ENCRYPTION AND DECRYPTION OF AUDIO SIGNAL BASED ON RSA ALGORITHN

Author:

Yousif Sura F.

Abstract

One of the most important methods to protect and verify information that are exchanged over public communication channels in the existence of third party called antagonists is encryption. The stored or transmitted message is transformed in the encryption process to unreadable or gibberish form. The reverse process in which the intendent recipient can reveal the encrypted message content is called decryption. The encryption and decryption processes are achieved using secret keys that are exclusively exchanged between the sender and recipient. This method can be applied to any form of message such as audio, video, image or text data. The current work applies the well-known RSA algorithm for audio signal encryption and decryption. The performance of the presented algorithm has been tested via experimental implementation which show that the Cpestral Distance Measure (CD), Linear Predicative Code Measure (LPC) and Segmental Spectral Signal to Noise Ratio (SSSNR) reach to 6.8781, 4.9614 and -21.5563 dB respectively using Matlab simulations. The results on the presented technique validated that it is secure, reliable and efficient to be applied in secure audio communications as well as it performed high intelligibility of the recovered audio signal.

Publisher

Granthaalayah Publications and Printers

Reference14 articles.

1. Rahman, Md. M., Saha, T. K. and Bhuiyan, Md. A. Implementation of RSA Algorithm for Speech Data Encryption and Decryption, IJCSNS International Journal of Computer Science and Network Security, Vol.12 No.3, March 2012, 74-82.

2. Real-Time Encryption/Decryption of Audio Signal

3. Video Encryption and Decryption using RSA Algorithm

4. Implementation of an Encryption Scheme for Voice Calls

5. Sayyad, S. N., Sutar, P. S., Pise, R. S., Raut, V. H. and Nalawade, C.V. Dual-layer Video Encryption & Decryption using RSA Algorithm, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 4, April 2017, 7661-7668.

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC;Advances in Science, Technology and Engineering Systems Journal;2024-07

2. Performance Comparison between RSA and El-Gamal Algorithms for Speech Data Encryption and Decryption;Diyala Journal of Engineering Sciences;2023-03-01

3. Secure two step voice biometric OTP authentication system for mobile users;INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND APPLICATIONS (ICSTA 2022);2023

4. Improved Logistic Map and DNA-Based Video Encryption;Lecture Notes in Electrical Engineering;2023

5. A Multilayered Audio Signal Encryption Approach for Secure Voice Communication;Electronics;2022-12-20

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3