Cogent Sharing Of Covert File Using Audio Cryptographic Scheme

نویسندگان

  • P. V. Khobragade
  • Nilesh Uke
چکیده

In an audio secret sharing scheme, the shares are created by embedding the secret message into an audio file. The audio or the music file which is used to embed the given message is called cover sound. A 2-out-of-2 audio cryptography is a secret sharing scheme that can be used to hide a digital message into 2 shares and we can perceive the message by playing these 2 sounds simultaneously. In this paper a new (2, 2) audio cryptography scheme is proposed. The proposed scheme hides a digital secret message into two audio files. The original secret sound or audio file can be recovered back by playing simultaneously both the audio files.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

k out of n NonBinary Audio Cryptography Using Polynomial Interpolation

Audio cryptography is same like a visual cryptography. A plain data (audio file) is split into two or more shares. Each single share does not convey any meaning but when shares are combined together they will reveal the original data. In Audio cryptography the "plaintext" is an audio File. k out of n Nonbinary Audio Cryptography scheme is a special type of secret sharing scheme which is more se...

متن کامل

A Web Based Covert File System

We present the idea of a web based covert file system, CovertFS. This file system allows a user to store files covertly on media sharing websites while guaranteeing confidentiality and plausible deniability regarding the existence of the files. Further, it allows for selective and covert sharing of these files with other users. CovertFS can be built on top of any web based media sharing service...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...

متن کامل

An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices

— After 38 years of birthday Diffie-Hellman Key Exchange (DHKE), there are many proposed improvements in the DHKE protocol to encounter modern security issues. This protocol seems quite simple to be implemented; but it can be vulnerable to many types of attacks. In this work, we propose the Chained Key Exchange scheme as a case study to explore cryptographic computation capability of embedded m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012