@ARTICLE{Marszałek_Piotr_Steganography_2023, author={Marszałek, Piotr and Bilski, Piotr}, volume={vol. 69}, number={No 1}, journal={International Journal of Electronics and Telecommunications}, pages={121-126}, howpublished={online}, year={2023}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by hackers. In the following work, the publicly available software dedicated to audio steganography is examined. The aim was to provide the general operating model of the information processing in the steganographic effort. The embedding method was analyzed for each application, providing interesting insights and allowing classifying the methods. The results prove that it is possible to detect the hidden message within the specific audio file and identify the technique that was used to create it. This may be exploited further during the hacking attack detection and prevention.}, type={Article}, title={Steganography in Audio Files – COTS Software Analysis}, URL={http://ochroma.man.poznan.pl/Content/126548/PDF-MASTER/17.pdf}, doi={10.24425/ijet.2023.144340}, keywords={steganography, audio, information hiding, steganalysis, encryption, compression, cybersecurity, cyberspace, embedding, information security, privacy, signal plane, non-signal plane}, }