2020
DOI: 10.12928/telkomnika.v18i4.14216
|View full text |Cite
|
Sign up to set email alerts
|

Encrypting an audio file based on integer wavelet transform and hand geometry

Abstract: A new algorithm suggested for audio file encryption and decryption utilizing integer wavelet transform to take advantage of the property for adaptive context-based lossless audio coding. In addition, biometrics are used to give a significant level of classification and unwavering quality because the procedure has numerous qualities and points of interest. The offered algorithm utilized many properties of hand geometry estimations as keys to encode and decode the audio file. Many tests were carried out on a set… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…The proposed RCM is carried out thirty times for each benchmark function, while the statistical results (average as well as standard deviation) regarding the comparison of RCM with Artificial-Bee-Colony (ABC) [17], PSO [18], Gravitational Search Algorithm ( GSA) [19], Grey Wolf Optimizer (GWO) [20] and Biogeography-Based Optimizer (BBO) [21] are provided in Table 3 for unimodal functions as well as in Table 4 for multimodal functions…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed RCM is carried out thirty times for each benchmark function, while the statistical results (average as well as standard deviation) regarding the comparison of RCM with Artificial-Bee-Colony (ABC) [17], PSO [18], Gravitational Search Algorithm ( GSA) [19], Grey Wolf Optimizer (GWO) [20] and Biogeography-Based Optimizer (BBO) [21] are provided in Table 3 for unimodal functions as well as in Table 4 for multimodal functions…”
Section: Resultsmentioning
confidence: 99%
“…So, there is a need to optimize such spread by formulating nonlinear optimization problems via ordinary arithmetic operations rather than fuzzy operations. PSO was utilized to construct their membership functions [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30]. From all the above, it can be seen that no one metaheuristics algorithm can solve all kinds of problem domains; therefore, there is always a need for new algorithms that can address many types of problem domains.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Histogram analysis is a well-known algorithm used to illustrate and prove that the statistical properties of the secret and cover (stego-) messages are not affected by varying bits in some pixels or samples [26]- [28]. Table 6 contains some results for the cover audio and stego-audio before and after hiding, while Table 7 contains some results for the cover and stego-frame before & after hiding.…”
Section: Histogram Analysismentioning
confidence: 99%
“…The whole different keys, which are used in the encrypting is so-called "key space size" [2], [4], [28]. In this work, the key size applied is 10 64 , while the chance of detection key is equal to (2 × 𝑘𝑒𝑦 𝑠𝑖𝑧𝑒 𝑖𝑛 𝑏𝑖𝑡𝑠).…”
Section: Key Space Examinationmentioning
confidence: 99%
“…Security is a major requirement of many researchers, anyone how interested in can find a lot of papers that focus on this field, for example see [25]- [31]. At the same time, security and privacy concerns are the main issues that prevent wide acceptance of cloud concepts [3], [32] where switching to a commercial public cloud reduces direct control of systems that manage reliable data and applications [7].…”
Section: Security In Cloud Computingmentioning
confidence: 99%