Audio security through compressive sampling and cellular automata

2014 ◽  
Vol 74 (23) ◽  
pp. 10393-10417 ◽  
Author(s):  
Sudhish N. George ◽  
Nishanth Augustine ◽  
Deepthi P. Pattathil
2018 ◽  
Vol 13 (1) ◽  
pp. 136
Author(s):  
Abdel Latif Abu Dalhoum

Digital audio scrambling is a process used in audio security applications. Scrambling of audio files breaks the correlation between adjacent samples in order to convert the original audio to an unintelligible format. Scrambling is used to protect the audio against wiretapping and illegal surveillance, in addition to being a step in security algorithms, such as watermarking and encryption algorithms. Cellular automata are models that are discrete in nature and depend on simple and local rules to achieve an interesting overall behavior. Two-dimensional cellular automata were previously proposed as a key generation mechanism to scramble audio files. The mechanism was built upon be researchers in the multimedia security field. This paper explores the use of one-dimensional cellular automata in audio scrambling, which simplifies the process as deploying two-dimensional cellular automata requires changing the dimension of the audio file and the one-dimensional cellular automata does not, additionally, elementary one-dimensional cellular automata requires less parameters to configure. The scrambling degree is used to evaluate the model effectiveness in breaking the correlation of adjacent samples. In the experiments, different parameters are taken into account including the cellular automata class, the iterations needed and the method used to calculate the cells at the boundary. Experiments show that the one-dimensional cellular automata are capable of scrambling the audio file without any dimensional change and the chaotic rules tested give the highest scrambling degree.


2001 ◽  
Vol 11 (PR3) ◽  
pp. Pr3-205-Pr3-212
Author(s):  
G. Ch. Sirakoulis ◽  
I. Karafyllidis ◽  
A. Thanailakis
Keyword(s):  

1998 ◽  
Vol 4 (4) ◽  
pp. 49-54
Author(s):  
V.А. Val'kovskii ◽  
◽  
D.D. Zerbino ◽  
Keyword(s):  

2014 ◽  
Vol 2014 (1) ◽  
pp. 37-44 ◽  
Author(s):  
Arighna Sarkar ◽  
◽  
Debarka Mukhopadhyay ◽  

Author(s):  
Mohd Javed ◽  
Khaleel Ahmad ◽  
Ahmad Talha Siddiqui

WiMAX is the innovation and upgradation of 802.16 benchmarks given by IEEE. It has numerous remarkable qualities, for example, high information rate, the nature of the service, versatility, security and portability putting it heads and shoulder over the current advancements like broadband link, DSL and remote systems. Though like its competitors the concern for security remains mandatory. Since the remote medium is accessible to call, the assailants can undoubtedly get into the system, making the powerless against the client. Many modern confirmations and encryption methods have been installed into WiMAX; however, regardless it opens with up different dangers. In this paper, we proposed Elliptic curve Cryptography based on Cellular Automata (EC3A) for encryption and decryption the message for improving the WiMAX security


Sign in / Sign up

Export Citation Format

Share Document