CFP last date
20 January 2025
Reseach Article

Secured Audio Encryption using AES Algorithm

by Aishwarya Agarwal, Pratibha Raj Singh, Sandhya Katiyar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 22
Year of Publication: 2019
Authors: Aishwarya Agarwal, Pratibha Raj Singh, Sandhya Katiyar
10.5120/ijca2019918972

Aishwarya Agarwal, Pratibha Raj Singh, Sandhya Katiyar . Secured Audio Encryption using AES Algorithm. International Journal of Computer Applications. 178, 22 ( Jun 2019), 29-33. DOI=10.5120/ijca2019918972

@article{ 10.5120/ijca2019918972,
author = { Aishwarya Agarwal, Pratibha Raj Singh, Sandhya Katiyar },
title = { Secured Audio Encryption using AES Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2019 },
volume = { 178 },
number = { 22 },
month = { Jun },
year = { 2019 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number22/30669-2019918972/ },
doi = { 10.5120/ijca2019918972 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:51:09.675022+05:30
%A Aishwarya Agarwal
%A Pratibha Raj Singh
%A Sandhya Katiyar
%T Secured Audio Encryption using AES Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 22
%P 29-33
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Speech to text conversion is the process of converting spoken words into written texts. In this paper, a voice encryption system is developed as a real-time software application. Basically, the speech is taken as an input and is encoded to be decoded by authenticated users only. The algorithm used to perform this cryptography is Advanced Encryption Standards (AES). This algorithm has its own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software all over the world. We take the information in the form of audio as an input using a microphone which is to be transmitted over the channel to the intended receiver. The audio input is converted into text format which ensures speech-to-text conversion. Then, the text is encrypted using the AES algorithm to form cipher text. This cipher text is sent over a channel to the receiver. The receiver requests to perform decryption of the information only if he has the correct secret key otherwise the request is declined. If the key matches, the decryption is successful and the receiver get the message as text. For 128 bit, about 2128 attempts are needed to break. This makes it very difficult to hack it as a result it is very safe protocol.

References
  1. Sanjib Das, “Speech Recognition Technique: A Review”, International Journal of Engineering Research and Applications” (IJERA) ISSN: 2248-9622 Vol. 2, Issue 3, May-Jun 2012.
  2. Ms. Sneha K. Upadhyay,Mr. Vijay N. Chavda, “Intelligent system based on speech recognition with capability of self-learning”, International Journal For Technological Research In Engineering ISSN (Online): 2347 - 4718 Volume 1, Issue 9, May-2014.
  3. Deepa V.Jose, Alfateh Mustafa, Sharan R, “A Novel Model for Speech to Text Conversion” International Refereed Journal of Engineering and Science (IRJES)ISSN (Online) 2319-183X, Volume 3, Issue 1 (January 2014).
  4. B. Raghavendhar Reddy, E. Mahender, “Speech to Text Conversion using Android Platform”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622,Vol. 3, Issue 1, January -February 2013.
  5. Kaveri Kamble, Ramesh Kagalkar, “A Review: Translation of Text to Speech Conversion for Hindi Language”, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064.Volume 3 Issue 11, November 2014.
  6. Santosh K.Gaikwad,Bharti W.Gawali,Pravin Yannawar, “A Review on Speech Recognition Technique”,International Journal of Computer Applications (0975 – 8887)Volume 10– No.3, November 2010.
  7. Penagarikano, M. Bordel, G., “Speech-to-text translation by a non-word lexical unit based system,"Signal Processing and Its Applications, 1999. ISSPA '99. Proceedings of the Fifth International Symposium on, vol.1, no., pp.111,114 vol.1, 1999
  8. Olabe, J. C.; Santos, A.; Martinez, R.; Munoz, E.; Martinez, M.; Quilis, A.; Bernstein, J., “Real time text-to-speech conversion system for spanish," Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP '84. vol.9, no., pp.85,87, Mar 1984.
  9. Kavaler, R. et al., “A Dynamic Time Warp Integrated Circuit for a 1000-Word Recognition System”, IEEE Journal of Solid-State Circuits, vol SC-22, NO 1, February 1987, pp 3-14.
  10. Aggarwal, R. K. and Dave, M., “Acoustic modelling problem for automatic speech recognition system: advances and refinements (Part II)”, International Journal of Speech Technology (2011) 14:309–320.
  11. Ostendorf, M., Digalakis, V., & Kimball, O. A. (1996). “From HMM’s to segment models: a unified view of stochastic modeling for speech recognition”. IEEE Transactions on Speech and Audio Processing, 4(5), 360– 378.
  12. Yasuhisa Fujii, Y., Yamamoto, K., Nakagawa, S., “AUTOMATIC SPEECH RECOGNITION USING HIDDEN CONDITIONAL NEURAL FIELDS”, ICASSP 2011: P-5036-5039.
  13. Mohamed, A. R., Dahl, G. E., and Hinton, G., “Acoustic Modelling using Deep Belief Networks”, submitted to IEEE TRANS. On audio, speech, and language processing, 2010. Sorensen, J., and Allauzen, C., “Unary data structures for Language Models”, INTERSPEECH 2011.
  14. Sura F. Yousif. Encryption and Decryption of Audio Signal based on RSA Algorithm. Vol 5, July 2018.
  15. Abhishek Kumar Sinha, IIJayaraj N “Encryption and Decryption Using AES in the Field of Network Communication based on Confidentiality”, Jan-March, 2015.
  16. Edward C. Lin, Kai Yu, Rob A. Rutenbar and Tsuhan Chen “A 1000-Word Vocabulary, Speaker-Independent, Continuous Live-Mode Speech Recognizer Implemented in a Single FPGA”, 2007.
  17. Santosh K. Gaikwad, Bharti W. Gawali and Pravin Yannawar “A Review on Speech Recognition Technique”, 2010 submitted to International Journal of Computer Application.
  18. Muhammad Faheem Mushtaq, Sapiee Jamel, Abdulkadir Hassan Disina, Zahraddeen A. Pindar, Nur Shafinaz Ahmad Shakir, Mustafa Mat Deris “A Survey on the Cryptographic Encryption Algorithms” published in IJACSA (International Journal of Advanced Computer Science and Applications) in 2017.
Index Terms

Computer Science
Information Sciences

Keywords

Speech-to-text (STT)