Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

Audio Data Security and Feature Extraction over Cloud

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Sayyada Fahmeeda, Amreen Tabassum
10.5120/ijca2017914518

Sayyada Fahmeeda and Amreen Tabassum. Audio Data Security and Feature Extraction over Cloud. International Journal of Computer Applications 168(10):33-37, June 2017. BibTeX

@article{10.5120/ijca2017914518,
	author = {Sayyada Fahmeeda and Amreen Tabassum},
	title = {Audio Data Security and Feature Extraction over Cloud},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {168},
	number = {10},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {33-37},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume168/number10/27913-2017914518},
	doi = {10.5120/ijca2017914518},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The demand for on-demand services of multimedia; most individuals, companies, and governments use cloud services to maintain confidentiality from intruder from being hacked as every day huge data was embedded in a digital media or distributed over the internet. For this reason, the user require to secure their data and encryption method is the one that provides security to your information and most security system uses this technique which is widely used in the database areas such as internet banking, audio communication channel, phone recordings, music companies, military conversations etc. A Cryptographic encryption method is certainly the best option for maintaining the security to our audio files. As the audio is encrypted it does not make sense to recognize the audio for that reason audio feature extraction method is used for classification purpose. Audio classification involves extracting representative features and feeding them into the classifier. The proposed method provides security to audio files using spread spectrum technique and LSB steganography for easy search of these files by extracting audio features using K-NN classifier.

References

  1. Alisha sikri, taruna, kirti rana,”security of digital data using combination of audio steganography and cryptography”. International Journal of Engineering Development and Research © 2016 IJEDR | Volume 4, Issue 2 | ISSN: 2321-9939.
  2. M. abukari y, pradeep k. atrey, namunu c.maddage,”secure audio reverberation over cloud”. 10th annual symposium on information assurance(asia ’15), June 2-3,2015, albany, ny Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  3. Sruthi B. Asok, P. Karthigaikumar, Sandhya R, Naveen Jarold K, N.M Siva Mangai, “a secure cryptographic scheme for audio signals”International conference on Communication and Signal Processing, April 3-5, 2013, India. 978-1-4673-4866-9/13/$31.00 © 2013 IEEE
  4. Pradeep Kumar Singh and R.K.Aggrawal,” Enhancement of LSB based Steganography for Hiding Image in Audio”, (IJCSE) International Journal on Computer Science and Engineering, ISSN : 0975-3397, Vol. 02, No. 05, 2010, 1652-1658
  5. Inas Jawad Kadhim “ A New Audio Steganography System Based on Auto-Key Generator”, Al-Khwarizmi Engineering Journal, Vol. 8, No. 1, PP 27 - 36 (2012)
  6. Harshita kapadia, Harawane sneha Haribau, Harsha patil “ audio steganography and security using cryptography”, IJCSN, volume 4, issue 2, April 2015
  7. Nisha kundu, Dr. Amadeep kaur, “A secure Approach to audio steganography” international journal of engineering trends and technology (IJETT), vol 44, No. 1, February 2017
  8. Surubhi bhansal and puneet Sharma “cascaded cryptography and audio styeganography” international journal of engineering, applied and management sciences paradigms, Vol 26, Issue 01, July 2015
  9. William W.F, Osofisan A.O, Asanbe M.O, “ A lookup XOR cryptography for high capacity least significant bit steganography” IJAIS, Vol 10- No. 7, March 2016.
  10. Xueyuan Zhang, Zhuosheng Su, Pei Lin, Qianhua He, Jichen Yang, “An Audio Feature Extraction Scheme Based on Spectral Decomposition”. 978-1-4799-3903-9/14/$31.00 © 2014 IEEE.

Keywords

Cryptography, Steganography, Feature Extraction, Audio Classification, Cloud Security.