scholarly journals Security of Audio File based on Partial Encryption

2019 ◽  
Vol 178 (19) ◽  
pp. 1-4
Author(s):  
Sushant Jillawar ◽  
Trishala Sawant ◽  
Ajinkya Khurud ◽  
Jayashree Katti
Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 371
Author(s):  
Yerin Lee ◽  
Soyoung Lim ◽  
Il-Youp Kwak

Acoustic scene classification (ASC) categorizes an audio file based on the environment in which it has been recorded. This has long been studied in the detection and classification of acoustic scenes and events (DCASE). This presents the solution to Task 1 of the DCASE 2020 challenge submitted by the Chung-Ang University team. Task 1 addressed two challenges that ASC faces in real-world applications. One is that the audio recorded using different recording devices should be classified in general, and the other is that the model used should have low-complexity. We proposed two models to overcome the aforementioned problems. First, a more general classification model was proposed by combining the harmonic-percussive source separation (HPSS) and deltas-deltadeltas features with four different models. Second, using the same feature, depthwise separable convolution was applied to the Convolutional layer to develop a low-complexity model. Moreover, using gradient-weight class activation mapping (Grad-CAM), we investigated what part of the feature our model sees and identifies. Our proposed system ranked 9th and 7th in the competition for these two subtasks, respectively.


2018 ◽  
Vol 38 (2) ◽  
pp. 207-224 ◽  
Author(s):  
Melanie Revilla ◽  
Mick P. Couper ◽  
Oriol J. Bosch ◽  
Marc Asensio

We implemented an experiment within a smartphone web survey to explore the feasibility of using voice input (VI) options. Based on device used, participants were randomly assigned to a treatment or control group. Respondents in the iPhone operating system (iOS) treatment group were asked to use the dictation button, in which the voice was translated automatically into text by the device. Respondents with Android devices were asked to use a VI button which recorded the voice and transmitted the audio file. Both control groups were asked to answer open-ended questions using standard text entry. We found that the use of VI still presents a number of challenges for respondents. Voice recording (Android) led to substantially higher nonresponse, whereas dictation (iOS) led to slightly higher nonresponse, relative to text input. However, completion time was significantly reduced using VI. Among those who provided an answer, when dictation was used, we found fewer valid answers and less information provided, whereas for voice recording, longer and more elaborated answers were obtained. Voice recording (Android) led to significantly lower survey evaluations, but not dictation (iOS).


Author(s):  
Heidi Biseth ◽  
Halla Holmarsdottir
Keyword(s):  

Editorial discussion in an audio file - available for download on the right-hand side column - 7,5 minutes.


Author(s):  
Pinky Saikia Dutta ◽  
Sauvik Chakraborty

Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.


Author(s):  
Jawwad Ali Baloch ◽  
Awais Khan Jumani ◽  
Asif Ali Laghari ◽  
Vania V. Estrela ◽  
Ricardo T. Lopes

Author(s):  
G. Suseela ◽  
Y. Asnath Victy Phamila

Due to the significance of image data over the scalar data, the camera-integrated wireless sensor networks have attained the focus of researchers in the field of smart visual sensor networks. These networks are inexpensive and found wide application in surveillance and monitoring systems. The challenge is that these systems are resource deprived systems. The visual sensor node is typically an embedded system made up of a light weight processor, low memory, low bandwidth transceiver, and low-cost image sensor unit. As these networks carry sensitive information of the surveillance region, security and privacy protection are critical needs of the VSN. Due to resource limited nature of the VSN, the image encryption is crooked into an optimally lower issue, and many findings of image security in VSN are based on selective or partial encryption systems. The secure transmission of images is more trivial. Thus, in this chapter, a security frame work of smart visual sensor network built using energy-efficient image encryption and coding systems designed for VSN is presented.


Author(s):  
Muhammad Yaasir Khodabacchus

In our global community, the Internet, the issue of copyright is increasing. The International Maritime Bureau (IMB) reported over thousands of incidents this year compared to three hundred only ten years ago. Although laws and other ways have been intended to protect the rights of content developers and describe restrictions that can be placed on copying materials, pirate users always find a way to breach the protection. Base on this fact, a new method has been implemented using biometrics as it is described in the following chapters. This paper was developed taking into consideration one of the most widely used biometrics which is the fingerprint. Precisely, the aim of the system includes embedding the fingerprint into an audio file which can only be read using the fingerprint of the registered user.


Author(s):  
Shiguo Lian

In a wireless environment, multimedia transmission is often affected by the error rate; delaying; terminal’s power or bandwidth; and so forth, which brings difficulties to multimedia content protection. In the past decade, wireless multimedia protection technologies have been attracting more and more researchers. Among them, wireless multimedia encryption and watermarking are two typical topics. Wireless multimedia encryption protects multimedia content’s confidentiality in wireless networks, which emphasizes on improving the encryption efficiency and channel friendliness. Some means have been proposed, such as the format-independent encryption algorithms that are time efficient compared with traditional ciphers; the partial encryption algorithms that reduce the encrypted data volumes by leaving some information unchanged; the hardware-implemented algorithms that are more efficient than software based ones; the scalable encryption algorithms that are compliant with bandwidth changes; and the robust encryption algorithms that are compliant with error channels. Compared with wireless multimedia encryption, wireless multimedia watermarking is widely used in ownership protection, traitor tracing, content authentication, and so forth. To keep low cost, a mobile agent is used to partitioning some of the watermarking tasks. To counter transmission errors, some channel encoding methods are proposed to encode the watermark. To keep robust, some means are proposed to embed a watermark into media data of low bit rate. Based on both watermarking and encryption algorithms, some applications arise, such as secure multimedia sharing or secure multimedia distribution. In this chapter, the existing wireless multimedia encryption and watermarking algorithms are summarized according to the functionality and multimedia type; their performances are analyzed and compared; the related applications are presented; and some open issues are proposed.


Sign in / Sign up

Export Citation Format

Share Document