scispace - formally typeset
Book ChapterDOI

A Novel Time-Stamp-Based Audio Encryption Scheme Using Sudoku Puzzle

Reads0
Chats0
TLDR
In this article , a time-stamp-based audio encryption method using the mind-cracking number place challenger Sudoku puzzle of higher dimension, i.e., 16 × 16 (popularly known as Super Sudoku) was proposed.
Abstract
An innovative alternative method in the field of security that can enforce safety and security of information has been proposed here by performing audio encryption. Cryptography, a way to secure communications, allows only the sender and the intended recipient of a message to access its contents. Cryptography is derived from the Greek word “Kryptos,” meaning hidden, which is associated with content hiding by encryption. In this paper, we develop a novel time-stamp-based audio encryption method using the mind-cracking number place challenger Sudoku puzzle of higher dimension, i.e., 16 × 16 (popularly known as Super Sudoku) to add a new era in the field of security. In this work, we have developed a Super Sudoku cipher by applying time-stamp in it. Immediately after that, the extracted audio frames of the input audio files are XORed with our developed innovative Cipher to generate encrypted audio frames. Then these encoded audio frames are converted to an encrypted audio file to transmit with safety and security. At the receiver end, by applying the same cipher key, we can extract our original audio file.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Design and Analysis of a Modified 3D Sudoku Solver

- 01 Jan 2023 - 
TL;DR: In this article , the authors have proposed two different solvers for solving 3D Sudoku puzzles of size 9×9×9 and 9 × 9×10×10, respectively.
Journal ArticleDOI

Multimedia Security Using Encryption: A Survey

- 01 Jan 2023 - 
TL;DR: In this article , the state of secure and privacy-preserving encryption schemes applicable to digital multimedia, such as digital images, digital video, and digital audio, are reviewed. But, the authors focus on the security aspects of multimedia encryption.
References
More filters
Journal ArticleDOI

Information Hiding Using Least Significant Bit Steganography and Cryptography

TL;DR: The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used in stead of RSA algorithm.
Proceedings ArticleDOI

A novel steganographic scheme using Sudoku

TL;DR: A Steganographic scheme using Sudoku puzzle so that nobody could be able to modify the cover image during transmission as well as the message is embedded using a Sudoku reference matrix.
Proceedings ArticleDOI

Image encryption using the rectangular Sudoku cipher

TL;DR: A new block cipher using the rectangular Sudoku matrix is presented, which eliminates the size limitation of the standard Sudoku cipher and combines advantages of both the transform-based and chaos-based encryption methods.
Journal ArticleDOI

An Adaptive High Capacity Model for Secure Audio Communication Based on Fractal Coding and Uniform Coefficient Modulation

TL;DR: The proposed high-capacity audio steganography model based on fractal coding and uniform coefficient modulation, which will be called as HASFC, that simultaneously adjusts the data hiding requirements by increasing the hiding capacity while maintaining the transparency and robustness is proposed.
Journal ArticleDOI

Secured Audio Encryption using AES Algorithm

TL;DR: A voice encryption system is developed as a real-time software application where the speech is taken as an input and is encoded to be decoded by authenticated users only, using the AES algorithm to form cipher text.
Related Papers (5)