Visual Symmetric Speech Cryptography
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
W Diffie, M Hellman .New Directions in cryptography. IEEE Transactions on Information Theory,IT-22:644-654,1976
Tang Songsheng, Ma Xianzhen, “Research of Typical block cipher algorithmâ€, IEEE national conference,
vol. 1, pp. 319-321, Aug. 2010.
Bart Preneel “Cryptographic Hash Functions: Theory and Practices†Springer INDOCRYPT vol. 6498, pp. 115-117, 2010,
Stallings. William, “Cryptography and network security Principles and Practice Second Edition [M]â€, Beijing: Publishing House of Electronics Industry, 2004.
M. Rajeswara Rao, R.K. Sharma, “FPGA implementation of combined AES-128â€, Computing Communication and Networking Technologies(ICCCNT) 2017 8th International Conference on, pp-1-6 , May 2017
Like Zhang, Sheng Liu.†Secret Telephone Technology based on information Hiding and Encryptionâ€, presented at IEEE International conference on information Acquisition,
Weihai, China, Aug. 2003
Pahlavan Tafti A.,Janosepah S.(2011) Digital Images Encryption in Frequency Domain Based on DCT and One Dimensional Cellular Automata. In: Abd Manaf A, Zeki A., Zamani M., Chuprat S.,EI-Qawasmeh E.(eds) Informatics Engineering and Information Science, ICIEIS, 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg.
A. Kulkarni, Sheetal & B. Patil, Shubhangi, “A Robust encryption method for speech data hiding in digital images for optimized securityâ€,Presented at International Conference on Pervasive Computing(ICPC), January, 2015
Bradley, “Programming for Engineersâ€, [Online] Available:
https://www.springer.com/in/book/9783652233029
Konstantin Melikhov, Feng Tian,Jie Qiu,Quan Chen, Hock Soon Seah., “DBSC-Based Grayscale Line Image Vectorization.â€, Journal Of computer science and technology, Volume 1,Issue 2, pp 244-248, , Springer March 2006.