1998
DOI: 10.1007/3-540-49649-1_31
|View full text |Cite
|
Sign up to set email alerts
|

Audio and Optical Cryptography

Abstract: Abstract. In visual cryptography the additive property of light is used. Also the shares are random and therefore suspect to a censor. In this paper we present two new cryptographic schemes which use music and the wave properties of light. Both schemes are also secret sharing schemes in which shares are music or images and are not suspect to a human censor. Our scheme guarantees perfect privacy as well as high quality. To decrypt the message, one just plays two shares on a stereo system. There are two decrypti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2005
2005
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 9 publications
0
10
0
1
Order By: Relevance
“…For instance, if n is the total number of information pieces (namely, shares), and k is the minimum number of shares required to re-assemble the original information, the scheme is said to be a (k, n) threshold secret sharing scheme [90]. In this area, the authors in [91] further introduced Audio Secret Sharing Scheme (ASSS) techniques, leveraging short-range audible links to achieve secret sharing. These techniques were further studied by the authors in [92], proposing a new, secure but ideal audio secret sharing scheme.…”
Section: Secret Sharing Via Short-range Audio Linksmentioning
confidence: 99%
“…For instance, if n is the total number of information pieces (namely, shares), and k is the minimum number of shares required to re-assemble the original information, the scheme is said to be a (k, n) threshold secret sharing scheme [90]. In this area, the authors in [91] further introduced Audio Secret Sharing Scheme (ASSS) techniques, leveraging short-range audible links to achieve secret sharing. These techniques were further studied by the authors in [92], proposing a new, secure but ideal audio secret sharing scheme.…”
Section: Secret Sharing Via Short-range Audio Linksmentioning
confidence: 99%
“…With regard to an acoustic secret sharing method studied in order to make use of the characteristics of sound, Desmedt et al [3] and Lin et al [4] proposed an acoustic secret sharing of binary bit strings. Desmedt's method is (2, 2)-threshold secret sharing and they construct two shared signals such that any two shares have counter phases if the secret data is '0' or the same phases if the secret data is '1'.…”
Section: Tally-based Watermarking Systemmentioning
confidence: 99%
“…These up/down blocks are then used to encode the secret information. 3) Binary Audio Cryptography Desmedt et al [8] introduced new covert cryptography model, which is a secret sharing model that guarantees perfect privacy as well as high quality. In binary audio cryptography, the ciphertext and the key correspond to music whose phases have been changed.…”
Section: Development Of Multilayer New Covert Audio Cryptographic Modelmentioning
confidence: 99%
“…Desmedt et al [8] pointed out that traditional hiding and steganography methods have the disadvantage that once their method is known, any one can find embedded message. Therefore, they have been combined the concepts of new covert cryptography and information hiding to create new covert cryptographic models which are perfectly secure and whose (decryption\extracting) process involves primitive technologies only [9] [10].…”
Section: Introductionmentioning
confidence: 99%