CFP last date
16 December 2024
Reseach Article

Cogent Sharing Of Covert File Using Audio Cryptographic Scheme

by P. V. Khobragade, Nilesh Uke
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 8
Year of Publication: 2012
Authors: P. V. Khobragade, Nilesh Uke
10.5120/ijais12-450199

P. V. Khobragade, Nilesh Uke . Cogent Sharing Of Covert File Using Audio Cryptographic Scheme. International Journal of Applied Information Systems. 1, 8 ( April 2012), 1-4. DOI=10.5120/ijais12-450199

@article{ 10.5120/ijais12-450199,
author = { P. V. Khobragade, Nilesh Uke },
title = { Cogent Sharing Of Covert File Using Audio Cryptographic Scheme },
journal = { International Journal of Applied Information Systems },
issue_date = { April 2012 },
volume = { 1 },
number = { 8 },
month = { April },
year = { 2012 },
issn = { 2249-0868 },
pages = { 1-4 },
numpages = {9},
url = { https://www.ijais.org/archives/volume1/number8/107-0199/ },
doi = { 10.5120/ijais12-450199 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:41:48.627679+05:30
%A P. V. Khobragade
%A Nilesh Uke
%T Cogent Sharing Of Covert File Using Audio Cryptographic Scheme
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 1
%N 8
%P 1-4
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In an audio secret sharing scheme, the shares are created by embedding the secret message into an audio file. The audio or the music file which is used to embed the given message is called cover sound. A 2-out-of-2 audio cryptography is a secret sharing scheme that can be used to hide a digital message into 2 shares and we can perceive the message by playing these 2 sounds simultaneously. In this paper a new (2, 2) audio cryptography scheme is proposed. The proposed scheme hides a digital secret message into two audio files. The original secret sound or audio file can be recovered back by playing simultaneously both the audio files.

References
  1. Menezes, A. , Oorschot, P. V. , Vanstone, S. ,"Handbook of Applied Cryptography", CRC Press, 1996
  2. G. Blakley, "Safeguarding Cryptographic Keys", in Proc. American Federation of Information Processing Societies (AFIPS) Arlington, VA, June 1979, vol. 48, pp. 313-317.
  3. Shamir, A. ,"How to share a secret", Commun. Of the ACM, 22 (11), pp. 612-613, 1979.
  4. Naor, M. , Shamir, A. , "Visual cryptography", Eurocrypt 94, Springer-Verlag LNCS Vol. 950, pp. 1-12, 1995.
  5. Y. Desmedt, S. Hou and J. Quisquater, "Audio and optical cryptography," in Advances in Cryptology-Asiacrypt'98, Springer-Verlag LNCS, pp. 392-404.
  6. Ching-Nung Yang, "Improvements on Audio and Optical Cryptography", in Journal of Information Science and Engineering, May 2002, vol. 18, Number 3, pp 381-391
  7. Lin, C. C. , Laih, C. S. , Yang, C. N. , "New Audio Secret Sharing Schemes With Time Division Technique", J. of Information Science and Engineering, 19, pp. 605-614, 2003.
  8. Socek, Daniel dan Spyros S. Magliveras. General Access Structure in Audio Cryptography. in IEEE International Conference on Electro Information Technology (EIT 2005), May 22-25, 2005, Lincoln NE, USA.
  9. Mohammad Ehdaie, Taraneh Eghlidos, Mohammad Reza Aref, "A Novel Secret Sharing Scheme from Audio Perspective "2008 IEEE International al Symposium on Telecommunications 16-19 June pp 13-18
  10. http://ccrma. standford. edu/courses/422/project/waveform
Index Terms

Computer Science
Information Sciences

Keywords

Audio Cryptography Secret Sharing Cover Sound Visual Cryptography Threshold Scheme