EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 8

Cogent Sharing Of Covert File Using Audio Cryptographic Scheme

journal image
 Download
1265
  • P. V. Khobragade and Nilesh Uke 2012. Cogent Sharing Of Covert File Using Audio Cryptographic Scheme. International Journal of Applied Information Systems. 1, 8 (April 2012), 1-4. DOI=http://dx.doi.org/10.5120/ijais450199
  • @article{10.5120/ijais2017451568,
    author = {P. V. Khobragade and Nilesh Uke},
    title = {Cogent Sharing Of Covert File Using Audio Cryptographic Scheme},
    journal = {International Journal of Applied Information Systems},
    issue_date = {April 2012},
    volume = {1},
    number = {},
    month = {April},
    year = {2012},
    issn = {},
    pages = {1-4},
    numpages = {},
    url = {/archives/volume1/number8/107-0199},
    doi = { 10.5120/ijais12-450199},
    publisher = { xA9 2010 by IJAIS Journal},
    address = {}
    }
    
  • %1 450199
    %A P. V. Khobragade
    %A Nilesh Uke
    %T Cogent Sharing Of Covert File Using Audio Cryptographic Scheme
    %J International Journal of Applied Information Systems
    %@ 
    %V 1
    %N 
    %P 1-4
    %D 2012
    %I  xA9 2010 by IJAIS Journal
    

Abstract

In an audio secret sharing scheme, the shares are created by embedding the secret message into an audio file. The audio or the music file which is used to embed the given message is called cover sound. A 2-out-of-2 audio cryptography is a secret sharing scheme that can be used to hide a digital message into 2 shares and we can perceive the message by playing these 2 sounds simultaneously. In this paper a new (2, 2) audio cryptography scheme is proposed. The proposed scheme hides a digital secret message into two audio files. The original secret sound or audio file can be recovered back by playing simultaneously both the audio files.

References

  1. Menezes, A. , Oorschot, P. V. , Vanstone, S. ,"Handbook of Applied Cryptography", CRC Press, 1996
  2. G. Blakley, "Safeguarding Cryptographic Keys", in Proc. American Federation of Information Processing Societies (AFIPS) Arlington, VA, June 1979, vol. 48, pp. 313-317.
  3. Shamir, A. ,"How to share a secret", Commun. Of the ACM, 22 (11), pp. 612-613, 1979.
  4. Naor, M. , Shamir, A. , "Visual cryptography", Eurocrypt 94, Springer-Verlag LNCS Vol. 950, pp. 1-12, 1995.
  5. Y. Desmedt, S. Hou and J. Quisquater, "Audio and optical cryptography," in Advances in Cryptology-Asiacrypt'98, Springer-Verlag LNCS, pp. 392-404.
  6. Ching-Nung Yang, "Improvements on Audio and Optical Cryptography", in Journal of Information Science and Engineering, May 2002, vol. 18, Number 3, pp 381-391
  7. Lin, C. C. , Laih, C. S. , Yang, C. N. , "New Audio Secret Sharing Schemes With Time Division Technique", J. of Information Science and Engineering, 19, pp. 605-614, 2003.
  8. Socek, Daniel dan Spyros S. Magliveras. General Access Structure in Audio Cryptography. in IEEE International Conference on Electro Information Technology (EIT 2005), May 22-25, 2005, Lincoln NE, USA.
  9. Mohammad Ehdaie, Taraneh Eghlidos, Mohammad Reza Aref, "A Novel Secret Sharing Scheme from Audio Perspective "2008 IEEE International al Symposium on Telecommunications 16-19 June pp 13-18
  10. http://ccrma. standford. edu/courses/422/project/waveform

Keywords

Audio Cryptography, Secret Sharing, Cover Sound, Visual Cryptography, Threshold Scheme

Index Terms

Computer Science
Information Sciences