Skip to main content
Top
Published in: Soft Computing 7/2022

28-02-2022 | Application of soft computing

MLPD: a multi-layer protection with deduplication technique to preserve audio file transmission over the public domain

Authors: K. Venkatesh, D. Narasimhan

Published in: Soft Computing | Issue 7/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Sharing confidential voice-based messages over a public network or shared drive is quite challenging. There are some sensitive and highly confidential messages preferred to share through a voice message. The audio cryptography technique is the preferred way to transfer the content over a network. The proposed methodology multi-layer protection with deduplication (MLPD) enhance the security of voice messages by converting voice as an array of numeric values (Matrix) and applying multiple protection layers like (shuffling, transpose, and byte swap) and doing the reverse process in the receiver end with the help of the digital signature metadata file. Meanwhile, sharing the same message over a shared environment is another challenge. The encrypted redundant voice messages may flood the shared environment. The proposed model acknowledges the quality of encryption over voice data. The uniqueness of the proposed work is the performance of deduplication operation over the encrypted messages without any hashing techniques. The results show that MLPD outperforms advanced encryption standard and Fernet algorithms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abdulrazzaq ST, Siddeq MM, Rodrigues MA (2020) A novel steganography approach for audio files. SN Comput Sci 1:97CrossRef Abdulrazzaq ST, Siddeq MM, Rodrigues MA (2020) A novel steganography approach for audio files. SN Comput Sci 1:97CrossRef
go back to reference Alhaddad MJ, Alkinani MH, Atoum MS, Alarood AA (2020) Evolutionary detection accuracy of secret data in audio steganography for securing 5G-enabled internet of things. Symmetry 12(12):2071CrossRef Alhaddad MJ, Alkinani MH, Atoum MS, Alarood AA (2020) Evolutionary detection accuracy of secret data in audio steganography for securing 5G-enabled internet of things. Symmetry 12(12):2071CrossRef
go back to reference AlSabhany AA, Ali AH, Ridzuan F, Azni AH, Mokhtar MR (2020) Digital audio steganography: systematic review, classification, and analysis of the current state of the art. Comput Sci Rev 38:100316CrossRef AlSabhany AA, Ali AH, Ridzuan F, Azni AH, Mokhtar MR (2020) Digital audio steganography: systematic review, classification, and analysis of the current state of the art. Comput Sci Rev 38:100316CrossRef
go back to reference Alsabhany AA, Farida R, Azni AH (2020) The progressive multilevel embedding method for audio steganography. In: Journal of physics: conference series, vol 1551, no 1. IOP Publishing Alsabhany AA, Farida R, Azni AH (2020) The progressive multilevel embedding method for audio steganography. In: Journal of physics: conference series, vol 1551, no 1. IOP Publishing
go back to reference Balgurgi PP, Jagtap SK (2013) Audio steganography used for secure data transmission. In: Kumar MA, Kumar T (eds) Proceedings of international conference on advances in computing. advances in intelligent systems and computing, vol 174 Balgurgi PP, Jagtap SK (2013) Audio steganography used for secure data transmission. In: Kumar MA, Kumar T (eds) Proceedings of international conference on advances in computing. advances in intelligent systems and computing, vol 174
go back to reference Bandi S, Manjunatha Reddy HS (2019) Combined Audio steganography and AES encryption to hide the text and image into audio using DCT. Int J Recent Technol Eng 8(3):1732–1738 Bandi S, Manjunatha Reddy HS (2019) Combined Audio steganography and AES encryption to hide the text and image into audio using DCT. Int J Recent Technol Eng 8(3):1732–1738
go back to reference Deng Z, Tan X, Chen S (2018) An encrypted file deduplication scheme with permission in cloud storage. Hindaw, Article ID 6091807 2018 Deng Z, Tan X, Chen S (2018) An encrypted file deduplication scheme with permission in cloud storage. Hindaw, Article ID 6091807 2018
go back to reference Djebbar F, Ayad B, Meraim KA et al (2012) Comparative study of digital audio steganography techniques. J Audio Speech Music Proc 2012:25CrossRef Djebbar F, Ayad B, Meraim KA et al (2012) Comparative study of digital audio steganography techniques. J Audio Speech Music Proc 2012:25CrossRef
go back to reference Esther D, Vasanthi NA (2017) LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. Springer, New York Esther D, Vasanthi NA (2017) LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. Springer, New York
go back to reference Jagadish, Suvarna N (2015) A hybrid cloud approach for secure authorized deduplication. Int J Sci Res (IJSR) 4(8) Jagadish, Suvarna N (2015) A hybrid cloud approach for secure authorized deduplication. Int J Sci Res (IJSR) 4(8)
go back to reference Kar DC, Mulkey CJ (2015) A multi-threshold based audio steganography scheme. J Inf Secur Appl 23(1):54–67 Kar DC, Mulkey CJ (2015) A multi-threshold based audio steganography scheme. J Inf Secur Appl 23(1):54–67
go back to reference Kaur N, Behal S (2014) Audio steganography techniques-a survey. Int J Eng Res Appl 4(6):94–100 Kaur N, Behal S (2014) Audio steganography techniques-a survey. Int J Eng Res Appl 4(6):94–100
go back to reference Kundu N, Kaur A (2017) Experimental study on properties of concrete by using ceramic materials. Int J Eng Trends Technol (IJETT) 44(1):1–7CrossRef Kundu N, Kaur A (2017) Experimental study on properties of concrete by using ceramic materials. Int J Eng Trends Technol (IJETT) 44(1):1–7CrossRef
go back to reference Purnamasari DN, Ramadhani AD (2020) An improved AES key generation in audio steganography.In: Journal of physics: conference series, vol 1569, no. 2. IOP Publishing Purnamasari DN, Ramadhani AD (2020) An improved AES key generation in audio steganography.In: Journal of physics: conference series, vol 1569, no. 2. IOP Publishing
go back to reference Singh P (2016) A comparative study of audio steganography techniques. Int Res J Eng Technol (IRJET) 3(4):580–585 Singh P (2016) A comparative study of audio steganography techniques. Int Res J Eng Technol (IRJET) 3(4):580–585
go back to reference Singh K, Jain P (2020) Hiding secured text data in audio signals using 3-LSB technique. Int J Adv Res Ideas Innov Technol 6(1):220–223 Singh K, Jain P (2020) Hiding secured text data in audio signals using 3-LSB technique. Int J Adv Res Ideas Innov Technol 6(1):220–223
go back to reference Tanwar R, Singh K, Zamani M, Verma A, Kumar P (2019) An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer. J Comput Netw Commun 2019:1–10CrossRef Tanwar R, Singh K, Zamani M, Verma A, Kumar P (2019) An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer. J Comput Netw Commun 2019:1–10CrossRef
go back to reference Varalakshmi R (2020) Digital steganography for preventing cybercrime using artificial intelligence technology. J Crit Rev 7(6):749–753 Varalakshmi R (2020) Digital steganography for preventing cybercrime using artificial intelligence technology. J Crit Rev 7(6):749–753
go back to reference Venkatesh K, Narasimhan D Revealing the novel precise subset identification and deduplication of audio substance over the shared public environment. J Supercomput. Accept Venkatesh K, Narasimhan D Revealing the novel precise subset identification and deduplication of audio substance over the shared public environment. J Supercomput. Accept
go back to reference Venkatesh K, Narasimhan D, Bala Krishnan R (2019) Accelerated service oriented architecture implementation of deduplication principle. Int J Innov Technol Explor Eng (IJITEE) 8(11):3218–3222CrossRef Venkatesh K, Narasimhan D, Bala Krishnan R (2019) Accelerated service oriented architecture implementation of deduplication principle. Int J Innov Technol Explor Eng (IJITEE) 8(11):3218–3222CrossRef
go back to reference Verma M, Singh Saini H (2019) Analysis of various techniques for audio steganography in data security. Int J Sci Res Netw Secur Commun 7(2):1–5 Verma M, Singh Saini H (2019) Analysis of various techniques for audio steganography in data security. Int J Sci Res Netw Secur Commun 7(2):1–5
go back to reference Wagh SK, Upadhyay G, Bakan U, Shinde N, Nimbalkar S (2020) Cryptography and steganography techniques in video. Int J Recent Technol Eng 9(2):1044–1048 Wagh SK, Upadhyay G, Bakan U, Shinde N, Nimbalkar S (2020) Cryptography and steganography techniques in video. Int J Recent Technol Eng 9(2):1044–1048
Metadata
Title
MLPD: a multi-layer protection with deduplication technique to preserve audio file transmission over the public domain
Authors
K. Venkatesh
D. Narasimhan
Publication date
28-02-2022
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 7/2022
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-022-06801-w

Other articles of this Issue 7/2022

Soft Computing 7/2022 Go to the issue

Soft computing in decision making and in modeling in economics

Tourism demand forecasting using stacking ensemble model with adaptive fuzzy combiner

Premium Partner