Cogent Sharing Of Covert File Using Audio Cryptographic Scheme
نویسندگان
چکیده
In an audio secret sharing scheme, the shares are created by embedding the secret message into an audio file. The audio or the music file which is used to embed the given message is called cover sound. A 2-out-of-2 audio cryptography is a secret sharing scheme that can be used to hide a digital message into 2 shares and we can perceive the message by playing these 2 sounds simultaneously. In this paper a new (2, 2) audio cryptography scheme is proposed. The proposed scheme hides a digital secret message into two audio files. The original secret sound or audio file can be recovered back by playing simultaneously both the audio files.
منابع مشابه
k out of n NonBinary Audio Cryptography Using Polynomial Interpolation
Audio cryptography is same like a visual cryptography. A plain data (audio file) is split into two or more shares. Each single share does not convey any meaning but when shares are combined together they will reveal the original data. In Audio cryptography the "plaintext" is an audio File. k out of n Nonbinary Audio Cryptography scheme is a special type of secret sharing scheme which is more se...
متن کاملA Web Based Covert File System
We present the idea of a web based covert file system, CovertFS. This file system allows a user to store files covertly on media sharing websites while guaranteeing confidentiality and plausible deniability regarding the existence of the files. Further, it allows for selective and covert sharing of these files with other users. CovertFS can be built on top of any web based media sharing service...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملA Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کاملAn Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices
— After 38 years of birthday Diffie-Hellman Key Exchange (DHKE), there are many proposed improvements in the DHKE protocol to encounter modern security issues. This protocol seems quite simple to be implemented; but it can be vulnerable to many types of attacks. In this work, we propose the Chained Key Exchange scheme as a case study to explore cryptographic computation capability of embedded m...
متن کامل