Survey of Various Encryption Techniques for Audio Data
نویسنده
چکیده
The growth rate of the internet exceeds day by day. With the fast growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a major role in the field of network security. There are many encryption techniques available currently to secure the data. In this review paper we will have an overview of encryption techniques. This paper mainly focuses on encryption techniques for audio data. This presents a study and comparison of basic symmetric encryption standards and a literature survey encryption technique that have been used for encryption on audio data. Finally this suggests a more secure algorithm for audio encryption.
منابع مشابه
A Survey for Performance Analysis Various Cryptography Techniques Digital Contents
In the recent years, with the development of network and multimedia technology, multimedia data, especially image, audio and video data, is used more and more widely in human society. Some multimedia data, including entertainment, politics, economics, militaries, industries, education etc, are necessary to be protected by providing confidentiality, integrity, and ownership or identity. In this ...
متن کاملA Survey Report on Video Encryption and Decryption Techniques
With the increase in the development of multimedia technologies, the multimedia data are transmitted in the various fields like commercial, video conferencing, medical and military fields, which generally include some sensitive data. Hence there is a great demand for transmission technique. Cryptography is becoming most popular for communication any type of sensitive data. There are various enc...
متن کاملCipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملA Survey of Information Hiding Techniques
To protect your secret information from the intruders it is necessary to convert information into unidentified form. So it is impossible to get your original information for intruders. So security is most challenging aspects for all users who want to share their secret information. With the wild growth of internet and the fast communication techniques in recent years the security and the confid...
متن کاملA Survey on Various Attribute based Public Key Cryptography
A Public Key Encryption is a technique of encrypting the message using public keys so that the message is secure against various attacks. A Keyword based Public Key Encryption is a new way of providing security against various attacks. Although there are various keyword searches based public key encryption techniques are implemented. Here in this paper a survey of all the techniques based on Ke...
متن کامل