CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Comparative Study of Different Encryption Techniques on MP3 Compression

by Bismita Gadanayak, Chittaranjan Pradhan, Utpal Chandra Dey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 26 - Number 3
Year of Publication: 2011
Authors: Bismita Gadanayak, Chittaranjan Pradhan, Utpal Chandra Dey
10.5120/3082-4218

Bismita Gadanayak, Chittaranjan Pradhan, Utpal Chandra Dey . Comparative Study of Different Encryption Techniques on MP3 Compression. International Journal of Computer Applications. 26, 3 ( July 2011), 28-31. DOI=10.5120/3082-4218

@article{ 10.5120/3082-4218,
author = { Bismita Gadanayak, Chittaranjan Pradhan, Utpal Chandra Dey },
title = { Comparative Study of Different Encryption Techniques on MP3 Compression },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 26 },
number = { 3 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume26/number3/3082-4218/ },
doi = { 10.5120/3082-4218 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:11:52.742837+05:30
%A Bismita Gadanayak
%A Chittaranjan Pradhan
%A Utpal Chandra Dey
%T Comparative Study of Different Encryption Techniques on MP3 Compression
%J International Journal of Computer Applications
%@ 0975-8887
%V 26
%N 3
%P 28-31
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents different encryption techniques, which are applied on the Moving Picture Expert Group Layer III (MP3) compression, for securely transmitting audio data over the network. Here, total Data Encryption Standard (DES), total Advanced Encryption Standard (AES) and selective AES encryption techniques are applied on the quantized audio data. A comparison between these encryption techniques on MP3 compression are discussed by calculating the time consumption as well as SNR values. Experimental results demonstrate that the selective AES encryption technique is better than the other two encryption techniques.

References
  1. Ranjan Parekh’s, Principles of multimedia. The McGraw-Hill, first ed., 2006.
  2. Ding, Gang, L., Akansu, A. N., Ramkumar, M., and Xuefei, X., 2001, "On-Line Music Protection and MP3 Compression", Proceedings of 2001 International Symposium on Intelligent Multimedia, Video and Speech Processing, May 2-4, pp. 13 - 16.
  3. Pichit Tananchai and Thumrongrat Amornraksa, “Selective encryption for compressed audio,” IEEE, 2009.
  4. Chih-Hsu Yen, Hung-Yu Wei, and Bing-Fei Wu, “New Encryption Approaches to MP3 Compression”, Department of Electrical and Controling Engineering, National Chiao Tung University, 2003.
  5. Joebert S. Jacaba, “Audio Compression Using Modified Discrete Cosine Transform: The MP3 Coding Standard”, October 2001.
  6. Peter Noll, “MPEG Digital Audio Coding”, IEEE Signal Processing Magazine, 1997.
  7. Davis Yen Pan, “Digital Audio Compression,” Digital Technical Journal, vol. 5, no. 3, 1993.
  8. “Data Encryption standard,” Federal Information Processing Standards Publication, oct 1999.
  9. “Advance Encryption standard,” Federal Information Processing Standards Publication , pp. 92–96, nov 2001
  10. Behrouz A. Forouzan, Cryptography and Network Security. The McGraw-Hill, fourth ed., 2004.
  11. Bismita Gadanayak, Chittaranjan Pradhan, “Encryption on MP3 Compression”, MES Journal of Technology and Management, Vol. 2, Issue. 1, p.p. 86-89, 2011.
  12. Bismita Gadanayak, Chittaranjan Pradhan and Neha Baranwal, “Secured Partial MP3 Encryption Technique”, International Journal of Computer Science and Information Technologies, Vol. 2 (4), 2011, p.p. 1584-1587.
Index Terms

Computer Science
Information Sciences

Keywords

MP3 DES AES SNR MDCT Selective Encryption