We have collected the most relevant information on Most General Audio Cryptography Schemes. Open the URLs, which are collected below, and you will find all the info you are interested in.


General access structures in audio cryptography | IEEE ...

    https://ieeexplore.ieee.org/abstract/document/1627018/
    The proposed "audio cryptography scheme" (ACS) is perfectly secure and easy to implement. It relies on the human auditory system for decoding. "Audio sharing schemes" (ASS) proposed earlier were based on disguising secret binary message with a cover sound. Moreover, only 2-out-of-n audio sharing schemes have ever been proposed.

CiteSeerX — General Access Structures in Audio …

    https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.1589
    The proposed “audio cryptography scheme ” (ACS) is perfectly secure and easy to implement. It relies on the human auditory system for decoding. “Audio sharing schemes ” (ASS) proposed earlier were based on disguising secret binary message with a cover sound. Moreover, only 2-out-of-n audio sharing schemes have ever been proposed.

(PDF) General access structures in audio cryptography

    https://www.researchgate.net/publication/4239695_General_access_structures_in_audio_cryptography
    Consequently, we were able to use the existing visual cryptography constructions and obtain not only k-out-of-n audio sharing schemes, but also the most general audio cryptography schemes for ...

General access structures in audio cryptography - INFONA

    https://www.infona.pl/resource/bwmeta1.element.ieee-art-000001627018
    The proposed "audio cryptography scheme" (ACS) is perfectly secure and easy to implement. It relies on the human auditory system for decoding. "Audio sharing schemes" (ASS) proposed earlier were based on disguising secret binary message with a cover sound. Moreover, only 2-out-of-n audio sharing schemes have ever been proposed.

A Review on Audio Cryptography

    https://www.erpublication.org/ijmctr/published_paper/IJMCTR031703.pdf
    provides a review on audio cryptographic techniques. Index Terms— Audio Cryptography, Audio Steganography, Cryptography, Encryption etc. I. INTRODUCTION Over the decades from Caesar cipher to RC4, a number of different encryption techniques have been purposed and implemented. However, most of the proposed techniques

Audio and Optical Cryptography - Springer

    https://link.springer.com/content/pdf/10.1007%2F3-540-49649-1_31.pdf
    as a 2-out-of-2 secret sharing scheme. The basic idea of audio cryptography is as follows. One generates the share s1 based on random coin flips b and the second share s2 based on b S, where S is the secret bit we want to hide and is the exclusive-or. It is clear from the properties of the one-time pad [13,11] that such schemes guarantee perfect secrecy.

(PDF) Audio and Optical Cryptography - ResearchGate

    https://www.researchgate.net/publication/221326955_Audio_and_Optical_Cryptography
    Audio and Optical Cryptography. October 1998. Lecture Notes in Computer Science 1514 (1514):392-404. DOI: 10.1007/3-540-49649-1_31. Source. DBLP. Conference: Advances in Cryptology - ASIACRYPT '98 ...

An audio encryption scheme based on Fast Walsh ... - …

    https://www.emerald.com/insight/content/doi/10.1016/j.aci.2019.10.001/full/html
    In [ 29 ], audio signals are sampled and its values are segmented into four levels, and then the samples are permuted using chaotic systems such as Logistic map, Tent map, Quadratic map, and Bernoulli’s map. Sheela et al. [ 30] proposed an algorithm based on two-dimensional modified Henon map (2D-MHM) and standard map.

Now you know Most General Audio Cryptography Schemes

Now that you know Most General Audio Cryptography Schemes, we suggest that you familiarize yourself with information on similar questions.