Visual Symmetric Speech Cryptography

Main Article Content

Sanket Ashwinbhai Shah
Jainam Ashwinbhai Shah

Abstract

Today Communication is mainly depends upon digital data communication.  Data is sent across internet using sequence of bits. Data integrity is major issue in such a communication. To preserve data integrity of the message sent over the internet various method of cryptography is used. Though there are two types of algorithm for encryption namely symmetric [1] and asymmetric [1], This paper is mainly concern with digital symmetric cryptography using image to replace some bits and at the receiver side this encrypted message is decrypted at the receiver side For Encryption block cipher mode [2] is used which is data is encrypted in blocks rather than individual bits. Digital encryption of data is the approach, in which the original data, say x, is first digitized into a sequence of bits, x (k) which are then embedded digitally with the chosen segments of the image file, y (k) before transmission. For this, we have utilized the MATLAB (Matrix-Laboratory) which is a multi-paradigm numerical computing environment and fourth generation programming language. Encryption is a much stronger method of protecting speech communications than any form of scrambling.  The ability to securely store and transfer sensitive information has proved to be a critical factor of success in today's day and age. The secrecy as well as integrity of data during storage and transmission has been the motivating factor for us in the build up to this paper.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

W Diffie, M Hellman .New Directions in cryptography. IEEE Transactions on Information Theory,IT-22:644-654,1976

Tang Songsheng, Ma Xianzhen, “Research of Typical block cipher algorithmâ€, IEEE national conference,

vol. 1, pp. 319-321, Aug. 2010.

Bart Preneel “Cryptographic Hash Functions: Theory and Practices†Springer INDOCRYPT vol. 6498, pp. 115-117, 2010,

Stallings. William, “Cryptography and network security Principles and Practice Second Edition [M]â€, Beijing: Publishing House of Electronics Industry, 2004.

M. Rajeswara Rao, R.K. Sharma, “FPGA implementation of combined AES-128â€, Computing Communication and Networking Technologies(ICCCNT) 2017 8th International Conference on, pp-1-6 , May 2017

Like Zhang, Sheng Liu.†Secret Telephone Technology based on information Hiding and Encryptionâ€, presented at IEEE International conference on information Acquisition,

Weihai, China, Aug. 2003

Pahlavan Tafti A.,Janosepah S.(2011) Digital Images Encryption in Frequency Domain Based on DCT and One Dimensional Cellular Automata. In: Abd Manaf A, Zeki A., Zamani M., Chuprat S.,EI-Qawasmeh E.(eds) Informatics Engineering and Information Science, ICIEIS, 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg.

A. Kulkarni, Sheetal & B. Patil, Shubhangi, “A Robust encryption method for speech data hiding in digital images for optimized securityâ€,Presented at International Conference on Pervasive Computing(ICPC), January, 2015

Bradley, “Programming for Engineersâ€, [Online] Available:

https://www.springer.com/in/book/9783652233029

Konstantin Melikhov, Feng Tian,Jie Qiu,Quan Chen, Hock Soon Seah., “DBSC-Based Grayscale Line Image Vectorization.â€, Journal Of computer science and technology, Volume 1,Issue 2, pp 244-248, , Springer March 2006.