Skip to main content

A Novel Time-Stamp-Based Audio Encryption Scheme Using Sudoku Puzzle

  • Conference paper
  • First Online:
Proceedings of International Conference on Frontiers in Computing and Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 404))

Abstract

An innovative alternative method in the field of security that can enforce safety and security of information has been proposed here by performing audio encryption. Cryptography, a way to secure communications, allows only the sender and the intended recipient of a message to access its contents. Cryptography is derived from the Greek word “Kryptos,” meaning hidden, which is associated with content hiding by encryption. In this paper, we develop a novel time-stamp-based audio encryption method using the mind-cracking number place challenger Sudoku puzzle of higher dimension, i.e., 16 × 16 (popularly known as Super Sudoku) to add a new era in the field of security. In this work, we have developed a Super Sudoku cipher by applying time-stamp in it. Immediately after that, the extracted audio frames of the input audio files are XORed with our developed innovative Cipher to generate encrypted audio frames. Then these encoded audio frames are converted to an encrypted audio file to transmit with safety and security. At the receiver end, by applying the same cipher key, we can extract our original audio file.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sharma N, Prabhjot, Kaur H (2017) A review of information security using cryptography technique. Int J Adv Res Comput Sci 8(no. Special Issue):323–326

    Google Scholar 

  2. Jana S, Maji AK, Pal RK (2019) A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding. Innov Syst Softw Eng 15(1):65–73

    Article  Google Scholar 

  3. Maji AK, Roy S, Pal RK (2014) A novel steganographic scheme using Sudoku. In: IEEE international conference on electrical information and communication technology, KUET, Khulna, Bangladesh, pp 116–121

    Google Scholar 

  4. https://pingler.com/blog/what-are-unix-timestamps-and-why-are-they-useful/

  5. https://en.wikipedia.org/wiki/Sudoku

  6. http://www.en.wikipedia.org/wiki/SuperSudoku

  7. Agarwal A, Singh PR, Katiyar S (2019) Secured audio encryption using AES algorithm. Int J Comput Appl (0975–8887) 178(22):29–33

    Google Scholar 

  8. Kahate A (2003) Cryptography and network security. Tata McGraw-Hill Education

    Google Scholar 

  9. Cvejic N, Seppben T (2002) Increasing the capacity of LSB-based audio steganography. FIN90014 University of Oulu, Finland

    Google Scholar 

  10. Bassil Y (2012) A two intermediates audio steganography technique. J Emerg Trends Comput Inform Sci 3(11)

    Google Scholar 

  11. Ali AH, Georg LE, Mokhtar MR (2020) An adaptive high capacity model for secure audio communication based on fractal coding and uniform coefficient modulation. Circ Syst Signal Process 39:5198–5225

    Article  Google Scholar 

  12. Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. Int J Mod Educ Comput Sci 6:27–34

    Article  Google Scholar 

  13. Saradha P, Swamy B (2012) Improving image data hiding capacity scheme using Sudoku puzzle in colour images. Int J Eng Res Appl 2(3):2741–2744

    Google Scholar 

  14. Wu Y, Noonan JP, Agaian S (2011) Image encryption using the rectangular Sudoku Cipher. In: International conference on system science and engineering proceedings, pp 704–709

    Google Scholar 

  15. Felgenhauer B, Jarvis F (2005) Enumerating possible Sudoku grids. Math Spect (Corpus ID: 16859520), pp 1–7

    Google Scholar 

  16. https://www.techopedia.com/definition/6472/cipher. Last Accessed 29th Oct 2018

  17. https://www.unixtimestamp.com/index.php

  18. www.afjarvis.staff.shef.ac.uk/sudoku

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunanda Jana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jana, S., Dutta, N., Maji, A.K., Pal, R.K. (2023). A Novel Time-Stamp-Based Audio Encryption Scheme Using Sudoku Puzzle. In: Basu, S., Kole, D.K., Maji, A.K., Plewczynski, D., Bhattacharjee, D. (eds) Proceedings of International Conference on Frontiers in Computing and Systems. Lecture Notes in Networks and Systems, vol 404. Springer, Singapore. https://doi.org/10.1007/978-981-19-0105-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0105-8_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0104-1

  • Online ISBN: 978-981-19-0105-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics