An Easy Method to Implement Audio Cryptography Schemes without Computing Devices Shin Yan Chiou and Chi Sung Laih Department of Electrical Engineering,

Slides:



Advertisements
Similar presentations
Sound test. Signals and waveforms What is a signal? Need not be electrical Morse Speech Video Contains information.
Advertisements

Chapter 4 - The World Was Once Analog Introduction Sound, Vibrations, And Analog Recording (phonograph record) - An analog device maintains an exact physical.
SIMS-201 Characteristics of Audio Signals Sampling of Audio Signals Introduction to Audio Information.
IT-101 Section 001 Lecture #8 Introduction to Information Technology.
L3-5c-S1 Object Diagrams © M.E. Fayad SJSU -- CmpE Software System Engineering Dr. M.E. Fayad, Professor Computer Engineering Department,
L16-S1 Object Diagrams 2003 SJSU -- CmpE Software Patterns Dr. M.E. Fayad, Professor Computer Engineering Department, Room #283I College of Engineering.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Compact State Machines for High Performance Pattern Matching Department of Computer Science and Information Engineering National Cheng Kung University,
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
1 Performance Improvement of Two-Dimensional Packet Classification by Filter Rephrasing Department of Computer Science and Information Engineering National.
What did you send me? How do we counter signal attenuation and noise?
Adaptive Playout Scheduling Using Time- scale Modification in Packet Voice Communications Yi J. Liang, Nikolaus Farber, Bernd Girod Information Systems.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
“No one can be told what the matrix is…
Chapter 26 Communication Systems. Objectives After reading the chapter and reviewing the materials presented the students will be able to: Identify common.
331: STUDY DATA COMMUNICATIONS AND NETWORKS.  1. Discuss computer networks (5 hrs)  2. Discuss data communications (15 hrs)
OpenFlow-Based Server Load Balancing GoneWild Author : Richard Wang, Dana Butnariu, Jennifer Rexford Publisher : Hot-ICE'11 Proceedings of the 11th USENIX.
Security and Protection of Information, Brno Using quasigroups for secure encoding of file system Eliška Ochodková, Václav Snášel
Chapter 10 Review: Matrix Algebra
Lecture 5: Signal Processing II EEN 112: Introduction to Electrical and Computer Engineering Professor Eric Rozier, 2/20/13.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Chapter 3: The Fundamentals: Algorithms, the Integers, and Matrices
EE 3220: Digital Communication Dr. Hassan Yousif Ahmed Department of Electrical Engineering College of Engineering at Wadi Aldwasser Slman bin Abdulaziz.
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
A 1.5-V 6-10-GHz Low LO-Power Broadband CMOS Folded-Mirror Mixer for UWB Radio H.-W. Chung, H.-C. Kuo, and H.-R. Chuang Institute of Computer and Communication.
Introduction  The fundamental passive linear circuit elements are the  resistor (R),  capacitor (C)  inductor (L).  These circuit.
Jinsong Guo Jilin University, China Background  Filtering techniques are used to remove some local inconsistencies in the search algorithms solving.
Chapter 3 Determinants Linear Algebra. Ch03_2 3.1 Introduction to Determinants Definition The determinant of a 2  2 matrix A is denoted |A| and is given.
 Parallel Deposit (bit scatter)  Deposits in the result register, at positions flagged by 1’s in r 3, the right justified bits from r 2 Yedidya Hilewitz.
Stepper Motor Info and Sourcing Guichet, Chang Feb 20, 2013.
A Fast Handoff Scheme For IP over Bluetooth Sang-Hsu Chung, Hyunsoo Yoon, and Jung-Wan Cho Department of Electrical Engineering & Computer Science Divison.
Design of PCA and SVM based face recognition system for intelligent robots Department of Electrical Engineering, Southern Taiwan University, Tainan County,
MPEG-1Standard By Alejandro Mendoza. Introduction The major goal of video compression is to represent a video source with as few bits as possible while.
ENE 428 Microwave Engineering
Adobe AuditionProject 4 guide © 2012 Adobe Systems IncorporatedOverview of Adobe Audition workspace1 Adobe Audition is an audio application designed for.
Master and PhD examples Prof. Yvo Desmedt Department of Computer Science Florida State University, USA Partially funded by NSF.
Dynamic Programming1. 2 Outline and Reading Matrix Chain-Product (§5.3.1) The General Technique (§5.3.2) 0-1 Knapsack Problem (§5.3.3)
Memory-Efficient and Scalable Virtual Routers Using FPGA Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan,
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
TFA: A Tunable Finite Automaton for Regular Expression Matching Author: Yang Xu, Junchen Jiang, Rihua Wei, Yang Song and H. Jonathan Chao Publisher: ACM/IEEE.
A Cluster Based On-demand Multi- Channel MAC Protocol for Wireless Multimedia Sensor Network Cheng Li1, Pu Wang1, Hsiao-Hwa Chen2, and Mohsen Guizani3.
Table of Contents Matrices - Definition and Notation A matrix is a rectangular array of numbers. Consider the following matrix: Matrix B has 3 rows and.
LOP_RE: Range Encoding for Low Power Packet Classification Author: Xin He, Jorgen Peddersen and Sri Parameswaran Conference : IEEE 34th Conference on Local.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
Hierarchical Hybrid Search Structure for High Performance Packet Classification Authors : O˜guzhan Erdem, Hoang Le, Viktor K. Prasanna Publisher : INFOCOM,
Hello. Hello. May I speak to…? This is … speaking. Learn to say 怎样打电话.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Designing a framework For Recommender system Based on Interactive Evolutionary Computation Date : Mar 20 Sat, 2011 Project Number :
MODUALATION Department of CE/IT. Outline Introduction Demodulation Amplitude Modulation – Advantages – disadvantage Frequency Modulation – Application.
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
Properties and Applications of Matrices
3.1 Introduction to Determinants
Matrix Representation of Graph
An Information Hiding Scheme Using Sudoku
MODULATION AND DEMODULATION
Visit for more Learning Resources
Information Steganography Using Magic Matrix
Binary Prefix Search Author: Yeim-Kuan Chang
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Information Steganography Using Magic Matrix
A Novel Secret Sharing Scheme from Audio Perspective
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
Some New Issues on Secret Sharing Schemes
Published in 2016 International Computer Symposium (ICS) Authors
Introduction to Communication Systems (CNET - 222)
An Iterative Method for Lossless Data Embedding in BMP Images
I-Chuan Chang Bor-Wen Hsu and Chi Sung Laih
Communication Theory- I Course Code:17 EC 2206 Dr. G V Subbarao Professor Department of Electronics and Communication Engineering K L University.
Presentation transcript:

An Easy Method to Implement Audio Cryptography Schemes without Computing Devices Shin Yan Chiou and Chi Sung Laih Department of Electrical Engineering, Director, Computer and Communication Network Center, National Cheng Kung University, Tainan, TAIWAN Republic Of China

2 Contents Introduction of ACS Easy Audio Cryptography Scheme Preview Works (DHQ and DLQ ACS) Preview Works (DHQ and DLQ ACS) Comparison

3 Introduction of ACS A secret sharing scheme A method to hide a message into n sounds Perceive the message by ears by playing t of the n sounds simultaneously Similar to Visual Secret Sharing Scheme but use ears instead of eyes to perceive the secret

4 Previous Works DHQ Audio Cryptography Scheme (Desmedt, Hou & Quisquater, Asiacrypt’98) DLQ Audio Cryptography Scheme (Desmedt, Le & Quisquater, Proceedings of Info Hiding’99)

5 DHQ ACS Wave based (2, 2) audio crypto scheme. In phase to be secret “1” and out of phase to be secret “0” A (2, n) scheme needs  lon 2 n  different sounds

6 A DHQ (2, 2) instance M = ( )

7 Disadvantages of DHQ ACS Low contrast when secret perceiving  lon 2 n  cover sounds are needed for (2, n) scheme Precise synchronization is needed When secret hiding, a computing device is needed

8 DLQ ACS A sort of (2, 2) ACS Nonbinary Audio, such as human speech, can be perceived. To hide the secret by embedding the preshares into a covering signal to be shares To perceive the secret by both using a mixer to eliminate the covering signal and a amplifier to amplify the message synthesized by two shares (or preshares)

9 Disadvantages of DLQ ACS  lon 2 n  cover sounds are needed for (2, n) scheme Precisely synchronization is needed When secret hiding, a special computing device is needed When secret perceiving, some special devices such as a mixer and a amplifier are needed

The proposed Easy Audio Cryptography Scheme  A (2, n) ACS

11 Definition 1: and are n  1 Matrices representing bit 0 and bit 1 respectively, where the notation  k, 1  k  n, denotes the “sound k” which is the kth sound of the given n sounds.

12 Construction: Assume the m-bit secret message M = [M 1, M 2, …, M m ] M j  {0, 1}. Let B L and B H be Matrices specified in Definition 1 and S n  m = [s ij ] = [B 1 |B 2 |…|B m ] be an n  m Matrices where Then the n shares are constructed by recording the “sound s ij ” into the jth sound of the ith share for all i and j.

13 Reconstruction: Let two shares be S i = [s i1, s i2, …, s im ] and S j = [s j1, s j2, …, s jm ] i  j. Then By playing any two of the constructed n shares simultaneously, then the kth bit would be bit 1 if the two of the kth sound of the two shares are different and would be bit 0 if they are the same.

14 Example 1 (Different Sounds) Rhythm X Rhythm Y Rhythm X+Y ……………………  …  …  … …  … …  … …     Message 0 … 1 … 0 … 1 …

15 Example 2 (General Sentences) Rhythm X Rhythm Y Hello! -- This is Linda. -- Hey! -- This is Linda. -- Rhythm X+Y Hello! -- This is Linda. – (Hey! --) (This is Linda. --) My number is Please call me. – (My number is ) (Please call me. --) Rhythm X Rhythm Y My number is Please call me. -- My number is Please call me. --  Message 1 … 0 … 1 … 0 …

16 Comparison Item Method Contrast Band Width Cover Sound n  BW Precisely Synchronize Computing Device Cost DHQ Low  lon 2 n      Yes Middle DLQ -High  lon 2 n      Yes High Proposed HighMiddle0indepNo Low  Note: n  BW: relationship between n and bandwidth IP: inverse proportion