scispace - formally typeset
Proceedings ArticleDOI

Audio encryption and decryption algorithm in image format for secured communication

TLDR
This paper describes an algorithm of encrypting wave files in image format with a randomly generated orthogonal key decrypting them after being passed through a channel with white Gaussian noise.
Abstract
This paper describes an algorithm of encrypting wave files in image format with a randomly generated orthogonal key decrypting them after being passed through a channel with white Gaussian noise. Gaussian noise is then removed and then matrix manipulations are done, to get the original audio back. In this age of information, audio encryption can be a secure way to communicate between individuals with assurance of privacy of the data.

read more

Citations
More filters
Journal ArticleDOI

Securing e-Health application of cloud computing using hyperchaotic image encryption framework

TL;DR: In this article , a secure framework integrating e-Health and cloud using Hyper Chaos-based Image Encryption is proposed for potential implementation of security over sensitive image data transmitted over the clouds, alternatively applies any one of the proposed chaos-based image encryptions and image scrambling schemes depending on the intensity and type of attack over the images shared in the cloud environment.
Journal ArticleDOI

Blockchain-Based Messaging System for Secure and Private Communication

TL;DR: In this article , the authors proposed a blockchain-based messaging system that provides secure and private communication using double AES encryption, which utilizes the decentralized and tamper-resistant nature of the blockchain to ensure that messages are not modified or deleted by unauthorized parties.
References
More filters
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

Robust bit extraction from images

TL;DR: An algorithm for robust extraction of bits from image blocks and a method for synthesizing a Gaussian pseudo-random sequence from those bits that changes continuously with the image block yet depends sensitively on the secret key are described.
Proceedings ArticleDOI

Lossless compression of grayscale medical images : Effectiveness of traditional and state of the art approaches

TL;DR: In this article, JPEG-LS and JPEG-2000 were evaluated on a set of CT images from multiple anatomical regions, modalities, and vendors, and the results showed that the proposed scheme outperformed existing JPEG (3.04 with optimum predictor choice per image, 2.79 for previous pixel prediction as most commonly used in DICOM).
Journal ArticleDOI

Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image

TL;DR: An image steganography technique is proposed to hide audio signal in image in the transform domain using wavelet transform and it is found that the technique is robust and it can withstand the attacks.
Related Papers (5)