Ye, G.: A block image encryption algorithm based on wave transmission and chaotic systems. Huang, X.: Image encryption algorithm using chaotic chebyshev generator. Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Liu, Y., Qin, Z., Liao, X., Wu, J.: Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled Sine map. Sahari, M.L., Boukemara, I.: A pseudo-random numbers generator based on a novel 3d chaotic map with an application to color image encryption. Naskar, P.K., Khan, H.N., Roy, U., Chaudhuri, A., Chaudhuri, A.: Shared cryptography with embedded session key for secret audio. Yakubu, M.A., Maddage, N.C., Atrey, P.K.: Audio secret management scheme using shamir’s secret sharing. Naskar, P.K., Khan, H.N., Roy, U., Chaudhuri, A., Chaudhuri, A.: Secret image sharing with embedded session key. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. Zhou, J., Au, O.C.: Security and efficiency analysis of progressive audio scrambling in compressed domain. Yan., W.Q., Fu, W.G., Kankanhalli, M.S.: Progressive audio scrambling in compressed domain. Xie, D., Kuo, C.-C.J.: Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream. Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by means of randomized arithmetic coding. In: IEEE International Conference on Acoustics, Speech and Signal Process. Servetti, A., Testa, C., De Martin, J.C.: Frequency-selective partial encryption of compressed audio. Servetti, A., De Martin, J.C.D.: Perception-based partial encryption of compressed speech. Peng, X., Cui, Z., Cai, L., Yu, L.: Digital audio signal encryption with a virtual optics scheme. In: International Conference on IEEE Consumer Electronics, pp. Torrubia, A., Mora, F.: Perceptual cryptography on MPEG-1 Layer III bit-streams. In: Thirty-Fourth Asilomar Conference on Signal, Systems and Computers, pp. Thorwirth, N.J., Horvatic, P., Weis, R., Zhao, J.: Security methods for MP3 music delivery. Mazurczyk, W., Szczypiorski, K.: Advances in digital media security and right management. The robustness as well as competence of this scheme is established with statistical analyses, cryptanalysis, randomness analysis and comparisons with existing schemes. It uses key space as large as \(2^\) to resist brute-force attacks. Moreover, these key blocks are derived using PWLCM from the secret key along with the preceding key block and previous encrypted block to achieve resistance against the known plain-text attack. The significant feature of this scheme is to generate distinct key blocks, which are highly sensitive to the secret key, a combination of the 64-byte external key along with the plain audio-dependent value. At first, the correlation of each audio block is reduced by the cyclic shift thereafter, these shifted blocks are ciphered with piecewise linear chaotic map (PWLCM) along with elementary cellular automata (ECA) and finally, turns up with shuffling of ciphered bytes for better diffusion. To encrypt a plain audio, the entire audio is split into different blocks of 64 bytes each and distinct key blocks are used for those audio blocks in the foregoing three phases. This paper presents a robust audio encryption scheme based on three consecutive phases, accomplished as cyclic shift followed by ciphering and wound up by shuffling, to break the high correlation amongst the neighbouring region of a plain audio.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |