Skip to main content
Top

2023 | OriginalPaper | Chapter

A Novel Time-Stamp-Based Audio Encryption Scheme Using Sudoku Puzzle

Authors : Sunanda Jana, Neha Dutta, Arnab Kumar Maji, Rajat Kumar Pal

Published in: Proceedings of International Conference on Frontiers in Computing and Systems

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An innovative alternative method in the field of security that can enforce safety and security of information has been proposed here by performing audio encryption. Cryptography, a way to secure communications, allows only the sender and the intended recipient of a message to access its contents. Cryptography is derived from the Greek word “Kryptos,” meaning hidden, which is associated with content hiding by encryption. In this paper, we develop a novel time-stamp-based audio encryption method using the mind-cracking number place challenger Sudoku puzzle of higher dimension, i.e., 16 × 16 (popularly known as Super Sudoku) to add a new era in the field of security. In this work, we have developed a Super Sudoku cipher by applying time-stamp in it. Immediately after that, the extracted audio frames of the input audio files are XORed with our developed innovative Cipher to generate encrypted audio frames. Then these encoded audio frames are converted to an encrypted audio file to transmit with safety and security. At the receiver end, by applying the same cipher key, we can extract our original audio file.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sharma N, Prabhjot, Kaur H (2017) A review of information security using cryptography technique. Int J Adv Res Comput Sci 8(no. Special Issue):323–326 Sharma N, Prabhjot, Kaur H (2017) A review of information security using cryptography technique. Int J Adv Res Comput Sci 8(no. Special Issue):323–326
2.
go back to reference Jana S, Maji AK, Pal RK (2019) A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding. Innov Syst Softw Eng 15(1):65–73CrossRef Jana S, Maji AK, Pal RK (2019) A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding. Innov Syst Softw Eng 15(1):65–73CrossRef
3.
go back to reference Maji AK, Roy S, Pal RK (2014) A novel steganographic scheme using Sudoku. In: IEEE international conference on electrical information and communication technology, KUET, Khulna, Bangladesh, pp 116–121 Maji AK, Roy S, Pal RK (2014) A novel steganographic scheme using Sudoku. In: IEEE international conference on electrical information and communication technology, KUET, Khulna, Bangladesh, pp 116–121
7.
go back to reference Agarwal A, Singh PR, Katiyar S (2019) Secured audio encryption using AES algorithm. Int J Comput Appl (0975–8887) 178(22):29–33 Agarwal A, Singh PR, Katiyar S (2019) Secured audio encryption using AES algorithm. Int J Comput Appl (0975–8887) 178(22):29–33
8.
go back to reference Kahate A (2003) Cryptography and network security. Tata McGraw-Hill Education Kahate A (2003) Cryptography and network security. Tata McGraw-Hill Education
9.
go back to reference Cvejic N, Seppben T (2002) Increasing the capacity of LSB-based audio steganography. FIN90014 University of Oulu, Finland Cvejic N, Seppben T (2002) Increasing the capacity of LSB-based audio steganography. FIN90014 University of Oulu, Finland
10.
go back to reference Bassil Y (2012) A two intermediates audio steganography technique. J Emerg Trends Comput Inform Sci 3(11) Bassil Y (2012) A two intermediates audio steganography technique. J Emerg Trends Comput Inform Sci 3(11)
11.
go back to reference Ali AH, Georg LE, Mokhtar MR (2020) An adaptive high capacity model for secure audio communication based on fractal coding and uniform coefficient modulation. Circ Syst Signal Process 39:5198–5225CrossRef Ali AH, Georg LE, Mokhtar MR (2020) An adaptive high capacity model for secure audio communication based on fractal coding and uniform coefficient modulation. Circ Syst Signal Process 39:5198–5225CrossRef
12.
go back to reference Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. Int J Mod Educ Comput Sci 6:27–34CrossRef Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. Int J Mod Educ Comput Sci 6:27–34CrossRef
13.
go back to reference Saradha P, Swamy B (2012) Improving image data hiding capacity scheme using Sudoku puzzle in colour images. Int J Eng Res Appl 2(3):2741–2744 Saradha P, Swamy B (2012) Improving image data hiding capacity scheme using Sudoku puzzle in colour images. Int J Eng Res Appl 2(3):2741–2744
14.
go back to reference Wu Y, Noonan JP, Agaian S (2011) Image encryption using the rectangular Sudoku Cipher. In: International conference on system science and engineering proceedings, pp 704–709 Wu Y, Noonan JP, Agaian S (2011) Image encryption using the rectangular Sudoku Cipher. In: International conference on system science and engineering proceedings, pp 704–709
15.
go back to reference Felgenhauer B, Jarvis F (2005) Enumerating possible Sudoku grids. Math Spect (Corpus ID: 16859520), pp 1–7 Felgenhauer B, Jarvis F (2005) Enumerating possible Sudoku grids. Math Spect (Corpus ID: 16859520), pp 1–7
Metadata
Title
A Novel Time-Stamp-Based Audio Encryption Scheme Using Sudoku Puzzle
Authors
Sunanda Jana
Neha Dutta
Arnab Kumar Maji
Rajat Kumar Pal
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-0105-8_16