Abstract
Audio Secret Sharing (ASS) is a technique used to protect audio data from tampering and disclosure by dividing it into shares such that qualified shares can reconstruct the original audio data. Existing ASS schemes encrypt binary secret messages and rely on the human auditory system for decryption by simultaneously playing authorized shares. This decryption approach tends to overburden the human auditory system when the number of shares used to reconstruct the secret increases [3]. Furthermore, it does not create room for further analysis or computation to be performed on the reconstructed secret since decryption ends at the human auditory system. Additionally, schemes in [2], [3], [4], [6] do not extend to the general (k, n) threshold. In this paper we propose an ASS scheme based on Shamir’s secret sharing, which is (k, n) threshold, ideal2, and information theoretically secure and it provides computationally efficient decryption.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)
Lin, C.C., Laih, C.S., Yang, C.N.: New Audio Secret Sharing Schemes With Time Division Technique. Journal of Information Science and Engineering 19, 605–614 (2003)
Desmedt, Y.G., Hou, S., Quisquater, J.-J.: Audio and optical cryptography. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 392–404. Springer, Heidelberg (1998)
Nishimura, R., Fujita, N., Suzuki, Y.: Audio Secret Sharing for 1-Bit Audio. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3682, pp. 1152–1158. Springer, Heidelberg (2005)
Ehdaie, M., Eghlidos, T., Aref, M.R.: A novel secret sharing scheme from audio perspective. In: International Symposium on Telecommunications, pp. 13–18. IEEE, Tehran (2008)
Yoshida, K., Watanabe, Y.: Security of audio secret sharing scheme encrypting audio secrets. In: International Conference for Internet Technology and Secured Transactions, pp. 294–295. IEEE, London (2012)
Washio, S., Watanabe, Y.: Security of audio secret sharing scheme encrypting audio secrets with bounded shares. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014), pp. 7396–7400. IEEE, Italy (2014)
Stallings, W.: Cryptography and Network Security Principles and Practice, 5th edn. Prentice-Hall (2010)
SVV media audio database, http://download.wavetlan.com/SVV/Media/HTTP/http-wav.htm
Atrey Pradeep, K., Alharthi, S., Hossain, M.A., AlGhamdi, A., El-Saadik, A.: Collective control over sensitive video data using secret sharing. Multimedia Tools and Applications (2013), doi:10.1007/s11042-013-1644-0
Chan, K.F.P.: Secret Sharing in Audio Steganography. In: Information Security South Africa, ISSA. South Africa (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Yakubu, M.A., Maddage, N.C., Atrey, P.K. (2015). Audio Secret Management Scheme Using Shamir’s Secret Sharing. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds) MultiMedia Modeling. MMM 2015. Lecture Notes in Computer Science, vol 8935. Springer, Cham. https://doi.org/10.1007/978-3-319-14445-0_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-14445-0_34
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14444-3
Online ISBN: 978-3-319-14445-0
eBook Packages: Computer ScienceComputer Science (R0)