Back to Search
Start Over
РОЗРОБКА МЕТОДУ ПЕРЕДАЧІ СЕКРЕТНИХ ПОВІДОМЛЕНЬ НА БАЗІ ХЕШУВАННЯ ЦИФРОВИХ АУДІОФАЙЛІВ
- Source :
-
Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì . 2020, Vol. 10 Issue 3/4, p136-141. 6p. - Publication Year :
- 2020
-
Abstract
- Steganography and cryptography are at their peak these days. One of the types of steganography is hash steganography. This is a fundamentally new direction in the transmission of secret information. Hash steganography methods are based on the fact that instead of embedding secret information into a container, we transmit a specific sequence of digital signals and recover messages from their hash codes. Digital images are commonly used for these principles to work. However, digital audio files, thanks to the many services and messengers, are becoming an increasingly popular method of transferring information. Therefore, the development of hash steganography methods based on the use of audio signals is urgent. The aim of this work is to improve the efficiency of transmission of a secret message by modifying the hash steganography method. In this paper, the Shazam's algorithm is used to obtain hash codes of a digital audio signals that are resistant to attacks and file transformations. this method does not use embedding additional information in the audio file as a container. In this method, it is proposed to use a hash code (hereinafter the hash) obtained from audio files to build a stegan message. But when transferring and converting audio files, the integrity of their hash code may be compromised due to possible loss of quality and noise. This can interfere with matching files and hash codes and restoring the secret message. One of the popular audio file identification services is the Shazam software application. Shazam allows you to correctly identify audio tracks, even in the presence of noise, extraneous sounds and more. Consider the main steps of this algorithm for their use in obtaining attack-resistant hash codes of audio signals. This algorithm allows representing audio as a set of special points, which are then converted into hash codes using the MD5 method. Secret messages are recovered from these hash codes after receiving a specific sequence of audio signals. The developed algorithm has no analogues for comparison, but it is resistant to attacks. [ABSTRACT FROM AUTHOR]
Details
- Language :
- Ukrainian
- ISSN :
- 22235744
- Volume :
- 10
- Issue :
- 3/4
- Database :
- Academic Search Index
- Journal :
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì
- Publication Type :
- Academic Journal
- Accession number :
- 150839938
- Full Text :
- https://doi.org/10.15276/imms.v10.no3-4.136