Back to Search Start Over

РОЗРОБКА МЕТОДУ ПЕРЕДАЧІ СЕКРЕТНИХ ПОВІДОМЛЕНЬ НА БАЗІ ХЕШУВАННЯ ЦИФРОВИХ АУДІОФАЙЛІВ

Authors :
Зоріло, В. В.
Лебедєва, О. Ю.
Конофольський, В. В.
Source :
Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì. 2020, Vol. 10 Issue 3/4, p136-141. 6p.
Publication Year :
2020

Abstract

Steganography and cryptography are at their peak these days. One of the types of steganography is hash steganography. This is a fundamentally new direction in the transmission of secret information. Hash steganography methods are based on the fact that instead of embedding secret information into a container, we transmit a specific sequence of digital signals and recover messages from their hash codes. Digital images are commonly used for these principles to work. However, digital audio files, thanks to the many services and messengers, are becoming an increasingly popular method of transferring information. Therefore, the development of hash steganography methods based on the use of audio signals is urgent. The aim of this work is to improve the efficiency of transmission of a secret message by modifying the hash steganography method. In this paper, the Shazam's algorithm is used to obtain hash codes of a digital audio signals that are resistant to attacks and file transformations. this method does not use embedding additional information in the audio file as a container. In this method, it is proposed to use a hash code (hereinafter the hash) obtained from audio files to build a stegan message. But when transferring and converting audio files, the integrity of their hash code may be compromised due to possible loss of quality and noise. This can interfere with matching files and hash codes and restoring the secret message. One of the popular audio file identification services is the Shazam software application. Shazam allows you to correctly identify audio tracks, even in the presence of noise, extraneous sounds and more. Consider the main steps of this algorithm for their use in obtaining attack-resistant hash codes of audio signals. This algorithm allows representing audio as a set of special points, which are then converted into hash codes using the MD5 method. Secret messages are recovered from these hash codes after receiving a specific sequence of audio signals. The developed algorithm has no analogues for comparison, but it is resistant to attacks. [ABSTRACT FROM AUTHOR]

Details

Language :
Ukrainian
ISSN :
22235744
Volume :
10
Issue :
3/4
Database :
Academic Search Index
Journal :
Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì
Publication Type :
Academic Journal
Accession number :
150839938
Full Text :
https://doi.org/10.15276/imms.v10.no3-4.136