On the implementation of (2, n) audio cryptography schemes without computing devices

Shin Yan Chiou*, Chi Sung Laih

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

1 Scopus citations

Abstract

Aiming at implementations, we propose two 2-out-of-n audio cryptography schemes that do not need a computing device. In our schemes, we directly construct n sounds to embed secrets. For perceiving the embedded secrets, we can simultaneously play any two of the n shares. While doing this, we do not have to synchronize precisely. Particularly, the value n is unlimited and it is independent of both the perceiving contrast and band-width. The contrast of our scheme is superior to others. Since we do not need expensive computing devices, the cost of our scheme is also lower.

Original languageEnglish
Pages (from-to)53-58
Number of pages6
JournalJournal of the Chinese Institute of Electrical Engineering, Transactions of the Chinese Institute of Engineers, Series E/Chung KuoTien Chi Kung Chieng Hsueh K'an
Volume11
Issue number1
StatePublished - 02 2004
Externally publishedYes

Keywords

  • Audio cryptography
  • Data hiding
  • Secret sharing

Fingerprint

Dive into the research topics of 'On the implementation of (2, n) audio cryptography schemes without computing devices'. Together they form a unique fingerprint.

Cite this