CFP last date
20 January 2025
Reseach Article

Security of Audio File based on Partial Encryption

by Sushant Jillawar, Trishala Sawant, Ajinkya Khurud, Jayashree Katti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 19
Year of Publication: 2019
Authors: Sushant Jillawar, Trishala Sawant, Ajinkya Khurud, Jayashree Katti
10.5120/ijca2019918890

Sushant Jillawar, Trishala Sawant, Ajinkya Khurud, Jayashree Katti . Security of Audio File based on Partial Encryption. International Journal of Computer Applications. 178, 19 ( Jun 2019), 1-4. DOI=10.5120/ijca2019918890

@article{ 10.5120/ijca2019918890,
author = { Sushant Jillawar, Trishala Sawant, Ajinkya Khurud, Jayashree Katti },
title = { Security of Audio File based on Partial Encryption },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2019 },
volume = { 178 },
number = { 19 },
month = { Jun },
year = { 2019 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number19/30639-2019918890/ },
doi = { 10.5120/ijca2019918890 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:50:49.954841+05:30
%A Sushant Jillawar
%A Trishala Sawant
%A Ajinkya Khurud
%A Jayashree Katti
%T Security of Audio File based on Partial Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 19
%P 1-4
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The use of multimedia data such as compressed audio urge for the need of secure transmission without compromising the audio quality. As there is a tremendous growth of digital data, the issue of security raises, which demands for developing of more advance cryptography techniques. Cryptography is a process that disarranges the information by rearranging and topping the content which makes the original content unreadable except the only person who knows the process of rearranging it. Encryption is a process of converting some data from its original form to encrypted form, practically that cannot understandable by unauthorized user. Decryption is a process of obtaining back the original data from encrypted form. In this paper more secure and fewer complex methods are studied which reduces the time complexity of encrypting and decrypting the audio file and a technique based on partial encryption is proposed where only the header of the audio file is encrypted which results in low time complexity. The techniques used are based on selective encryption, LSFR, Fast Fourier Transform, chaotic system.

References
  1. A method for encrypting and decrypting wave files. Mohamad M. Al-laham1, Mohamad a. Mai'iteh2, Hasan Rashaideh3, Ziad Al-Qadi4 1&2Department of MIS, Al-Balqa Applied University, Jordan 3&4Department of computer science, Al-Balqa Applied University, Jordan International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.4, July 2018
  2. Secure Selective Encryption of Compressed Audio by, Shine P James, Sudhish N George, Deepthi P P Department of Electronics and Communication National Institute of Technology, Calicut, Kerala, India -673601
  3. High dimensional chaos for Audio encryption by Ganesh Babu. S, Ilango. P.
  4. Encryption of an Audio File on Lower Frequency Band for Secure Communication. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
  5. Sayyad, S. N., Sutar, P. S., Pise, R. S., Raut, V. H. and Nalawade, C.V. Dual-layer Video Encryption & Decryption using RSA Algorithm, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 4, April 2017, 7661-7668.
  6. Sharma, Er. J. and Rani, J. An Efficient Hybrid Approach for Secure Speech Cryptography, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.1, January, 2017, 23-29.
  7. Dastoor, Sarosh. "Comparative Analysis of Steganographic Algorithms Intacting the Information in the Speech Signal for Enhancing the Message Security in Next Generation Mobile Devices", IEEE Xplore Digital Library, in proceedings of The World Congress on Information and Communication Technologies. Mumbai, India, 11-14 Dec.2011: pp. 279-284.
  8. Dey, Sandipan, Ajith Abraham, and SugataSanyal. "An LSB Data Hiding Technique Using Natural Numbers", in proceedings of IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIHMSP, Nov. 26-28, 2007, Kaohsiung City, Taiwan, vol.2: pp. 473-476.
  9. Antonio Servetti et al., 2003, “Frequency – selective Partial Encryption of Compressed Audio’’, Proceedings of IEEE International conference on Acoustics, Speech, and signal Processing (ICASSP’03), Vol.5, April 610, pp.68-71.
  10. Nosrati,Masoud, RonakKarimi, HamedNosrati and Ali Nosrati, "Taking a Brief Look at Steganography: Methods and Approaches", Journal of American Science, vol.7, no. 6, 2011: pp. 8488.
Index Terms

Computer Science
Information Sciences

Keywords

Audio encryption High dimensional chaos -Linear feedback shift register Division modulo circuit Key stream generator