seed
,
m
u
ltip
lier
an
d
n
o
n
-
co
m
m
o
n
f
ac
t
o
r
r
ef
e
r
to
p
ar
am
eter
s
o
f
L
C
G
alg
o
r
ith
m
,
wh
ich
a
r
e
co
n
s
id
er
ed
as
th
e
h
id
d
en
an
d
ex
tr
ac
tio
n
k
ey
s
f
o
r
s
ec
r
et
m
ess
ag
e.
R
esu
lts
in
d
icate
d
th
at
s
y
s
tem
was
r
o
b
u
s
t
in
ter
m
s
o
f
ex
tr
ac
tio
n
an
d
d
etec
tio
n
,
d
u
e
to
th
e
r
an
d
o
m
ly
s
elec
ted
lo
ca
tio
n
s
an
d
s
atis
f
y
in
g
th
e
m
ain
s
ec
u
r
ity
r
e
q
u
ir
em
e
n
t
s
.
B
h
ar
ti
et
a
l.
[
1
8
]
p
r
o
p
o
s
ed
a
n
o
v
el
ap
p
r
o
ac
h
f
o
r
a
u
d
io
s
teg
an
o
g
r
a
p
h
y
t
h
at
u
s
es
a
s
ec
r
et
m
ess
ag
e
an
d
h
o
s
t
f
ile
as
au
d
io
o
n
es.
T
h
e
y
u
s
ed
th
e
s
am
p
les
o
f
h
o
s
t
f
ile
to
em
b
ed
th
e
b
y
tes
o
f
s
ec
r
et
m
ess
ag
e
an
d
s
u
g
g
ested
in
s
er
tin
g
o
n
e
b
it
f
r
o
m
th
e
s
ec
r
et
m
ess
ag
e
in
to
e
ac
h
s
am
p
le
f
r
o
m
t
h
e
h
o
s
t
f
ile
.
T
h
e
ap
p
r
o
ac
h
was
r
o
b
u
s
t
ag
ai
n
s
t
L
SB
r
em
o
v
al
an
d
r
esam
p
lin
g
attac
k
s
,
a
n
d
in
ter
m
o
f
th
e
p
er
ce
p
tu
al
ev
alu
atio
n
o
f
s
p
ee
c
h
q
u
ality
(
PESQ)
an
d
m
ea
n
o
p
i
n
io
n
s
co
r
e
(
MO
S)
th
e
p
r
o
p
o
s
ed
m
eth
o
d
g
av
e
a
g
o
o
d
s
co
r
e
as
m
en
tio
n
ed
in
th
e
p
ap
er
r
esu
lt.
Kan
au
jiy
a
et
a
l.
[
1
9
]
p
r
o
p
o
s
e
d
a
m
eth
o
d
f
o
r
s
teg
an
o
g
r
ap
h
y
th
at
co
m
b
in
es
b
etwe
en
s
teg
an
o
g
r
a
p
h
y
an
d
cr
y
p
to
g
r
ap
h
y
.
T
h
ey
f
o
c
u
s
ed
o
n
au
d
io
wav
e
as
a
h
o
s
t
f
i
le
an
d
L
SB
f
o
r
em
b
ed
d
i
n
g
s
e
cr
et
m
ess
ag
e
d
ata.
B
ef
o
r
e
h
id
in
g
th
e
m
ess
ag
e
d
a
ta,
it
is
en
cr
y
p
te
d
u
s
in
g
th
e
R
iv
est
-
Sh
am
ir
-
Ad
lem
an
(
R
SA)
alg
o
r
ith
m
a
n
d
th
e
n
em
b
ed
d
e
d
in
th
e
au
d
i
o
f
ile
in
a
s
eq
u
en
tial
m
an
n
er
u
s
in
g
t
h
e
L
SB
alg
o
r
ith
m
,
wh
er
e
th
e
h
id
in
g
p
r
o
ce
s
s
s
tar
t
s
af
ter
th
e
a
u
d
io
f
ile
h
ea
d
e
r
.
T
h
e
s
tr
en
g
th
o
f
t
h
is
m
o
d
el
lie
s
in
th
e
en
c
r
y
p
tio
n
m
eth
o
d
a
n
d
n
o
t
th
e
h
id
in
g
m
eth
o
d
,
as
it
is
s
eq
u
en
tial.
T
h
e
co
m
b
in
atio
n
in
t
h
e
p
r
o
p
o
s
ed
f
r
am
ewo
r
k
p
r
o
v
id
es
two
lev
els
o
f
s
ec
u
r
ity
f
o
r
s
ec
r
et
m
ess
ag
es in
ter
m
o
f
en
c
r
y
p
tio
n
a
n
d
s
teg
an
o
g
r
a
p
h
y
as
m
en
tio
n
ed
i
n
th
e
p
a
p
er
r
esu
lt.
Kr
is
h
n
an
et
a
l.
[
2
0
]
p
r
o
p
o
s
ed
an
au
d
io
s
teg
an
o
g
r
ap
h
y
m
eth
o
d
to
im
p
r
o
v
e
L
SB
v
ia
th
e
R
S
A
en
cr
y
p
tio
n
alg
o
r
ith
m
.
T
h
ey
ap
p
lied
s
teg
o
k
ey
s
a
n
d
cr
y
p
to
g
r
ap
h
y
k
ey
s
to
in
cr
ea
s
e
t
h
e
s
ec
u
r
ity
o
f
th
e
s
teg
an
o
g
r
ap
h
y
p
r
o
ce
s
s
.
Hid
d
e
n
an
d
ex
tr
ac
ti
o
n
p
r
o
ce
s
s
es
ar
e
co
n
tr
o
lled
b
y
s
teg
an
o
g
r
a
p
h
y
an
d
cr
y
p
to
g
r
ap
h
y
k
ey
s
.
A
s
ec
r
et
m
ess
ag
e
was
h
id
d
en
in
s
id
e
an
au
d
io
s
ig
n
al
a
n
d
m
o
d
if
ie
d
in
s
ig
n
if
ican
t
b
in
ar
y
o
r
d
e
r
in
g
o
f
th
e
au
d
io
f
ile.
T
h
e
r
esu
lt
s
h
o
ws
th
at
th
e
p
r
o
p
o
s
ed
s
y
s
tem
was
r
o
b
u
s
t
ag
ain
s
t
attac
k
s
th
at
m
ig
h
t
b
e
ca
r
r
ied
o
u
t
o
n
th
e
L
SB
alg
o
r
ith
m
d
u
e
t
o
th
e
s
tr
en
g
th
o
f
th
e
en
c
r
y
p
tio
n
alg
o
r
ith
m
,
wh
ich
is
R
SA,
wh
ich
is
co
n
s
id
er
ed
o
n
e
o
f
th
e
s
tr
o
n
g
est alg
o
r
ith
m
s
.
Sh
an
th
ak
u
m
a
r
i
et
a
l.
[
2
1
]
p
r
o
p
o
s
ed
an
au
d
io
s
teg
an
o
g
r
a
p
h
y
b
ased
o
n
t
h
e
L
SB
ap
p
r
o
ac
h
t
o
h
id
e
d
ata
in
s
id
e
wav
e
f
ile,
b
y
p
r
o
p
o
s
in
g
an
alg
o
r
ith
m
t
h
at
s
ea
r
ch
es
f
o
r
less
m
o
d
if
icatio
n
r
ate
lo
ca
ti
o
n
s
in
s
id
e
th
e
wa
v
e
f
ile.
T
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
u
s
es
ar
tific
ial
in
tellig
en
ce
(
h
eu
r
is
tic
s
ea
r
ch
)
an
d
b
ac
k
tr
ac
k
i
n
g
to
d
eter
m
in
e
th
e
b
est
p
ath
f
o
r
h
id
in
g
d
ata.
E
ac
h
s
elec
ted
p
ath
g
iv
en
a
r
a
n
k
o
r
p
r
io
r
ity
v
al
u
e
th
at
will
b
e
u
ti
lized
in
n
e
x
t
s
tep
to
s
p
ec
if
y
th
e
b
est
o
n
e.
Secr
et
m
ess
ag
e
b
y
tes
will
b
e
h
id
d
en
in
s
id
e
th
e
b
est
p
at
h
b
y
tes
in
o
r
d
er
t
o
ac
h
iev
e
th
e
m
in
im
u
m
m
o
d
if
icatio
n
r
ate
.
T
h
ey
u
tili
ze
d
PS
NR
an
d
MSE
m
ea
s
u
r
es
f
o
r
r
esu
lt
an
al
y
s
is
th
at
d
is
p
lay
th
e
d
ep
en
d
e
n
cy
b
etwe
en
th
e
h
o
s
t a
u
d
io
f
ile
an
d
th
e
len
g
th
o
f
th
e
u
s
ed
s
ec
r
et
m
ess
ag
e.
3.
M
AT
E
R
I
AL
S AN
D
M
E
T
H
O
D
T
h
e
m
ain
g
o
al
o
f
th
e
p
r
o
p
o
s
ed
f
r
am
ewo
r
k
is
to
b
u
ild
a
s
teg
o
wav
e
au
d
i
o
f
ile
th
at
is
r
o
b
u
s
t
an
d
s
ec
u
r
e
ag
ain
s
t
d
ata
d
etec
tio
n
an
d
ex
tr
ac
tio
n
.
T
h
e
m
o
s
t
ap
p
r
o
p
r
iate
s
o
lu
tio
n
to
em
b
ed
t
h
e
s
ec
r
et
d
ata
with
in
th
e
h
o
s
t
wav
e
a
u
d
io
f
ile
is
f
o
u
n
d
th
r
o
u
g
h
th
e
SA
alg
o
r
ith
m
.
E
ac
h
cr
ea
ted
s
o
l
u
tio
n
c
o
n
s
is
ts
o
f
a
s
et
o
f
s
eq
u
en
tial
b
y
tes
c
h
o
s
en
f
r
o
m
th
e
h
o
s
t
a
u
d
io
wav
e
f
ile
s
u
ch
th
at
th
e
s
tar
tin
g
b
y
te
is
s
elec
ted
r
an
d
o
m
ly
v
ia
th
e
s
y
s
tem
.
T
h
e
r
o
le
o
f
th
e
SA
alg
o
r
ith
m
is
to
ex
a
m
in
e
th
e
co
n
s
tr
u
cted
s
o
lu
tio
n
s
an
d
th
e
n
d
eter
m
in
e
th
e
b
est
o
n
e
b
etwe
en
th
em
.
T
o
ac
h
ie
v
e
th
e
m
ain
g
o
al,
th
er
e
is
a
s
et
o
f
s
tep
s
th
at
m
u
s
t
b
e
ca
r
r
ied
o
u
t
f
o
r
h
id
d
en
a
n
d
ex
tr
ac
tio
n
p
r
o
ce
s
s
es,
wh
ich
r
ep
r
esen
t
th
e
b
asic
r
eq
u
ir
em
en
ts
f
o
r
th
o
s
e
p
r
o
ce
s
s
es
as
s
h
o
wn
in
u
lter
i
o
r
s
u
b
s
ec
tio
n
s
.
3
.
1
.
H
idd
en
pro
ce
s
s
Hid
d
en
p
r
o
ce
s
s
r
eq
u
ir
es
a
s
et
o
f
in
itial
in
f
o
r
m
atio
n
th
at
wi
ll
b
e
d
is
tr
ib
u
ted
am
o
n
g
th
eir
s
u
b
-
u
n
its
.
T
h
e
h
o
s
t
wav
e
au
d
io
f
ile,
s
ec
r
et
m
ess
ag
e
f
ile,
en
cr
y
p
tio
n
k
e
y
,
an
d
p
a
r
am
eter
s
o
f
th
e
SA
alg
o
r
ith
m
r
ep
r
esen
t
th
e
r
eq
u
ir
ed
i
n
f
o
r
m
atio
n
.
I
t
s
tar
ts
b
y
en
s
u
r
in
g
t
h
e
co
m
p
at
ib
ilit
y
o
f
t
h
e
wav
e
au
d
io
f
ile
an
d
its
ab
ilit
y
to
ac
co
m
m
o
d
ate
th
e
s
ec
r
et
m
ess
ag
e,
co
n
s
tr
u
ctin
g
th
e
n
ew
s
ec
r
et
m
ess
ag
e
f
ile,
en
cr
y
p
tin
g
th
e
f
ile
to
b
e
h
id
d
en
,
s
en
d
in
g
th
e
en
cr
y
p
ted
an
d
h
o
s
t
f
ile
to
th
e
S
A
alg
o
r
ith
m
th
at
wo
r
k
s
to
b
u
ild
th
e
b
est
s
o
lu
tio
n
o
f
h
o
s
tin
g
b
y
tes,
em
b
ed
d
in
g
d
ata
with
in
t
h
e
h
o
s
t
f
ile
in
an
aim
to
c
o
n
s
tr
u
ct
t
h
e
s
teg
o
wav
e
au
d
io
f
ile,
a
n
d
f
in
ally
r
etu
r
n
in
g
t
h
e
s
teg
o
f
ile
an
d
ex
tr
ac
tio
n
k
e
y
th
at
will
b
e
u
s
ed
later
b
y
th
e
r
ec
ip
ien
t.
Fig
u
r
e
1
s
h
o
ws
th
e
f
r
am
ewo
r
k
o
f
th
e
h
id
d
en
p
r
o
ce
s
s
an
d
h
o
w
task
s
ar
e
d
is
tr
ib
u
ted
am
o
n
g
th
eir
u
n
its
,
wh
ich
will
b
e
d
is
cu
s
s
ed
in
d
etail
in
s
u
b
s
eq
u
en
t sectio
n
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
n
a
d
a
p
tive
a
u
d
io
w
a
ve
s
teg
a
n
o
g
r
a
p
h
y
u
s
in
g
s
imu
la
ted
a
n
n
ea
lin
g
a
lg
o
r
ith
m
(
A
tef
A
.
Ob
ei
d
a
t
)
2241
3
.
1
.
1
.
Wa
v
e
deco
der
un
it
I
t
r
ec
eiv
es
a
wav
e
a
u
d
io
f
ile
t
h
r
o
u
g
h
th
e
in
ter
f
ac
e
an
d
t
h
en
wo
r
k
s
to
en
s
u
r
e
th
at
th
e
f
ile
i
s
v
alid
f
o
r
u
s
e
in
th
e
d
ata
h
id
in
g
p
r
o
ce
s
s
.
T
h
e
wav
e
f
ile
ar
ch
itectu
r
e
is
a
s
u
b
s
et
o
f
th
e
Mic
r
o
s
o
f
t
r
eso
u
r
ce
in
ter
ch
an
g
e
f
ile
f
o
r
m
at
(
R
I
FF
)
s
p
ec
if
icatio
n
f
o
r
s
to
r
in
g
m
u
ltime
d
ia
d
ata
[
2
2
]
,
wh
ich
b
eg
in
s
with
a
f
ile
h
ea
d
er
f
o
llo
wed
b
y
a
s
et
o
f
ch
u
n
k
d
ata.
Mo
s
t
o
f
ten
,
th
e
wav
e
f
ile
co
n
s
is
ts
o
f
a
s
et
o
f
s
ec
tio
n
s
,
wh
er
e
ea
ch
p
ar
t
g
iv
es
s
p
ec
if
ic
in
f
o
r
m
atio
n
ab
o
u
t th
e
f
ile.
T
h
ese
s
ec
tio
n
s
ar
e
u
s
u
ally
d
iv
id
e
d
in
to
th
r
ee
ty
p
es:
a.
R
I
FF
s
ec
tio
n
:
th
is
p
ar
t
h
as
a
s
ig
n
atu
r
e
at
th
e
b
eg
in
n
in
g
o
f
th
e
f
ile
th
at
c
o
n
tain
s
f
o
u
r
letter
s
,
“
R
I
FF
,
”
in
an
aim
to
d
is
tin
g
u
is
h
th
e
f
ile
ty
p
e,
f
ile
s
ize,
an
d
d
ata
ty
p
e
u
s
ed
with
in
th
e
f
ile
th
r
o
u
g
h
a
s
et
o
f
f
ield
s
as
f
o
llo
ws:
−
C
h
u
n
k
Size,
it C
h
u
n
k
I
D,
it st
o
r
es th
e
s
ig
n
atu
r
e
“
R
I
FF
”
in
ASC
I
I
f
o
r
m
.
−
r
ef
er
s
to
f
ile
s
ize,
ex
ce
p
t t
h
e
s
ize
C
h
u
n
k
I
D
an
d
C
h
u
n
k
Size
o
f
“
fmt
”
an
d
d
ata.
−
Fo
r
m
at,
it st
o
r
es th
e
s
ig
n
atu
r
e
“
W
AVE
.
”
Fig
u
r
e
1
.
Fra
m
ewo
r
k
o
f
h
id
d
e
n
p
r
o
ce
s
s
b.
“
fmt
”
s
ec
tio
n
,
th
is
p
ar
t
d
ef
in
es
th
e
o
r
g
an
izatio
n
an
d
d
ata
f
o
r
m
at.
I
t
s
tar
ts
with
th
e
s
ig
n
atu
r
e
“
fmt
”
to
d
eter
m
in
e
th
e
b
eg
i
n
n
in
g
o
f
th
e
cu
r
r
e
n
t
s
ec
tio
n
an
d
also
h
o
l
d
s
in
f
o
r
m
atio
n
ab
o
u
t
t
h
e
s
ec
tio
n
s
ize,
au
d
i
o
f
o
r
m
at,
s
am
p
le
r
ate,
n
u
m
b
er
o
f
u
s
ed
ch
an
n
els in
s
id
e
th
e
f
ile,
b
it r
ate,
b
lo
ck
alig
n
m
en
t,
an
d
b
its
p
er
s
am
p
le
as f
o
llo
ws:
−
Su
b
ch
u
n
k
1
I
D
s
to
r
es th
e
s
ig
n
at
u
r
e
“
f
m
t
“
−
Su
b
C
h
u
n
k
1
Size,
it r
ef
er
s
to
t
h
e
to
tal
s
ize
o
f
f
ield
s
wh
ich
f
o
llo
w
th
is
o
n
e
in
th
e
s
am
e
s
ec
tio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
2
,
Ap
r
il
20
25
:
2
2
3
7
-
2
2
5
3
2242
−
Au
d
io
Fo
r
m
at
s
to
r
es v
alu
e
1
to
in
d
icate
lin
ea
r
q
u
an
tizatio
n
o
r
an
y
o
t
h
er
v
alu
e
to
in
d
icate
c
o
m
p
r
ess
io
n
.
−
Nu
m
C
h
an
n
els d
eter
m
in
es th
e
n
u
m
b
er
o
f
c
h
an
n
els (
Mo
n
o
=
1
,
Ster
eo
=
2
)
.
−
Sam
p
leR
ate
d
ef
in
es th
e
r
ate
o
f
d
ata
s
am
p
lin
g
in
t
h
e
f
ile,
s
u
ch
as 8
0
0
0
,
4
4
1
0
0
,
etc.
−
B
y
teR
ate
i
s
co
m
p
u
ted
f
r
o
m
s
a
m
p
le
r
ate,
n
u
m
b
er
o
f
c
h
an
n
els
,
an
d
b
its
p
e
r
s
am
p
le.
−
B
lo
ck
Alig
n
d
eter
m
in
es
th
e
n
u
m
b
er
o
f
b
y
tes
f
o
r
o
n
e
d
ata
s
am
p
le
in
v
o
lv
in
g
all
ch
an
n
els
o
f
d
ata
with
in
th
e
f
ile,
wh
ich
is
co
m
p
u
ted
th
r
o
u
g
h
t
h
e
n
u
m
b
er
o
f
c
h
an
n
els
an
d
b
its
p
er
s
am
p
le.
−
B
its
Per
Sam
p
le
d
eter
m
in
es th
e
n
u
m
b
e
r
o
f
b
its
in
a
d
ata
s
am
p
le
(
8
b
its
=8
,
1
6
b
its
=1
6
)
.
c.
Data
s
ec
tio
n
,
th
is
p
ar
t
s
to
r
es
th
e
ac
tu
al
au
d
io
d
ata,
an
d
it
s
tar
ts
wi
th
s
ig
n
atu
r
e
“
d
ata
”
to
d
eter
m
in
e
th
e
b
eg
in
n
in
g
o
f
cu
r
r
e
n
t sectio
n
,
a
n
d
it a
ls
o
h
o
ld
s
in
f
o
r
m
atio
n
ab
o
u
t sectio
n
s
ize
an
d
a
u
d
io
d
ata;
as f
o
llo
w:
−
Su
b
ch
u
n
k
2
I
D
s
to
r
es th
e
s
ig
n
at
u
r
e
“
d
ata.
”
−
Su
b
C
h
u
n
k
2
Size
d
eter
m
in
es t
h
e
d
ata
s
ize
(
n
u
m
b
er
o
f
b
y
tes)
in
th
e
d
ata
f
ield
.
−
Data
s
to
r
es th
e
r
ea
l so
u
n
d
d
ata
o
f
th
e
a
u
d
io
f
ile.
T
h
er
e
is
m
o
r
e
th
a
n
o
n
e
t
y
p
e
o
f
wav
e
f
ile
th
at
wo
r
k
s
with
d
if
f
er
en
t
len
g
th
s
,
s
u
ch
as
PC
M
-
8
b
its
,
PC
M
-
1
6
b
its
,
PC
M
-
2
4
b
its
an
d
PC
M
-
3
2
.
Dea
lin
g
with
th
e
d
if
f
er
e
n
t
len
g
t
h
s
o
f
wav
e
f
il
e
r
eq
u
ir
es
a
lo
t
o
f
ef
f
o
r
t; th
er
ef
o
r
e,
we
f
o
c
u
s
ed
o
n
m
an
ip
u
latin
g
a
n
d
p
r
o
ce
s
s
in
g
o
n
ly
PC
M
-
1
6
b
its
in
wh
ich
th
e
h
ea
d
er
s
ize
is
4
4
b
y
tes.
Fig
u
r
e
2
s
h
o
ws
th
e
s
tr
u
ctu
r
e
o
f
r
eq
u
ir
ed
th
e
h
o
s
t
w
av
e
f
ile,
wh
ich
was
u
s
ed
t
o
c
o
n
s
tr
u
ct
th
e
W
AVE
u
n
it d
ec
o
d
er
.
Fig
u
r
e
2
.
W
av
e
f
ile
f
o
r
m
at
3
.
1
.
2
.
Dec
is
io
n
unit
B
ased
o
n
r
esu
lts
r
etu
r
n
ed
f
r
o
m
th
e
W
av
e
Dec
o
d
e
r
u
n
i
t,
th
e
Dec
is
io
n
-
Ma
k
in
g
u
n
it
wo
r
k
s
to
d
eter
m
in
e
th
e
co
n
tin
u
ity
o
f
wo
r
k
wh
e
n
ev
er
th
e
h
o
s
t
f
ile
is
co
m
p
atib
le.
I
f
wo
r
k
co
n
tin
u
es,
th
e
Dec
is
io
n
-
Ma
k
in
g
Un
it
wo
r
k
s
to
ca
lcu
la
te
th
e
n
u
m
b
er
o
f
av
ailab
le
b
y
t
es
in
th
e
h
o
s
t
au
d
i
o
f
ile,
as
we
ll
as
th
e
n
u
m
b
er
o
f
b
y
tes
n
ee
d
ed
f
o
r
th
e
s
ec
r
et
m
ess
ag
e
in
o
r
d
er
to
p
er
f
o
r
m
th
e
h
id
in
g
p
r
o
ce
s
s
.
T
h
e
av
ailab
le
n
u
m
b
er
o
f
b
y
tes
in
th
e
h
o
s
t
f
ile
is
ca
lcu
lated
af
t
er
ex
clu
d
in
g
th
e
h
o
s
t
f
ile
h
e
ad
er
(
HFH)
,
wh
ich
is
(
4
4
)
b
y
tes,
s
u
ch
th
at
th
e
r
em
ain
in
g
b
y
tes
ar
e
co
m
p
u
ted
an
d
d
iv
id
e
d
b
y
(
8
)
b
ec
au
s
e
e
ac
h
b
y
te
f
r
o
m
th
e
s
ec
r
et
m
ess
ag
e
f
ile
r
eq
u
ir
es
(
8
)
b
y
tes
f
r
o
m
th
e
h
o
s
t
wav
e
au
d
io
f
ile
as
s
h
o
wn
in
(
1
)
.
On
th
e
o
th
er
h
an
d
,
th
e
n
u
m
b
er
o
f
b
y
tes
n
ee
d
ed
f
o
r
th
e
s
ec
r
et
m
ess
ag
e
f
ile
is
ca
lcu
lated
b
y
d
eter
m
i
n
in
g
th
e
n
u
m
b
er
o
f
b
y
tes
in
th
e
f
ile
its
elf
,
th
en
r
eser
v
in
g
a
n
ad
d
itio
n
al
(
1
3
)
b
y
tes
f
o
r
s
ig
n
a
tu
r
e,
len
g
th
,
a
n
d
ex
ten
s
io
n
(
SLE
)
th
at
will
also
b
e
em
b
ed
d
e
d
in
t
h
e
h
o
s
t
f
ile,
in
wh
ich
(
3
)
b
y
tes
f
o
r
m
ess
ag
e
s
ig
n
atu
r
e,
(
5
)
b
y
tes
f
o
r
m
ess
ag
e
len
g
th
,
an
d
(
5
)
b
y
tes
ar
e
f
o
r
m
ess
ag
e
ex
ten
s
io
n
.
T
h
e
r
esu
lt
o
f
th
e
s
u
m
is
m
u
l
tip
lied
b
y
(
8
)
b
ec
au
s
e
ea
c
h
b
y
te
f
r
o
m
th
e
s
ec
r
et
m
ess
ag
e
f
ile,
as
m
en
tio
n
e
d
p
r
ev
io
u
s
ly
n
ee
d
s
,
(
8
)
b
y
tes
f
r
o
m
th
e
h
o
s
t
wav
e
a
u
d
io
f
ile
to
h
id
e
it.
E
q
u
atio
n
(
2
)
s
h
o
w
s
h
o
w
th
e
r
e
q
u
ir
ed
b
y
tes
ar
e
co
m
p
u
ted
f
o
r
th
e
s
e
cr
et
m
ess
ag
e
f
ile
to
b
e
h
id
d
en
.
Af
ter
th
at,
t
h
e
n
u
m
b
er
o
f
ca
lcu
lated
b
y
tes
in
th
e
wav
e
au
d
io
f
ile
an
d
s
ec
r
et
m
e
s
s
ag
e
f
ile
ar
e
co
m
p
ar
e
d
to
ch
e
ck
s
u
itab
ilit
y
f
o
r
c
o
n
tin
u
ity
o
r
n
o
t.
=
(
ℎ
−
)
/
8
)
(
1
)
=
(
ℎ
+
)
∗
8
)
(
2
)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
n
a
d
a
p
tive
a
u
d
io
w
a
ve
s
teg
a
n
o
g
r
a
p
h
y
u
s
in
g
s
imu
la
ted
a
n
n
ea
lin
g
a
lg
o
r
ith
m
(
A
tef
A
.
Ob
ei
d
a
t
)
2243
3
.
1
.
3
.
Secr
et
m
ess
a
g
e
enco
di
ng
un
it
T
h
e
r
o
le
o
f
th
is
u
n
it
is
to
b
u
ild
th
e
n
ew
s
ec
r
et
m
es
s
ag
e
f
il
e,
wh
ich
co
n
s
is
ts
o
f
th
e
s
ec
r
e
t
m
ess
ag
e
s
ig
n
atu
r
e,
len
g
th
o
f
th
e
s
ec
r
et
m
ess
ag
e,
ex
ten
s
io
n
o
f
th
e
s
ec
r
et
m
ess
ag
e,
an
d
ac
tu
al
d
ata
o
f
th
e
s
ec
r
et
m
ess
ag
e
as
s
h
o
wn
in
Fig
u
r
e
3
.
T
h
e
s
ig
n
atu
r
e,
le
n
g
th
,
an
d
ex
ten
s
io
n
o
f
th
e
s
ec
r
et
m
ess
ag
e
f
ile
will
b
e
em
b
ed
d
e
d
in
th
e
n
ew
f
ile
an
d
u
s
ed
in
th
e
ex
tr
ac
tio
n
p
r
o
ce
s
s
.
T
h
e
s
ig
n
atu
r
e
h
as
letter
s
“
S
MF
”
th
at
i
s
u
tili
ze
d
to
ch
ec
k
if
th
e
in
s
er
ted
au
d
io
f
ile
co
n
tain
s
a
s
ec
r
et
m
ess
ag
e
o
r
n
o
t.
Mo
r
eo
v
er
,
th
e
ex
ten
s
io
n
o
f
s
ec
r
et
is
em
p
lo
y
ed
t
o
b
u
il
d
th
e
s
ec
r
et
m
ess
ag
e
f
ile,
wh
ile
th
e
len
g
th
o
f
th
e
m
ess
ag
e
d
ete
r
m
in
es
th
e
n
u
m
b
e
r
o
f
b
y
tes
to
b
e
e
x
tr
ac
ted
f
r
o
m
th
e
s
teg
o
au
d
io
f
ile.
Fig
u
r
e
3
.
Fo
r
m
at
o
f
n
ew
s
ec
r
e
t m
ess
ag
e
f
ile
3
.
1
.
4
.
E
ncry
ptio
n
unit
I
t
r
ec
eiv
es
t
h
e
n
ew
s
ec
r
et
m
ess
ag
e
f
ile
af
te
r
e
n
s
u
r
in
g
th
at
th
e
h
o
s
t
wa
v
e
a
u
d
io
f
ile
is
a
b
le
to
h
id
e
it.
T
h
e
en
cr
y
p
tio
n
p
r
o
ce
s
s
d
ep
e
n
d
s
o
n
an
alg
o
r
ith
m
s
im
ilar
to
t
h
e
way
th
e
C
ae
s
ar
alg
o
r
ith
m
wo
r
k
s
[
2
3
]
,
wh
ich
is
co
n
s
id
er
ed
o
n
e
o
f
th
e
s
im
p
lest
,
m
o
s
t
f
am
o
u
s
,
an
d
f
astes
t
alg
o
r
ith
m
s
.
I
t
r
elies
o
n
th
e
p
r
in
cip
le
o
f
r
ep
lacin
g
v
alu
es
f
r
o
m
a
p
r
e
-
p
r
e
p
ar
ed
tab
le
with
v
alu
es
s
h
ar
ed
b
etwe
en
th
e
s
en
d
e
r
an
d
r
ec
eiv
e
r
,
w
h
er
e
th
e
e
n
cr
y
p
tio
n
k
ey
is
a
s
p
ec
if
ic
s
h
if
t
am
o
u
n
t
ag
r
ee
d
u
p
o
n
b
etwe
en
t
h
e
two
p
ar
ties
.
T
h
e
en
cr
y
p
tio
n
alg
o
r
ith
m
u
s
ed
in
cu
r
r
en
t
r
esear
ch
wo
r
k
s
to
b
u
ild
a
s
h
ar
ed
tab
le
b
etwe
en
th
e
s
en
d
er
an
d
r
ec
eiv
er
th
at
s
to
r
es
r
an
d
o
m
n
u
m
b
er
s
in
th
e
p
er
io
d
(
0
-
2
5
5
)
with
o
u
t
r
ep
ea
ti
n
g
th
e
v
alu
es.
Af
ter
th
at,
ea
ch
b
y
te
o
f
th
e
s
ec
r
et
m
ess
ag
e
is
r
ep
lace
d
with
in
its
co
r
r
esp
o
n
d
in
g
v
alu
e
i
n
th
e
ch
o
s
en
lo
ca
tio
n
.
Alg
o
r
ith
m
1
s
h
o
ws
h
o
w
th
e
e
n
cr
y
p
tio
n
u
n
it
ac
co
m
p
lis
h
es
th
eir
task
an
d
th
e
m
ec
h
a
n
is
m
in
wh
ich
th
e
en
cr
y
p
tio
n
alg
o
r
ith
m
wo
r
k
s
in
ter
m
s
o
f
h
o
w
to
r
ep
l
ac
e
th
e
v
alu
es
o
f
th
e
s
ec
r
et
m
ess
ag
e
.
Alg
o
r
ith
m
1
.
Ma
in
s
tep
s
o
f
en
cr
y
p
tio
n
u
n
it
Step
1
:
Get SecretMessageFile
Step
2:
Set Index=0
Step
3
:
If Index >= NewSecretFile.Length Then Goto Step8
Step
4
:
Set X=ReadByte
(
)
Step
5
:
Set Encrypted_Byte= SharedTable[X]
Step
6
:
EncryptedFile.writeByte(Encrypted_Byte)
Step
7:
Goto Step3
Step
8: Return EncryptedFile
3
.
1
.
5
.
SA
unit
SA
u
n
it
r
ec
eiv
es
th
e
s
ec
r
et
m
e
s
s
ag
e
f
ile
th
at
was
en
cr
y
p
ted
,
as
well
as
th
e
h
o
s
t
au
d
io
f
ile,
i
n
o
r
d
e
r
to
f
in
d
o
u
t
th
e
b
est
p
ath
with
in
t
h
e
h
o
s
t
f
ile
th
at
will
s
to
r
e
th
e
h
id
d
en
m
ess
ag
e.
T
h
e
SA
alg
o
r
ith
m
r
elies
o
n
a
s
et
o
f
p
ar
am
ete
r
s
th
at
ar
e
co
n
s
id
e
r
ed
ess
en
tial in
th
e
p
r
o
ce
s
s
o
f
d
eter
m
in
in
g
t
h
e
b
est s
o
lu
tio
n
[
7
]
an
d
s
u
m
m
ar
ize
d
in
m
ax
im
u
m
in
itial
tem
p
er
at
u
r
e
(
Ma
x
T
em
p
e
r
atu
r
e)
,
m
in
im
u
m
s
to
p
p
in
g
tem
p
er
atu
r
e
(
Ab
s
o
lu
teT
em
p
er
atu
r
e)
,
an
d
co
o
lin
g
co
ef
f
icie
n
t
(
C
o
o
li
n
g
R
ate)
.
T
h
e
v
alu
es
o
f
th
ese
p
ar
am
eter
s
ca
n
b
e
v
ar
iab
le,
o
b
tain
ed
th
r
o
u
g
h
t
h
e
co
m
m
u
n
icatio
n
in
ter
f
ac
e,
o
r
c
an
b
e
f
ix
e
d
,
wh
ich
was
d
o
n
e
in
th
e
cu
r
r
e
n
t
r
esear
ch
.
Af
ter
o
b
tain
in
g
th
e
b
asic
r
eq
u
ir
em
e
n
ts
f
o
r
wo
r
k
to
b
e
d
o
n
e,
th
e
SA
alg
o
r
ith
m
b
u
ild
s
th
e
in
itial
v
ec
to
r
th
at
s
elec
t
s
s
eq
u
en
tial
b
y
tes
s
tar
tin
g
f
r
o
m
a
r
a
n
d
o
m
l
o
ca
tio
n
with
in
th
e
h
o
s
t
au
d
io
f
ile,
wh
ich
in
tu
r
n
f
o
r
m
s
th
e
p
at
h
th
at
will
co
n
tain
th
e
s
ec
r
et
m
ess
ag
e.
Dis
tan
ce
s
b
et
wee
n
co
n
s
tr
u
cte
d
s
o
lu
tio
n
s
an
d
s
ec
r
et
m
ess
ag
es
will
b
e
co
m
p
u
ted
an
d
k
e
p
t
in
aim
to
d
eter
m
in
e
th
e
b
est
s
o
lu
tio
n
ac
co
r
d
i
n
g
to
m
in
im
u
m
d
is
tan
ce
v
alu
e.
I
t
m
ay
co
m
e
t
o
m
in
d
th
at
th
e
b
est
p
ath
s
en
t
to
th
e
h
id
d
en
u
n
it
is
a
s
er
ies
o
f
l
o
ca
tio
n
s
f
r
o
m
t
h
e
h
o
s
t
au
d
io
f
ile,
b
u
t
o
n
ly
th
e
s
ee
d
th
at
c
r
ea
ted
t
h
e
b
est
p
ath
will
b
e
s
en
t
to
b
e
u
s
ed
in
b
u
ild
in
g
th
e
b
est
p
ath
a
g
ain
with
in
th
e
h
id
d
en
u
n
it.
Su
b
s
eq
u
en
t
s
ec
tio
n
s
ex
p
lain
h
o
w
th
e
SA
alg
o
r
ith
m
wo
r
k
s
in
ter
m
s
o
f
b
u
ild
in
g
s
o
lu
tio
n
s
an
d
d
eter
m
in
i
n
g
th
e
d
i
s
tan
ce
b
etwe
en
th
e
en
cr
y
p
ted
s
ec
r
et
m
ess
ag
e
an
d
th
e
s
o
lu
tio
n
.
Alg
o
r
ith
m
2
s
h
o
ws
th
e
m
ain
s
tep
s
th
at
th
e
SA
Un
it
will
tak
e
t
o
d
eter
m
in
e
th
e
b
est p
ath
th
at
w
ill b
e
u
s
ed
later
in
th
e
h
id
d
e
n
u
n
it.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
2
,
Ap
r
il
20
25
:
2
2
3
7
-
2
2
5
3
2244
Alg
o
r
ith
m
2
.
Ma
in
s
tep
s
o
f
S
A
u
n
it
Step1: Get HostFile, EncryptedFile and MaxIterations
Step2: Set MaxTemperature=10000
Step3: Set CoolingRate=0.99
Step4: Set
AbsoluteTemperature=0.00001
Step5: Set Seed=Integer_Random_Value
Step6: Set BestSeed=Seed;
Step7: Set Distance=BuildSAVector(Seed, HostFile, EncryptedFile )
Step8: Set BestDistance=Distance
Step9: Set OldDistance=Distance
Step10: Set deltaDistance=0
Step11: Set Iteration=0
Step12: Set Temperature=MaxTemperature
Step13: If Temperature<=AbsoluteTemperature Then Goto Step 30
Step14: Set Seed=Integer_Random_Value
Step15: Set HostFile.Position=0;
Step16: Set EncryptedFile.Position=0;
Step17: Set
NewDistance=BuildSAVector(Seed, HostFile, EncryptedFile )
Step18: Set deltaDistance=NewDistance
–
OldDistance
Step19: Set R=Random.Real (0,1)
Step20: If Not (deltaDistance<0 and BestDistance>NewDistance) Then Goto Step 24
Step21: Set BestDistance=NewDistance
Step22: Set BestSeed=Seed;
Step23: Goto Step 26
Step24:
If Not (
(OldD
ista
nce>0 &&
Math.
Exp(
-
d
e
l
t
a
Di
s
t
a
n
c
e
/
Te
m
p
e
r
at
u
r
e
)>
R
)
)
Th
e
n
G
o
t
o
S
t
e
p
26
Step25: Set OldDistance=deltaDistance+OldDistance
Step26: Set Iteration=Iteration+1
Step27: Set Temperature=Temperature*CoolingRate
Step28: If Iteration>=MaxIterations Then Goto Step 30
Step29: Goto Step 13
Step30: Return BestSeed
SA
v
ec
to
r
co
n
s
tr
u
ctio
n
u
n
it
g
ets
th
e
h
o
s
t
au
d
io
f
ile,
th
e
en
cr
y
p
ted
m
ess
ag
e
f
ile,
an
d
th
e
s
ee
d
v
alu
e,
wh
ich
r
ep
r
esen
ts
th
e
s
tar
tin
g
p
o
s
itio
n
in
s
id
e
th
e
h
o
s
t a
u
d
io
f
ile.
T
h
e
v
ec
to
r
co
n
s
tr
u
ctio
n
p
r
o
ce
s
s
b
eg
in
s
with
a
lo
o
p
th
at
r
ea
d
s
th
e
en
c
r
y
p
ted
m
ess
ag
e
b
y
te
b
y
b
y
te,
in
wh
ic
h
ea
ch
o
n
e
is
s
ep
ar
ated
in
to
(
8
)
b
its
.
Af
ter
th
at,
it
r
ea
d
s
(
8
)
b
y
tes
s
eq
u
en
tially
f
r
o
m
th
e
h
o
s
t
f
ile
s
tar
tin
g
f
r
o
m
th
e
s
ee
d
p
o
s
itio
n
an
d
th
en
ex
t
r
ac
ts
th
e
r
ig
h
tm
o
s
t
b
its
o
f
th
em
.
T
h
e
d
is
tan
ce
b
et
wee
n
ex
tr
ac
ted
h
o
s
t
b
its
an
d
m
ess
ag
e
b
its
will
b
e
co
m
p
u
ted
an
d
k
ep
t.
T
h
e
s
am
e
p
r
o
ce
s
s
is
r
ep
ea
ted
with
all
b
y
tes
o
f
th
e
en
cr
y
p
ted
m
ess
ag
e
an
d
h
o
s
t
au
d
io
f
ile,
wh
er
e
ea
ch
tim
e
th
e
n
ew
d
is
tan
ce
is
ad
d
ed
to
th
e
r
etain
ed
d
is
tan
ce
,
co
n
s
id
er
in
g
th
at
t
h
e
s
elec
ted
b
y
tes
ca
n
n
o
t
b
e
r
e
p
ea
ted
.
Fin
ally
,
th
e
r
esu
ltin
g
d
is
tan
ce
is
r
etu
r
n
ed
b
ac
k
to
th
e
SA
u
n
it.
Alg
o
r
ith
m
3
s
h
o
ws
th
e
co
m
p
lete
p
r
o
ce
s
s
o
f
v
ec
to
r
co
n
s
tr
u
ctio
n
a
n
d
d
is
tan
ce
co
m
p
u
tatio
n
.
Alg
o
r
ith
m
3
.
Ma
in
s
tep
s
o
f
S
A
v
ec
to
r
co
n
s
tr
u
ctio
n
u
n
it
Step1: Get HostFile, EncryptedFile
Step2: Set Distance=0
Step3: Set Location=Seed
Step4: Define List SecretMessageBytes[8]
Step5: If End Of EncryptedFile Then Goto Step 18
Step6: Set
SecretByte=EncryptedFile.ReadByte
(
)
Step7: Set SecretMessageBytes=FindBits(SecretByte)
Step8: Set K=0
Step9: If K>=8 Then Goto Step 17
Step10: Set Location=(Location+1) mod LengthOfHostFile
Step11: Set HostFile.Position=Location+44
Step12: Set HostByte=HostFile.ReadByte
(
)
Step13: Set HostBit=HostByte & 1
Step14: If SecretMessageBytes[K] != HostBit Then Distance=Distance+1
Step15: Set K=K+1
Step16: Goto Step 9
Step17: Goto Step 5
Step18: Return Distance
3
.
1
.
6
.
E
m
bedd
ing
unit
Af
ter
o
b
tain
in
g
th
e
en
cr
y
p
ted
s
ec
r
et
m
ess
ag
e
f
ile,
th
e
h
o
s
t
au
d
io
f
ile,
an
d
th
e
b
est
s
o
lu
tio
n
s
ee
d
,
th
e
u
n
it
s
tar
ts
th
e
task
o
f
h
i
d
in
g
.
T
h
e
em
b
e
d
d
in
g
u
n
it
u
tili
ze
s
th
e
least
s
ig
n
if
ican
t
b
it
(
L
SB
)
tech
n
iq
u
e
t
o
h
id
e
th
e
b
its
o
f
a
g
iv
en
s
ec
r
et
m
ess
ag
e
b
y
te
in
s
id
e
th
e
h
o
s
t
au
d
io
f
ile
b
y
tes.
T
h
e
L
SB
m
eth
o
d
is
b
ased
o
n
th
e
id
ea
o
f
m
in
im
al
m
o
d
if
icatio
n
im
p
ac
t
o
n
th
e
c
o
n
ten
t;
th
er
e
f
o
r
e,
it
u
s
es
th
e
r
ig
h
tm
o
s
t
b
it
o
f
ev
e
r
y
b
y
te,
an
d
th
er
ef
o
r
e
,
th
e
ch
an
g
e
is
eith
er
b
y
ze
r
o
o
r
o
n
e
v
alu
e
to
th
e
h
o
s
t
b
y
te
[
1
7
]
.
T
h
e
em
b
ed
d
in
g
u
n
it
r
ea
d
s
th
e
en
cr
y
p
te
d
s
ec
r
et
m
ess
ag
e
f
ile
b
y
te
b
y
b
y
te.
E
ac
h
b
y
te
th
at
is
r
ea
d
will
b
e
s
ep
ar
ated
in
to
its
b
its
,
an
d
th
e
n
ea
c
h
o
n
e
r
ep
lace
s
th
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
n
a
d
a
p
tive
a
u
d
io
w
a
ve
s
teg
a
n
o
g
r
a
p
h
y
u
s
in
g
s
imu
la
ted
a
n
n
ea
lin
g
a
lg
o
r
ith
m
(
A
tef
A
.
Ob
ei
d
a
t
)
2245
r
ig
h
tm
o
s
t
b
it
o
f
h
o
s
t
-
s
elec
ted
b
y
te.
Ho
s
t
b
y
tes
ar
e
ch
o
s
en
s
eq
u
en
tially
s
tar
tin
g
f
r
o
m
th
e
b
est
s
o
lu
tio
n
s
ee
d
,
tak
in
g
in
to
ac
co
u
n
t
av
o
id
in
g
h
o
s
t
f
ile
h
ea
d
e
r
d
ata.
T
h
e
p
r
o
ce
s
s
co
n
tin
u
es
in
r
ea
d
in
g
m
ess
ag
e
an
d
h
o
s
t
b
y
tes
u
n
til
th
e
en
tire
m
ess
ag
e
h
as
b
ee
n
r
ea
d
an
d
in
cl
u
d
ed
in
th
e
s
teg
o
au
d
io
f
ile.
I
n
th
e
en
d
,
th
e
r
esu
ltin
g
s
teg
o
au
d
io
f
ile
a
n
d
th
e
b
est
s
o
lu
tio
n
s
ee
d
,
wh
ich
is
u
s
ed
as
an
ex
tr
ac
tio
n
k
ey
f
o
r
th
e
h
i
d
d
en
m
ess
ag
e
ar
e
r
etu
r
n
e
d
to
th
e
in
ter
f
ac
e
.
Alg
o
r
ith
m
4
s
h
o
ws
th
e
m
ain
s
tep
s
o
f
th
e
e
m
b
ed
d
in
g
u
n
it
an
d
h
o
w
it
wo
r
k
s
to
ac
co
m
p
lis
h
its
task
.
Alg
o
r
ith
m
4
.
Ma
in
s
tep
s
o
f
e
m
b
ed
d
in
g
u
n
it
Step1: Get HostFile, EncryptedFile
Step2: Call SA Unit to get BestSeed
Step3: Set Location=BestSeed
Step4: Copy HostFile To stegoFile
Step5: Define List
SecretMessageBytes[8]
Step6: If End Of EncryptedFile Then Goto Step 21
Step7: Set SecretByte=EncryptedFile.ReadByte
(
)
Step8: Set SecretMessageBytes=FindBits(SecretByte)
Step9: Set K=0
Step10: If K>=8 Then Goto Step 20
Step11: Set Location=(Location+1) mod LengthOfHostFile
Step12: Set stegoFile.Position=Location+44
Step13: Set HostByte=stegotFile.ReadByte
(
)
Step14: Set HostByte=(HostByte & 254)
Step15: Set HostByte=HostByte+SecretMessageBytes[K]
Step16: Set K=K+1
Step17: Set stegoFile.Position=Location+44
Step18: stegotFile.WriteByte(HostByte);
Step19: Goto Step 10
Step20: Goto Step 6
Step21: Return StegoFile, BestSeed
3
.
2
.
E
x
t
r
a
ct
io
n
p
ro
ce
s
s
Af
ter
en
s
u
r
in
g
th
at
th
e
en
te
r
ed
au
d
io
f
ile
is
s
u
itab
le
f
o
r
wo
r
k
,
th
e
u
s
er
m
u
s
t e
n
ter
th
e
d
ec
r
y
p
tio
n
k
ey
,
as
well
as
th
e
ex
tr
ac
tio
n
k
ey
,
wh
er
e
t
h
o
s
e
k
ey
s
c
o
n
s
id
er
th
e
b
asic
r
eq
u
ir
em
en
ts
to
b
e
ab
le
to
ex
t
r
ac
t
th
e
m
ess
ag
e
v
ia
an
au
th
o
r
ized
u
s
er
.
T
h
e
ex
tr
ac
to
r
s
elec
ts
an
d
r
ea
d
s
(
8
)
b
y
tes
f
r
o
m
th
e
s
teg
o
f
ile
s
tar
tin
g
at
th
e
b
y
te
th
at
is
d
eter
m
in
ed
b
y
th
e
ex
tr
ac
tio
n
k
ey
,
ex
t
r
ac
ts
r
ig
h
tm
o
s
t
b
its
o
f
th
em
,
b
u
ild
s
o
n
e
b
y
te
f
r
o
m
th
o
s
e
b
its
,
s
en
d
s
th
e
r
esu
ltin
g
b
y
te
to
t
h
e
d
ec
r
y
p
tio
n
u
n
it,
a
n
d
th
e
n
r
et
u
r
n
s
th
e
r
esu
lt
to
th
e
e
x
tr
ac
tio
n
u
n
it
in
th
e
aim
to
b
e
u
tili
ze
d
in
b
u
ild
in
g
th
e
s
ig
n
atu
r
e,
e
x
ten
s
io
n
,
len
g
th
,
an
d
d
ata
o
f
th
e
s
ec
r
et
m
ess
ag
e.
T
h
e
ex
tr
ac
tio
n
u
n
it
co
n
ca
ten
ates
th
e
f
ir
s
t
th
r
ee
r
e
tu
r
n
ed
b
y
tes
in
o
r
d
er
to
b
u
ild
th
e
ch
ar
ac
ter
’
s
s
ec
r
et
m
ess
ag
e
s
ig
n
atu
r
e.
I
f
th
e
co
n
s
tr
u
cted
s
ig
n
at
u
r
e
is
n
o
t
e
q
u
iv
alen
t
t
o
th
e
“
SMF
”
letter
s
,
th
e
p
r
o
ce
s
s
as
a
wh
o
le
is
ca
n
ce
led
,
wh
ile
if
th
ey
ar
e
eq
u
iv
alen
t,
th
e
u
n
it
co
n
ti
n
u
es
to
ex
tr
ac
t
th
e
le
n
g
th
,
e
x
ten
s
io
n
,
an
d
d
ata
o
f
t
h
e
s
ec
r
e
t
m
ess
ag
e
f
r
o
m
th
e
s
am
e
f
ile.
E
m
b
ed
d
ed
d
ata
w
ith
in
th
e
s
teg
o
a
u
d
io
f
ile
is
d
iv
id
ed
in
t
o
f
o
u
r
o
r
d
e
r
ed
p
a
r
ts
,
wh
ich
ar
e
th
e
s
ig
n
atu
r
e
o
f
th
e
s
ec
r
et
m
ess
ag
e,
m
ess
ag
e
len
g
th
,
m
ess
ag
e
ex
ten
s
io
n
,
an
d
m
ess
ag
e
d
ata
as
s
h
o
wn
in
Fig
u
r
e
4
.
T
h
e
em
b
ed
d
e
d
s
ig
n
atu
r
e
o
f
th
e
m
ess
ag
e
i
s
d
is
tr
ib
u
ted
b
etw
ee
n
(
2
4
)
b
y
tes
f
r
o
m
th
e
s
teg
o
au
d
io
f
ile,
an
d
th
e
s
am
e
ap
p
lies
to
th
e
len
g
th
an
d
ex
ten
s
io
n
o
f
th
e
m
ess
ag
e
th
at
r
eq
u
ir
e
(
4
0
)
b
y
tes
f
o
r
ea
ch
o
f
th
em
.
T
h
er
ea
f
ter
,
d
eter
m
in
in
g
th
e
le
n
g
th
an
d
e
x
ten
s
io
n
o
f
th
e
m
ess
ag
e,
th
e
p
r
o
ce
s
s
o
f
ex
tr
ac
tin
g
th
e
m
ess
ag
e
d
ata
b
e
g
in
s
b
y
s
elec
tin
g
th
e
(
8
)
b
y
tes
s
eq
u
e
n
tially
s
tar
tin
g
f
r
o
m
th
e
en
d
b
y
te
o
f
th
e
m
ess
ag
e
ex
te
n
s
io
n
.
T
h
e
ex
tr
ac
ted
d
ec
r
y
p
ted
b
y
te
will
b
e
s
to
r
ed
in
th
e
s
ec
r
et
m
ess
ag
e
f
ile
th
at
i
s
cr
ea
ted
u
s
in
g
th
e
ex
tr
ac
ted
m
ess
ag
e
ex
ten
s
io
n
.
T
h
e
p
r
o
ce
s
s
o
f
r
ea
d
in
g
b
y
tes,
ex
tr
ac
tin
g
th
e
r
ig
h
tm
o
s
t
b
its
,
b
u
ild
in
g
a
b
y
te,
d
ec
r
y
p
tin
g
a
b
y
te
an
d
s
to
r
in
g
th
e
r
esu
ltin
g
b
y
te
r
e
q
u
ir
es
r
e
p
ea
tin
g
alo
n
g
th
e
r
et
r
iev
ed
m
ess
a
g
e
len
g
th
v
alu
e.
Fin
ally
,
a
f
ter
co
m
p
letin
g
all
th
e
iter
atio
n
s
,
th
e
s
ec
r
et
m
ess
ag
e
will b
e
r
etr
iev
ed
an
d
s
en
t to
th
e
in
ter
f
ac
e
as sh
o
wn
in
Fig
u
r
e
5
.
Fig
u
r
e
4
.
Size
an
d
o
r
d
er
o
f
em
b
ed
d
ed
d
ata
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
2
,
Ap
r
il
20
25
:
2
2
3
7
-
2
2
5
3
2246
Fig
u
r
e
5
.
Fra
m
ewo
r
k
o
f
ex
tr
ac
tio
n
p
r
o
ce
s
s
T
h
e
ex
tr
ac
tio
n
p
r
o
ce
s
s
u
s
es
th
e
d
ec
r
y
p
tio
n
u
n
it
in
o
r
d
er
t
o
d
ec
r
y
p
t
th
e
m
ess
ag
e
b
y
tes
th
at
wer
e
en
cr
y
p
ted
in
a
h
id
d
en
p
r
o
ce
s
s
.
I
n
th
e
in
itial
s
tate,
th
e
d
ec
r
y
p
tio
n
u
n
it
b
u
ild
s
th
e
s
h
ar
ed
d
ec
o
d
in
g
tab
le
t
h
at
m
u
s
t
b
e
co
m
m
o
n
b
etwe
en
s
en
d
er
an
d
r
ec
ei
v
er
,
wh
er
e
t
h
e
v
a
lu
es
ar
e
lim
ited
to
th
e
r
an
g
e
(
0
-
2
5
5
)
,
tak
in
g
in
to
ac
co
u
n
t
th
at
th
e
p
r
o
ce
s
s
o
f
b
u
ild
in
g
th
is
tab
le
tak
es
p
lace
o
n
ly
o
n
e
tim
e,
wh
e
n
th
is
u
n
it
is
ca
lled
f
o
r
t
h
e
f
ir
s
t
tim
e.
Af
ter
s
u
cc
ess
f
u
lly
co
m
p
letin
g
th
e
p
r
o
ce
s
s
o
f
f
illi
n
g
o
u
t
th
e
d
ec
o
d
in
g
tab
le,
it
b
ec
o
m
es
p
o
s
s
ib
le
to
d
ec
o
d
e
t
h
e
s
en
t
v
al
u
es
b
y
co
m
p
ar
in
g
th
e
s
en
t
v
alu
e
with
t
h
e
v
alu
es
s
to
r
ed
in
t
h
e
s
h
ar
ed
d
ec
o
d
i
n
g
tab
le,
an
d
th
e
in
d
ex
o
f
th
e
co
r
r
esp
o
n
d
i
n
g
v
alu
e
is
r
etu
r
n
ed
t
o
r
ep
r
esen
t
th
e
d
ec
r
y
p
ted
v
alu
e.
Alg
o
r
i
th
m
5
illu
s
tr
ates
th
e
m
ain
s
tep
s
o
f
h
o
w
a
n
en
cr
y
p
te
d
v
alu
e
will b
e
d
ec
r
y
p
te
d
.
Alg
o
r
ith
m
5
.
Ma
in
s
tep
s
o
f
d
e
cr
y
p
tin
g
a
g
iv
en
en
cr
y
p
ted
v
alu
e
Step1:
Get Decryption_Key,
EncryptedByte
Step2:
If FirstTimeCall Then Build SharedDecodingTable
Step3:
Set Index=0
Step4:
If
EncryptedByte==DecodingTable[Index] Then Goto Step 7
Step5:
Index=Index+1
Step6:
Goto Step 4
Step7:
Return Index
4.
RE
SU
L
T
S AN
D
AN
AL
Y
SI
S
T
h
e
p
r
o
p
o
s
ed
f
r
a
m
ewo
r
k
was
test
ed
an
d
ev
alu
ated
th
r
o
u
g
h
a
s
elec
ted
s
et
o
f
au
d
io
f
iles
an
d
s
ec
r
et
m
ess
ag
e
f
iles
o
f
d
if
f
er
en
t
s
iz
es
b
ec
au
s
e
th
er
e
is
n
o
s
tan
d
a
r
d
d
ata
s
et
th
at
h
as
b
ee
n
r
elie
d
u
p
o
n
i
n
p
r
ev
io
u
s
r
esear
ch
.
T
ab
le
1
d
is
p
lay
s
th
e
s
ize
o
f
d
if
f
er
en
t
s
ec
r
et
m
ess
ag
e
f
iles
(
SMF)
an
d
th
e
r
eq
u
i
r
ed
b
y
tes
f
o
r
ea
ch
f
ile;
o
n
th
e
o
th
er
h
an
d
,
T
ab
le
2
p
r
esen
ts
th
e
s
ize
o
f
d
if
f
er
en
t
h
o
s
t
wav
e
f
iles
(
HW
F)
an
d
av
ailab
le
b
y
tes
in
ea
ch
o
n
e.
I
n
o
r
d
er
to
ev
alu
ate
t
h
e
co
n
s
tr
u
cted
s
teg
an
o
g
r
ap
h
y
s
y
s
tem
,
a
s
et
o
f
co
m
m
o
n
c
r
iter
ia’
s
wer
e
u
s
ed
f
o
r
v
er
if
icatio
n
a
n
d
e
v
alu
atio
n
,
wh
ich
ar
e
r
o
b
u
s
tn
ess
,
d
et
ec
tio
n
,
im
p
e
r
ce
p
tib
ilit
y
(
p
h
o
n
o
lo
g
ical
h
ea
r
in
g
)
,
s
ec
u
r
ity
,
PS
NR
,
MSE
,
an
d
c
ap
ac
ity
[
4
]
,
[
2
4
]
,
[
2
5
]
.
I
n
te
r
m
s
o
f
r
o
b
u
s
tn
ess
,
th
e
p
r
o
p
o
s
ed
f
r
am
ewo
r
k
is
co
n
s
id
er
ed
r
o
b
u
s
t
ag
ain
s
t
d
ata
ex
tr
ac
tio
n
b
ec
a
u
s
e
th
e
ex
tr
ac
tio
n
p
r
o
ce
s
s
r
eq
u
i
r
es
k
n
o
wled
g
e
ab
o
u
t
k
ey
s
an
d
Evaluation Warning : The document was created with Spire.PDF for Python.