Abstract
An innovative alternative method in the field of security that can enforce safety and security of information has been proposed here by performing audio encryption. Cryptography, a way to secure communications, allows only the sender and the intended recipient of a message to access its contents. Cryptography is derived from the Greek word “Kryptos,” meaning hidden, which is associated with content hiding by encryption. In this paper, we develop a novel time-stamp-based audio encryption method using the mind-cracking number place challenger Sudoku puzzle of higher dimension, i.e., 16 × 16 (popularly known as Super Sudoku) to add a new era in the field of security. In this work, we have developed a Super Sudoku cipher by applying time-stamp in it. Immediately after that, the extracted audio frames of the input audio files are XORed with our developed innovative Cipher to generate encrypted audio frames. Then these encoded audio frames are converted to an encrypted audio file to transmit with safety and security. At the receiver end, by applying the same cipher key, we can extract our original audio file.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sharma N, Prabhjot, Kaur H (2017) A review of information security using cryptography technique. Int J Adv Res Comput Sci 8(no. Special Issue):323–326
Jana S, Maji AK, Pal RK (2019) A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding. Innov Syst Softw Eng 15(1):65–73
Maji AK, Roy S, Pal RK (2014) A novel steganographic scheme using Sudoku. In: IEEE international conference on electrical information and communication technology, KUET, Khulna, Bangladesh, pp 116–121
https://pingler.com/blog/what-are-unix-timestamps-and-why-are-they-useful/
Agarwal A, Singh PR, Katiyar S (2019) Secured audio encryption using AES algorithm. Int J Comput Appl (0975–8887) 178(22):29–33
Kahate A (2003) Cryptography and network security. Tata McGraw-Hill Education
Cvejic N, Seppben T (2002) Increasing the capacity of LSB-based audio steganography. FIN90014 University of Oulu, Finland
Bassil Y (2012) A two intermediates audio steganography technique. J Emerg Trends Comput Inform Sci 3(11)
Ali AH, Georg LE, Mokhtar MR (2020) An adaptive high capacity model for secure audio communication based on fractal coding and uniform coefficient modulation. Circ Syst Signal Process 39:5198–5225
Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. Int J Mod Educ Comput Sci 6:27–34
Saradha P, Swamy B (2012) Improving image data hiding capacity scheme using Sudoku puzzle in colour images. Int J Eng Res Appl 2(3):2741–2744
Wu Y, Noonan JP, Agaian S (2011) Image encryption using the rectangular Sudoku Cipher. In: International conference on system science and engineering proceedings, pp 704–709
Felgenhauer B, Jarvis F (2005) Enumerating possible Sudoku grids. Math Spect (Corpus ID: 16859520), pp 1–7
https://www.techopedia.com/definition/6472/cipher. Last Accessed 29th Oct 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jana, S., Dutta, N., Maji, A.K., Pal, R.K. (2023). A Novel Time-Stamp-Based Audio Encryption Scheme Using Sudoku Puzzle. In: Basu, S., Kole, D.K., Maji, A.K., Plewczynski, D., Bhattacharjee, D. (eds) Proceedings of International Conference on Frontiers in Computing and Systems. Lecture Notes in Networks and Systems, vol 404. Springer, Singapore. https://doi.org/10.1007/978-981-19-0105-8_16
Download citation
DOI: https://doi.org/10.1007/978-981-19-0105-8_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0104-1
Online ISBN: 978-981-19-0105-8
eBook Packages: EngineeringEngineering (R0)