<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462022000100033</article-id>
<article-id pub-id-type="doi">10.13053/cys-26-1-4147</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Hiding Information through Reverse-Phase Audio Steganography Technique]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sánchez Rinza]]></surname>
<given-names><![CDATA[Bárbara Emma]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Robledo Sánchez]]></surname>
<given-names><![CDATA[Carlos I.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Jaramillo Núñez]]></surname>
<given-names><![CDATA[Alberto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Benemérita Universidad Autónoma de Puebla Facultad de Ciencias de la Computación ]]></institution>
<addr-line><![CDATA[Puebla ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Benemérita Universidad Autónoma de Puebla Facultad de Ciencias Físico matemáticas ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Instituto Nacional de Astrofísica, Óptica y Electrónica Departamento de Óptica ]]></institution>
<addr-line><![CDATA[Puebla ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2022</year>
</pub-date>
<volume>26</volume>
<numero>1</numero>
<fpage>33</fpage>
<lpage>38</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462022000100033&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462022000100033&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462022000100033&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Steganography is employed in the study and application of techniques that allow hiding messages or objects inside other imperceptible objects, called carriers. Hence, such a procedure tries to hide messages within other objects to establish a covert channel of communication, becoming the act of communication unnoticed by observers who have access to that channel. In this work steganography is used to send audio messages, covered by another audio message, using techniques of phase inversion of an audio signal.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Phase reversal]]></kwd>
<kwd lng="en"><![CDATA[steganography]]></kwd>
<kwd lng="en"><![CDATA[cryptography]]></kwd>
<kwd lng="en"><![CDATA[sinusoidal signal]]></kwd>
<kwd lng="en"><![CDATA[information security]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Varela-Velasco]]></surname>
<given-names><![CDATA[R.D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Criptografía, una necesidad moderna]]></article-title>
<source><![CDATA[Revista Digital Universitaria]]></source>
<year>2006</year>
<volume>7</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Granados-Paredes]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Introducción a la criptografía]]></article-title>
<source><![CDATA[Revista Digital Universitaria]]></source>
<year>2006</year>
<volume>7</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1067-6079</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nehru]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Dhar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A detailed look of audio steganography techniques using LSB and genetic algorithm approach]]></article-title>
<source><![CDATA[International Journal of Computer Science Issues]]></source>
<year>2012</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>402-6</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Díaz-Vico]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Esteganografía y estegoanálisis: ocultación de datos en streams de audio vorbis]]></source>
<year>2010</year>
<page-range>1-144</page-range><publisher-name><![CDATA[Facultad de Informática]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Adhiya]]></surname>
<given-names><![CDATA[K.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Patil]]></surname>
<given-names><![CDATA[S.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hiding text in audio using LSB based steganography]]></article-title>
<source><![CDATA[Information and Knowledge Management]]></source>
<year>2012</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>8-15</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Afrakhteh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Steganography based on utilizing more surrounding pixels]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Malaysia ]]></publisher-loc>
<publisher-name><![CDATA[Faculty of Computer Science and Information Systems, Universiti Teknologi]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[D.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Tsai]]></surname>
<given-names><![CDATA[W.H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A steganography method for images by pixel-value differencing]]></article-title>
<source><![CDATA[Pattern Recognition Letters]]></source>
<year>2013</year>
<volume>24</volume>
<numero>9-10</numero>
<issue>9-10</issue>
<page-range>1613-26</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Malviya]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Saxena]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Khare]]></surname>
<given-names><![CDATA[D.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Audio steganography by different method]]></article-title>
<source><![CDATA[International Journal of Emerging Technology and Advanced Engineering]]></source>
<year>2012</year>
<volume>2</volume>
<numero>7</numero>
<issue>7</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jayaram]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ranganatha]]></surname>
<given-names><![CDATA[H.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Anupama]]></surname>
<given-names><![CDATA[H.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Information hiding using audio steganography &#8211; A survey]]></article-title>
<source><![CDATA[The International Journal of Multimedia &amp; Its Applications]]></source>
<year>2011</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carvajal-Gámez]]></surname>
<given-names><![CDATA[B.E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Técnica de inserción de información en video aprovechando el mismo ancho de banda]]></source>
<year>2018</year>
<publisher-name><![CDATA[Instituto Politécnico Nacional]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez-Rinza]]></surname>
<given-names><![CDATA[B.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Morales-Salgado]]></surname>
<given-names><![CDATA[M.R.G.]]></given-names>
</name>
<name>
<surname><![CDATA[Cortez-Olguín]]></surname>
<given-names><![CDATA[C.O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security system for sending information containing hidden voice data by steganography (SIOVE) using MatLab]]></article-title>
<source><![CDATA[International Journal of Engineering and Innovative Technology]]></source>
<year>2015</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
