CFP last date
20 May 2024
Reseach Article

Analysing Secret Sharing Schemes for Audio Sharing

by Seema Vyavahare, Sonali Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 137 - Number 11
Year of Publication: 2016
Authors: Seema Vyavahare, Sonali Patil
10.5120/ijca2016908909

Seema Vyavahare, Sonali Patil . Analysing Secret Sharing Schemes for Audio Sharing. International Journal of Computer Applications. 137, 11 ( March 2016), 39-42. DOI=10.5120/ijca2016908909

@article{ 10.5120/ijca2016908909,
author = { Seema Vyavahare, Sonali Patil },
title = { Analysing Secret Sharing Schemes for Audio Sharing },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 137 },
number = { 11 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 39-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume137/number11/24321-2016908909/ },
doi = { 10.5120/ijca2016908909 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:38:07.272155+05:30
%A Seema Vyavahare
%A Sonali Patil
%T Analysing Secret Sharing Schemes for Audio Sharing
%J International Journal of Computer Applications
%@ 0975-8887
%V 137
%N 11
%P 39-42
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In various applications such as military applications, commercial music systems, etc. audio needs to be transmitted over the network. During transmission, there is risk of attack through wiretapping. Hence there is need of secure transmission of the audio. There are various cryptographic methods to protect such data using encryption key. However, such schemes become single point failure if encryption key get lost or stolen by intruder. That's why many secret sharing schemes came into picture. There are circumstances where an action is required to be executed by a group of people. Secret sharing is the technique in which secret is distributed among n participants. Each participant has unique secret share. Secret can be recovered only after sufficient number of shares (k out of n) combined together. In this way one can secure secret in reliable way. In this paper we have proposed Audio Secret Sharing based on Li Bai's Secret Sharing scheme in Matrix Projection. Then the proposed scheme is critically analysed with the strengths and weaknesses introduced into the scheme by comparing it with existing schemes.

References
  1. Douglas R. Stinson, “Cryptography: Theory and Practice”, Third edition.
  2. M. Naor and A. Shamir, “Visual cryptography,” Advance in Cryptology: Eurpocrypt’94
  3. Lecture Notes In Computer Science, Springer Verlag, Germany, Vol. 950, pp. 1–12, 1995.
  4. AmreshNikam, Poonam Kapade, SonaliPatil, “Audio Cryptography: A (2, 2) Secret Sharing for Wave File” International Journal of Computer Science and Application Issue 2010.
  5. A. Shamir, “How to share a secret” Communication of the ACM, vol. 22,no. 11, pp.612-613, Nov 1979.
  6. SonaliPatil, P. R. Deshmukh, TejalChavan, Vinay Shastri, Priyanka Sangwan, AkashSunthwal, “Reduced share size audio secret sharing”, International Conference on Pervasive Computing (ICPC), pp.1-4, IEEE, 2015.
  7. Sagar A. Yashwantrao, Prof. Vilas J. Jadhav, Prof.Pravin S. Rahate, “Shared Cryptographic Scheme with Efficient Data Recovery and Compression for Audio Secret Sharing” International Journal of Emerging Technology and Advanced Engineering”, ISO 9001:2008 Certified Journal, Volume 4, Issue 2, February 2014.
  8. Ryouichi Nishimura, Shun-ichiro Abe, Norihiro Fujita and Yoiti Suzuki, “Reinforcement of VoIP Security with Multipath Routing and Secret Sharing Scheme”, Journal of Information Hiding and Multimedia Signal, Volume 1, Number 3, July 2010.
  9. Prabir Kr. Naskar, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri , Atal Chaudhuri, “Shared Cryptography with Embedded Session Key for Secret Audio”, International Journal of Computer Applications (0975 – 8887) Volume 26– No.8, July 2011.
  10. Yoshida. K. Sch. , “Security of Audio Secret Sharing Scheme encrypting Audio Secrets”, Internet Technology And Secured Transactions, 2012.
  11. Li Bai, “A Strong Ramp Secret Sharing Scheme Using Matrix Projection”, IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2006.
  12. Li Bai, “A Reliable (k, n) Image Secret Sharing Scheme”, IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2006.
  13. Thien and Lin, “Secret image sharing”, Computers & Graphics, vol. 26, no.5, pp. 765-770, 2002.
  14. A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, “Proactive Secret Sharing Or: How to Cope with Perceptual Leakage”, Springer- Verlag, 1998.
  15. Li Bai, XuKai Zou, “A Proactive Secret Sharing Scheme in Matrix Projection Method”, International Journal of Security and Networks, Volume. 4, No. 4, PP. 201-209, 2009.
  16. J. C. Benaloh, “Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret”, Proceedings of CRYPTO86 Springer, Berlin, PP. 251260, 1986.
  17. SonaliPatil, P. Deshmukh, “Verifiable Image Secret Sharing in Matrix Projection Using Watermarking”, International conference on Circuits, Systems, Communication and Information Technology Applications, IEEE, 2014.
  18. the 14th International World Wide Web Conference. 2005, pp. 1190-1191.
Index Terms

Computer Science
Information Sciences

Keywords

Audio Secret Sharing Matrix Projection Secret Sharing.