1 / 16

An Easy Method to Implement Audio Cryptography Schemes without Computing Devices

An Easy Method to Implement Audio Cryptography Schemes without Computing Devices. Shin Yan Chiou and Chi Sung Laih Department of Electrical Engineering, Director, Computer and Communication Network Center, National Cheng Kung University, Tainan, TAIWAN Republic Of China. Contents.

claral
Download Presentation

An Easy Method to Implement Audio Cryptography Schemes without Computing Devices

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An Easy Method to Implement Audio Cryptography Schemes without Computing Devices Shin Yan Chiou and Chi Sung Laih Department of Electrical Engineering, Director, Computer and Communication Network Center, National Cheng Kung University, Tainan, TAIWAN Republic Of China

  2. Contents Introduction of ACS Preview Works (DHQ and DLQ ACS) EasyAudio Cryptography Scheme Comparison

  3. Introduction of ACS • A secret sharing scheme • A method to hide a message into n sounds • Perceive the message by ears by playing t of the n sounds simultaneously • Similar to Visual Secret Sharing Scheme but use ears instead of eyes to perceive the secret

  4. Previous Works • DHQ Audio Cryptography Scheme(Desmedt, Hou & Quisquater, Asiacrypt’98) • DLQ Audio Cryptography Scheme(Desmedt, Le & Quisquater, Proceedings of Info Hiding’99)

  5. DHQ ACS • Wave based(2, 2) audio crypto scheme. • In phase to be secret “1” and out of phase to be secret “0” • A (2,n)scheme needslon2ndifferent sounds

  6. A DHQ (2, 2) instance M = (0 0 1 1)

  7. Disadvantages of DHQ ACS • Low contrast when secret perceiving • lon2ncover sounds are needed for (2, n) scheme • Precise synchronization is needed • When secret hiding, a computing device is needed

  8. DLQ ACS • A sort of (2, 2) ACS • NonbinaryAudio, such as human speech, can be perceived. • To hide the secret by embedding the preshares into a covering signalto be shares • To perceive the secret by both using a mixer to eliminate the covering signal and a amplifier to amplify the message synthesized by two shares (or preshares)

  9. Disadvantages of DLQ ACS • lon2n cover sounds are needed for (2, n) scheme • Precisely synchronization is needed • When secret hiding, a special computing device is needed • When secret perceiving, some special devices such as a mixer and a amplifier are needed

  10. The proposed Easy Audio Cryptography Scheme • A (2, n) ACS

  11. Definition 1: and are n  1 Matrices representing bit 0 and bit 1 respectively, where the notation k, 1 kn, denotes the “sound k” which is the kth sound of the given n sounds.

  12. Construction: Assume the m-bit secret message M = [M1, M2, …, Mm] Mj{0, 1}. Let BL and BH be Matrices specified in Definition 1 and Snm = [sij] = [B1|B2|…|Bm] be an nm Matrices whereThen the n shares are constructed by recording the “sound sij” into the jth sound of the ith share for all i and j.

  13. Reconstruction: Let two shares be Si = [si1,si2,…, sim] and Sj = [sj1,sj2,…, sjm] i  j. Then • By playing any two of the constructed n shares simultaneously, then the kth bit would be bit 1 if the two of the kth sound of the two shares are different and would be bit 0 if they are the same.

  14. Example 1 (Different Sounds) ………… Rhythm X … ……… Rhythm Y   … …… … Rhythm X+Y   0 … 1 … 0 … 1 …  Message

  15. Rhythm X Hello! -- This is Linda. -- Rhythm Y Hey! -- This is Linda. -- Hello! -- This is Linda. –(Hey! --) (This is Linda. --) My number is 4441234. -- Please call me. –(My number is 8885678. --) (Please call me. --) Rhythm X+Y Example 2 (General Sentences) Rhythm X My number is 4441234. -- Please call me. -- Rhythm Y My number is 8885678. -- Please call me. -- 1… 0 … 1… 0 …  Message

  16. Comparison • Note: • nBW: relationship betweennand bandwidth • IP: inverse proportion

More Related