Proceedings ArticleDOI
Audio encryption and decryption algorithm in image format for secured communication
TLDR
This paper describes an algorithm of encrypting wave files in image format with a randomly generated orthogonal key decrypting them after being passed through a channel with white Gaussian noise.Abstract:
This paper describes an algorithm of encrypting wave files in image format with a randomly generated orthogonal key decrypting them after being passed through a channel with white Gaussian noise. Gaussian noise is then removed and then matrix manipulations are done, to get the original audio back. In this age of information, audio encryption can be a secure way to communicate between individuals with assurance of privacy of the data.read more
Citations
More filters
Journal ArticleDOI
Securing e-Health application of cloud computing using hyperchaotic image encryption framework
Anandkumar R,Ahmed J. Obaid,Praveen Kumar Malik,Rohit Sharma,Ankur Dumka,Rajesh Singh,Satish Khatak +6 more
TL;DR: In this article , a secure framework integrating e-Health and cloud using Hyper Chaos-based Image Encryption is proposed for potential implementation of security over sensitive image data transmitted over the clouds, alternatively applies any one of the proposed chaos-based image encryptions and image scrambling schemes depending on the intensity and type of attack over the images shared in the cloud environment.
Journal ArticleDOI
Blockchain-Based Messaging System for Secure and Private Communication
TL;DR: In this article , the authors proposed a blockchain-based messaging system that provides secure and private communication using double AES encryption, which utilizes the decentralized and tamper-resistant nature of the blockchain to ensure that messages are not modified or deleted by unauthorized parties.
References
More filters
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
Robust bit extraction from images
TL;DR: An algorithm for robust extraction of bits from image blocks and a method for synthesizing a Gaussian pseudo-random sequence from those bits that changes continuously with the image block yet depends sensitively on the secret key are described.
Proceedings ArticleDOI
Lossless compression of grayscale medical images : Effectiveness of traditional and state of the art approaches
TL;DR: In this article, JPEG-LS and JPEG-2000 were evaluated on a set of CT images from multiple anatomical regions, modalities, and vendors, and the results showed that the proposed scheme outperformed existing JPEG (3.04 with optimum predictor choice per image, 2.79 for previous pixel prediction as most commonly used in DICOM).
Journal ArticleDOI
Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image
TL;DR: An image steganography technique is proposed to hide audio signal in image in the transform domain using wavelet transform and it is found that the technique is robust and it can withstand the attacks.