Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 3
Page No. 739 - 745

Chaos-Based Speech Steganography and Quantum One Time Pad

Authors : Zaid A. Abod, Hussein A. Ismael and Alharith A. Abdullah

References

Alwahbani, S.M.H. and H.T.I. Elshoush, 2016. Chaos-Based Audio Steganography and Cryptography Using LSB Method and One-Time Pad. In: Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, Bi, Y., S. Kapoor and R. Bhatia (Eds.). Springer, Berlin, Germany, ISBN:978-3-319-56991-8, pp: 755-768.

Bennett, C.H. and G. Brassard, 2014. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci., 560: 7-11.
Direct Link  |  

Boykin, P.O. and V. Roychowdhury, 2003. Optimal encryption of quantum bits. Phys. Rev. A, Vol. 67,

Busch, P., T. Heinonen and P. Lahti, 2007. Heisenberg's uncertainty principle. Phys. Rep., 452: 155-176.
Direct Link  |  

Chirikov, B.V., 1971. Research concerning the theory of non-linear resonance and stochasticity. CM-P00100691, CERN Library, Geneva, Switzerland. http://inspirehep.net/record/898561/files/CM-P00100691.pdf.

Ismael, H.A. and S.B. Sadkhan, 2017. Security enhancement of speech scrambling using triple Chaotic Maps. Proceedings of the 2017 Annual Conference on New Trends in Information and Communications Technology Applications (NTICT’17), March 7-9, 2017, IEEE, Baghdad, Iraq, ISBN:978-1-5386-2963-5, pp: 132-137.

Johnson, N.F. and S. Jajodia, 1998. Exploring steganography: Seeing the unseen. Computer, 31: 26-34.
CrossRef  |  

Karthikeyan, B., A.C. Kosaraju and S. Gupta, 2016. Enhanced security in steganography using encryption and quick response code. Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET’16), March 23-25, 2016, IEEE, Chennai, India, ISBN:978-1-4673-9339-3, pp: 2308-2312.

Krishnan, S. and M.S. Abdullah, 2016. Enhanced security audio steganography by using higher least significant bit. J. Adv. Res. Comput. Appl., 2: 39-54.
Direct Link  |  

Laskar, S.A. and K. Hemachandran, 2012. High capacity data hiding using LSB steganography and encryption. Int. J. Database Manage. Syst., 4: 57-68.
Direct Link  |  

Pelosi, M.J., G. Kessler and M.S.S. Brown, 2016. One-time pad encryption steganography system. Proceedings of the Annual Conference on Digital Forensics, Security and Law (ADFSL’16), May 25, 2016, Embry-Riddle Aeronautical University, Florida, Arizona, USA., pp: 130-154.

Pierre, B., Y. Pomeau and C. Vidal, 1984. Order within Chaos. Wiley and Sons, New York, USA.,.

Pund-Dange, S. and C.G. Desai, 2015. Secured data communication system using RSA with mersenne primes and Steganography. Proceedings of the 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom’15), March 11-13, 2015, IEEE, New Delhi, India, ISBN:978-9-3805-4415-1, pp: 1306-1310.

Ren-Er, Y., Z. Zhiwei, T. Shun and D. Shilei, 2014. Image steganography combined with DES encryption pre-processing. Proceedings of the 2014 16th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA’14), January 10-11, 2014, IEEE, Zhangjiajie, China, ISBN:978-1-4799-3435-5, pp: 323-326.

Saini, J.K. and H.K. Verma, 2013. A hybrid approach for image security by combining encryption and steganography. Processings of the 2nd International Conference on Image Information (ICIIP’13), December 9-11, 2013, IEEE, Shimla, India, ISBN:978-1-4673-6099-9, pp: 607-611.

Satar, S.D.M., N.A. Hamid, F. Ghazali, R. Muda and M. Mamat et al., 2016. Secure image steganography using encryption algorithm. Proceedings of the Annual International Conference on Intelligent Computing, Computer Science and Information Systems (ICCSIS’16), April 28-29, 2016, Hotel Mercure Pattaya Ocean Resort, Pattaya, Thailand, pp: 43-46.

Steiner, M., G. Tsudik and M. Waidner, 1996. Diffie-Hellman key distribution extended to group communication. Proceedings of the 3rd ACM Conference on Computer and Communications Security, March 14-15, ACM Press, New Delhi, India, pp: 31-37.

Swain, G. and S.K. Lenka, 2014. Classification of image steganography techniques in spatial domain: A study. Intl. J. Comput. Sci. Eng. Technol., 5: 219-232.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved