Skip to main content

Nonbinary Audio Cryptography

  • Conference paper
Information Hiding (IH 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1768))

Included in the following conference series:

Abstract

Visual cryptography, introduced by Naor-Shamir at Eurocrypt ’94, only requires primitive technology to decrypt the ciphertext. However, a disadvantage of it is that the “ciphertext”, as a random looking transparency, is suspicious to a censor. The solutions recently proposed by Desmedt-Hou-Quisquater to avoid these problems are neither user friendly, having a low bandwidth, nor are tested. In this paper we present three schemes that overcome these problems. As in one of the Desmedt-Hou-Quisquater’s schemes, a share (or a ciphertext) corresponds to an audio signal, such as music. While in the Desmedt-Hou-Quisquater scheme the plaintext was binary, in our schemes the plaintext can also be speech, or any other audio signal. By introducing variations of the one-time pad we guarantee perfect secrecy. The ciphertext is non-suspicious, when tested with human ears, is indistinguishable from normal music.

This research was done while Yvo Desmedt and Tri V. Le were at the University of Wisconsin – Milwaukee. Their research is now funded by NSF CCR-9903216.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Biham, E.: Lecture given at Daghstuhl, Germany, September 21–26 (1997)

    Google Scholar 

  2. Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. Nat. Computer Conf. AFIPS Conf. Proc., vol. 48, pp. 313–317 (1979)

    Google Scholar 

  3. Blakley, G.R., Swanson, L.: Infinite structures in information theory. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology. Proc. of Crypto’82, Santa Barbara, CA, pp. 39–50. Plenum Press, N.Y (1983)

    Google Scholar 

  4. Blum, M., Kannan, S.: Designing programs that check their work. 21st ACM STOC, 86–97 (1989)

    Google Scholar 

  5. Carlson, G.E.: Signal and Linear System Analysis. John Wiley & Sons, New York, second edition (1998)

    Google Scholar 

  6. Cooley, J.M., Tukey, J.W.: An algorithm for the machine calculation of complex Fourier series. Mathematics of Computation 19, 297–301 (1965)

    Article  MATH  MathSciNet  Google Scholar 

  7. Desmedt, Y., Hou, S., Quisquater, J.-J.: Audio and noise-canceling cryptography. In: 1998. Rump session of the second Information HidingWorkshop, Portland, Oregon, pp. 15–17 (1998)

    Google Scholar 

  8. Desmedt, Y., Hou, S., Quisquater, J.-J.: Cerebral cryptography. In: Preproceedings of the second Information Hiding Workshop, Portland, Oregon. LNCS, Springer, Heidelberg (1998) To appear in the proceeding

    Google Scholar 

  9. Endler, D.: Intrusion detection applying machine learning to solaris audit data. In: Proc. of 14th ACSAC, Phoenix, Arizona (1998)

    Google Scholar 

  10. Gosh, A., Wanke, J., Charron, F.: Detecting anomalous and unknown intrusions against programs. In: Proc. of 14th Annual Computer Security Applications Conference, Phoenix, December 7-11 (1998)

    Google Scholar 

  11. Howard, D.M., Angus, J.: Acoustics and psychoacoustics. Focal Press, Oxford (1996)

    Google Scholar 

  12. Daniel, E.D., Mee, C.D., Clark, M.H.: Magnetic Recording Timing errors between tracks, p. 327. IEEE Press, New York (1999)

    Google Scholar 

  13. Information hiding workshop, April 15–17. Springer, Heidelberg (1998)

    Google Scholar 

  14. Kahn, D.: The Codebreakers. MacMillan Publishing Co., New York (1967)

    Google Scholar 

  15. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  16. Newberry, M.: Active intruder Detection: Some Aspects of Computer Security and User Authentification. PhD thesis, University of New SouthWales, ADFA, Department of Computer Science, Canberra, Australia, Active intruder Detection: Some Aspects of Computer Security and User Authentification (1991)

    Google Scholar 

  17. Oppenheim, A.V., Willsky, A.S.: Signal & Systems, 2nd edn. Prentice-Hall, Englewood Cliffs (1997)

    Google Scholar 

  18. Sandhu, R.: The RRA 1997 model for role-based administration of role hierarchies. In: Proceedings of 14th ACSAC, Phoenix, Arizona (1998)

    Google Scholar 

  19. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  20. Shannon, C.E.: Communication theory of secrecy systems. Bell System Techn. Jour. 28, 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

  21. Smith, S.W.: The Scientist and Engineer’s Guide to Digital Signal Processing, pp. 92150–92407. California Technical Publishing, San Diego (1997)

    Google Scholar 

  22. Thomsen, D., O’Brien, D., Bogle, J.: Role based access control framework for network enterprises. In: Proc. of 14th ACSAC, Phoenix, Arizona (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Desmedt, Y., Le, T.V., Quisquater, JJ. (2000). Nonbinary Audio Cryptography. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_33

Download citation

  • DOI: https://doi.org/10.1007/10719724_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67182-4

  • Online ISBN: 978-3-540-46514-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics