CFP last date
20 June 2024
Reseach Article

A Study on Current Scenario of Audio Encryption

by Rashmi A. Gandhi, Atul M. Gosai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 7
Year of Publication: 2015
Authors: Rashmi A. Gandhi, Atul M. Gosai
10.5120/20347-2533

Rashmi A. Gandhi, Atul M. Gosai . A Study on Current Scenario of Audio Encryption. International Journal of Computer Applications. 116, 7 ( April 2015), 13-17. DOI=10.5120/20347-2533

@article{ 10.5120/20347-2533,
author = { Rashmi A. Gandhi, Atul M. Gosai },
title = { A Study on Current Scenario of Audio Encryption },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 7 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number7/20347-2533/ },
doi = { 10.5120/20347-2533 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:26.436694+05:30
%A Rashmi A. Gandhi
%A Atul M. Gosai
%T A Study on Current Scenario of Audio Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 7
%P 13-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is the backbone for secure communication over networks. The rapid growth of digital data and its security raises the concern for developing more advanced techniques in cryptography. Cryptography is the physical process that scrambles the information by rearrangement and substitution of content, making it unreadable to anyone except the person capable of unscrambling it. Whereas the techniques used for deciphering a message without any knowledge of enciphering is called as Cryptanalysis i. e. , "breaking the code". Now cryptography is not limited to only text data. Algorithms are also there for different data like image, audio, video etc. Throughputs, Speed, CPU time, Battery power, memory requirement are few parameters on which cryptographic algorithms are analyzed. In the present paper analysis of some common algorithms like DES, 3DES, AES, Blowfish, Twofish, ThreeFish, RC4 and RC6 are conducted on the above parameters to find out a best solution. This paper provides a comprehensive introduction about some of the existing cryptographic techniques and their performance for all data types particularly audio files.

References
  1. Akash Kumar Mondal, Chandra Prakash, and Mrs Archana Tiwari "Performance Evaluation of Cryptographic Algorithms: DES and AES",IEEE Students' Conference on Electrical, Electronics and Computer Science, 2011.
  2. O P Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi, "Performance Analysis Of Data Encryption Algorithms", IEEE, 2011.
  3. Sruthi B. Asok, P. Karthigaikumar, Sandhya R, Naveen Jarold K, N. M Siva Mangai, "A Secure cryptographic scheme for Audio Signals", International Conference on communication and Signal Processing, April 3-5, 2013, India.
  4. Sheetal Sharma, Lucknesh Kumar Himanshu Sharma, "Encryption of an Audio File on Lower Frequency Band for Secure Communication", International Journal of Computer Science and Software engineering, volume 3, Issue 7, July -2013.
  5. Rashmi A. Gandhi, Dr. Atul M. Gosai, "Steganography – A Sin qua non for Diguised Communication", International Journal of Innovative Research in Advanced Engineering", Vol 1, Issue 8, 2014.
  6. Shine P James, Sudish N George, Deepthi P P , "Secure Selective Encryption of Compressed Audio", International Conference on Microelectronics, communication and Renewable Energy, IEEE-2013.
  7. Ganesh Babu S, IIango. P, " Higher Dimensional Chaos for Audio Encryption " IEEE, 2013.
  8. N. Radha Aathithan, Venkatesulu. M, "A Complete Binary Tree Structure Block Cipher for real-time multimedia", Science and Information Conference 2013, October 7-9, London, UK.
  9. S. Pavithra, E. Ramadevi, "Throughput Analysis of Symmetric Algorithms", International Journal of Advanced Networking and Applications, Volume-4, Issue-2, Pages:1574-1577, 2012.
  10. Diaa Salama1, Hatem Abdual Kader, and Mohiy Hadhoud, "Evaluating The Performance of Symmetric Encryption Algorithms", International Journal of Network Security, Vol. 10, No. 3, Page. 213-219, May 2010.
  11. Nidhi Singhal, J. P. S Raina, " Comparative Analysis of AES and RC4 Algorithms for Better Utilization", International Journal of Computer Trends and Technology, July-August, 2011.
  12. Saurabh Sharma, Pushpendra Kumar Pateriya, "A Study on Different Approaches of Selective Encryption Technique", International Journal of Computer Science and Communication Networks, Vol. 2(6),658-662.
  13. Majdi Al-qdah, Lin Yi Hui, "Simple Encryption/Decryption Application", International Journal of Computer Science and Security, Vol. 1, Issue. 1.
  14. Bismita Gadanayak , Chittaranjan Pradhan , "Encryption on MP3 Compression". MES Journal of Technology and Management.
  15. Sheetal Sharma, Himanshu Sharma and Lucknesh Kumar, " Power Spectrum Encryption and Decryption of an Audio File", International Journal of Research in Computer Science, Volume 1, August-2013.
  16. Shine P James, Sudhish N. George, Deepthi P P, "An Audio Encryption Technique based on LFSR based Alternating Step Generator", IEEE Connect 2014.
  17. Diaa Salama1, Hatem Abdual Kader, and Mohiy Mohammad Hadhoud, "Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types", International Journal of Network Security, Vol. 11, No. 2, PP. 78-87, Sep 2010.
  18. Rajendra Kumar, Balwinder Saini, Satish Kumar, "A Novel Approach to Blowfish Encryption Algorithm", International Journal of Advanced Foundation and Research in Science and Engineering, Vol. 1, Issue. 2, July 2014.
  19. Dr. S. A. M Rizvi, Dr. Syed Zeeshan Hussain, Neeta Wadhwa, "Performance Analysis of AES and Twofish Encryption Schemes", International Conference on Communication Systems and Network Technologies, 2011.
  20. Pia Singh, Prof. Kamaljeet Singh, "Image Encryption and Decryption Using Blowfish Algorithm in Matlab", International Journal of Scientific and Engineering research, Vol. 4, Issue. 7, July-2013.
  21. Khaldoon M. Mhaidat, Mohammad A. Altahat, Osama D. Al-Khaleel, "High Throughput Hardware Implementation of Threefish Block Cipher on FPGA".
  22. Raghunandhan K R1, Radhakrishna Dodmane2, Sudeepa K B3,Ganesh Aithal, "Efficient Audio Encryption Algorithm For Online Applications Using Transposition And Multiplicative Non-Binary System", International Journal of Engineering research And Technology, Volume 2, Issue 6, June-2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Bio-Cryptography LFSR (Linear Feedback Shift Register) ASG (Alternating Step Generator) avalanche effect