Abstract
Aiming at implementations, we propose two 2-out-of-n audio cryptography schemes that do not need a computing device. In our schemes, we directly construct n sounds to embed secrets. For perceiving the embedded secrets, we can simultaneously play any two of the n shares. While doing this, we do not have to synchronize precisely. Particularly, the value n is unlimited and it is independent of both the perceiving contrast and band-width. The contrast of our scheme is superior to others. Since we do not need expensive computing devices, the cost of our scheme is also lower.
| Original language | English |
|---|---|
| Pages (from-to) | 53-58 |
| Number of pages | 6 |
| Journal | Journal of the Chinese Institute of Electrical Engineering, Transactions of the Chinese Institute of Engineers, Series E/Chung KuoTien Chi Kung Chieng Hsueh K'an |
| Volume | 11 |
| Issue number | 1 |
| State | Published - 02 2004 |
| Externally published | Yes |
Keywords
- Audio cryptography
- Data hiding
- Secret sharing
Fingerprint
Dive into the research topics of 'On the implementation of (2, n) audio cryptography schemes without computing devices'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver