We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Audio Data Security and Feature Extraction over Cloud

by Sayyada Fahmeeda, Amreen Tabassum
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 10
Year of Publication: 2017
Authors: Sayyada Fahmeeda, Amreen Tabassum
10.5120/ijca2017914518

Sayyada Fahmeeda, Amreen Tabassum . Audio Data Security and Feature Extraction over Cloud. International Journal of Computer Applications. 168, 10 ( Jun 2017), 33-37. DOI=10.5120/ijca2017914518

@article{ 10.5120/ijca2017914518,
author = { Sayyada Fahmeeda, Amreen Tabassum },
title = { Audio Data Security and Feature Extraction over Cloud },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 10 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number10/27913-2017914518/ },
doi = { 10.5120/ijca2017914518 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:47.753993+05:30
%A Sayyada Fahmeeda
%A Amreen Tabassum
%T Audio Data Security and Feature Extraction over Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 10
%P 33-37
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The demand for on-demand services of multimedia; most individuals, companies, and governments use cloud services to maintain confidentiality from intruder from being hacked as every day huge data was embedded in a digital media or distributed over the internet. For this reason, the user require to secure their data and encryption method is the one that provides security to your information and most security system uses this technique which is widely used in the database areas such as internet banking, audio communication channel, phone recordings, music companies, military conversations etc. A Cryptographic encryption method is certainly the best option for maintaining the security to our audio files. As the audio is encrypted it does not make sense to recognize the audio for that reason audio feature extraction method is used for classification purpose. Audio classification involves extracting representative features and feeding them into the classifier. The proposed method provides security to audio files using spread spectrum technique and LSB steganography for easy search of these files by extracting audio features using K-NN classifier.

References
  1. Alisha sikri, taruna, kirti rana,”security of digital data using combination of audio steganography and cryptography”. International Journal of Engineering Development and Research © 2016 IJEDR | Volume 4, Issue 2 | ISSN: 2321-9939.
  2. M. abukari y, pradeep k. atrey, namunu c.maddage,”secure audio reverberation over cloud”. 10th annual symposium on information assurance(asia ’15), June 2-3,2015, albany, ny Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  3. Sruthi B. Asok, P. Karthigaikumar, Sandhya R, Naveen Jarold K, N.M Siva Mangai, “a secure cryptographic scheme for audio signals”International conference on Communication and Signal Processing, April 3-5, 2013, India. 978-1-4673-4866-9/13/$31.00 © 2013 IEEE
  4. Pradeep Kumar Singh and R.K.Aggrawal,” Enhancement of LSB based Steganography for Hiding Image in Audio”, (IJCSE) International Journal on Computer Science and Engineering, ISSN : 0975-3397, Vol. 02, No. 05, 2010, 1652-1658
  5. Inas Jawad Kadhim “ A New Audio Steganography System Based on Auto-Key Generator”, Al-Khwarizmi Engineering Journal, Vol. 8, No. 1, PP 27 - 36 (2012)
  6. Harshita kapadia, Harawane sneha Haribau, Harsha patil “ audio steganography and security using cryptography”, IJCSN, volume 4, issue 2, April 2015
  7. Nisha kundu, Dr. Amadeep kaur, “A secure Approach to audio steganography” international journal of engineering trends and technology (IJETT), vol 44, No. 1, February 2017
  8. Surubhi bhansal and puneet Sharma “cascaded cryptography and audio styeganography” international journal of engineering, applied and management sciences paradigms, Vol 26, Issue 01, July 2015
  9. William W.F, Osofisan A.O, Asanbe M.O, “ A lookup XOR cryptography for high capacity least significant bit steganography” IJAIS, Vol 10- No. 7, March 2016.
  10. Xueyuan Zhang, Zhuosheng Su, Pei Lin, Qianhua He, Jichen Yang, “An Audio Feature Extraction Scheme Based on Spectral Decomposition”. 978-1-4799-3903-9/14/$31.00 © 2014 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Steganography Feature Extraction Audio Classification Cloud Security.