2018 2nd International Conference on Imaging, Signal Processing and Communication (ICISPC) 2018
DOI: 10.1109/icispc44900.2018.9006681
|View full text |Cite
|
Sign up to set email alerts
|

Voice Signal Encryption Scheme Using Transformation and Embedding Techniques for Enhanced Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…As the proposed method involves both the cryptographic and steganographic concepts (19,21,22) for strengthening the security, it is called Dual Level Security Scheme (DLSS). Cryptography is the process of converting the plain signal into cipher signal, on the other hand, Steganography is the process of hiding the secret signal in covering signal.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…As the proposed method involves both the cryptographic and steganographic concepts (19,21,22) for strengthening the security, it is called Dual Level Security Scheme (DLSS). Cryptography is the process of converting the plain signal into cipher signal, on the other hand, Steganography is the process of hiding the secret signal in covering signal.…”
Section: Methodsmentioning
confidence: 99%
“…Correlation test in steganography is to prove the minimal or no change in the covering signal, even after embedding the encrypted 1D dataset of the secret image. The normalization factor (19) is calculated as follows,…”
Section: Correlation Extemporization By Normalizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Embedding the secret data in a multimedia data adds security. Hiding image in an audio file [6] is shown by Tohari Ahmad et al and embedding secret audio in another cover audio is proposed in our previous work [7]. As the multimedia data are huge and very vulnerable, the amount of data hidden in a cover file is an important measure to prove the efficiency of the system.…”
Section: Related Workmentioning
confidence: 99%