Abstract
Visual cryptography, introduced by Naor-Shamir at Eurocrypt ’94, only requires primitive technology to decrypt the ciphertext. However, a disadvantage of it is that the “ciphertext”, as a random looking transparency, is suspicious to a censor. The solutions recently proposed by Desmedt-Hou-Quisquater to avoid these problems are neither user friendly, having a low bandwidth, nor are tested. In this paper we present three schemes that overcome these problems. As in one of the Desmedt-Hou-Quisquater’s schemes, a share (or a ciphertext) corresponds to an audio signal, such as music. While in the Desmedt-Hou-Quisquater scheme the plaintext was binary, in our schemes the plaintext can also be speech, or any other audio signal. By introducing variations of the one-time pad we guarantee perfect secrecy. The ciphertext is non-suspicious, when tested with human ears, is indistinguishable from normal music.
This research was done while Yvo Desmedt and Tri V. Le were at the University of Wisconsin – Milwaukee. Their research is now funded by NSF CCR-9903216.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Biham, E.: Lecture given at Daghstuhl, Germany, September 21–26 (1997)
Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. Nat. Computer Conf. AFIPS Conf. Proc., vol. 48, pp. 313–317 (1979)
Blakley, G.R., Swanson, L.: Infinite structures in information theory. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology. Proc. of Crypto’82, Santa Barbara, CA, pp. 39–50. Plenum Press, N.Y (1983)
Blum, M., Kannan, S.: Designing programs that check their work. 21st ACM STOC, 86–97 (1989)
Carlson, G.E.: Signal and Linear System Analysis. John Wiley & Sons, New York, second edition (1998)
Cooley, J.M., Tukey, J.W.: An algorithm for the machine calculation of complex Fourier series. Mathematics of Computation 19, 297–301 (1965)
Desmedt, Y., Hou, S., Quisquater, J.-J.: Audio and noise-canceling cryptography. In: 1998. Rump session of the second Information HidingWorkshop, Portland, Oregon, pp. 15–17 (1998)
Desmedt, Y., Hou, S., Quisquater, J.-J.: Cerebral cryptography. In: Preproceedings of the second Information Hiding Workshop, Portland, Oregon. LNCS, Springer, Heidelberg (1998) To appear in the proceeding
Endler, D.: Intrusion detection applying machine learning to solaris audit data. In: Proc. of 14th ACSAC, Phoenix, Arizona (1998)
Gosh, A., Wanke, J., Charron, F.: Detecting anomalous and unknown intrusions against programs. In: Proc. of 14th Annual Computer Security Applications Conference, Phoenix, December 7-11 (1998)
Howard, D.M., Angus, J.: Acoustics and psychoacoustics. Focal Press, Oxford (1996)
Daniel, E.D., Mee, C.D., Clark, M.H.: Magnetic Recording Timing errors between tracks, p. 327. IEEE Press, New York (1999)
Information hiding workshop, April 15–17. Springer, Heidelberg (1998)
Kahn, D.: The Codebreakers. MacMillan Publishing Co., New York (1967)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Newberry, M.: Active intruder Detection: Some Aspects of Computer Security and User Authentification. PhD thesis, University of New SouthWales, ADFA, Department of Computer Science, Canberra, Australia, Active intruder Detection: Some Aspects of Computer Security and User Authentification (1991)
Oppenheim, A.V., Willsky, A.S.: Signal & Systems, 2nd edn. Prentice-Hall, Englewood Cliffs (1997)
Sandhu, R.: The RRA 1997 model for role-based administration of role hierarchies. In: Proceedings of 14th ACSAC, Phoenix, Arizona (1998)
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Shannon, C.E.: Communication theory of secrecy systems. Bell System Techn. Jour. 28, 656–715 (1949)
Smith, S.W.: The Scientist and Engineer’s Guide to Digital Signal Processing, pp. 92150–92407. California Technical Publishing, San Diego (1997)
Thomsen, D., O’Brien, D., Bogle, J.: Role based access control framework for network enterprises. In: Proc. of 14th ACSAC, Phoenix, Arizona (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Desmedt, Y., Le, T.V., Quisquater, JJ. (2000). Nonbinary Audio Cryptography. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_33
Download citation
DOI: https://doi.org/10.1007/10719724_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67182-4
Online ISBN: 978-3-540-46514-0
eBook Packages: Springer Book Archive