2020
DOI: 10.1088/1757-899x/928/3/032066
|View full text |Cite
|
Sign up to set email alerts
|

Encrypt Audio File using Speech Audio File As a key

Abstract: in this research, a new method for audio (.WAV) file encryption is propose using a random modification with two secret key applications. The proposed method provided a highly secure audio.WAV files and efficient audio files which have very high-frequency band. The proposed system is to convert speech audio file to text form, this text creates password seed with two keys using hash function, the first key encrypted using proposed algorithm then these keys used to encrypt the original audio (.WAV) file by using … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Many literatures dedicated to WSN, they range in many elements which includes hypothesis, technique, or even the utility boundaries. there may be a brilliant deal of attention become granted to WSN [16]. several techniques were advanced for reaching more green techniques that serving the programs field of hobby.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Many literatures dedicated to WSN, they range in many elements which includes hypothesis, technique, or even the utility boundaries. there may be a brilliant deal of attention become granted to WSN [16]. several techniques were advanced for reaching more green techniques that serving the programs field of hobby.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The procedure was evaluated using four qualitative metrics, and the findings indicated a very little, barely perceptible relationship between the research materials. Al-Kateeb et al proposed a new method for encrypting important data based on the circular shapes information extracted from the cover image [21]. The encryption process uses simple calculations, while the hiding process is done in pixels and three forms of concealment.…”
Section: Introductionmentioning
confidence: 99%