A novel approach for verifiable (n, n) audio secret sharing scheme

Audio is a natural way of communication among persons. Nowadays, many cases of Phone-tapping, hacking of E-mail having some audio files have been reported. Hence, for sending a secret message in audio file over the internet, security and confidentiality must be assured. A secret message is commonly transmitted in encrypted form to assure confidentiality/security using a single key. This does not serve the purpose completely as knowing the key, the whole secret can be revealed. To enhance the security of the secret, sending it through multiple units is preferred. Here, a novel approach is proposed for the same. In the proposed approach an audio secret is divided into n audio shares such that information contained in any proper subset of share/shares (unit) is insignificant. With all the shares only secret can be revealed after performing some computation. Authenticity of the revealed secret can also be confirmed (if necessary) by checking the integrity of individual shares received. If any share is lost during transmission, the proposed scheme has the facility to determine the share number of the lost one, so that request may be sent for resending the same. The proposed scheme is suitable for real-time audio communication as the construction of shares is based upon the available bandwidth. Also, it does not need any cover audio to transmit the share. Experimentally, Mean Opinion Score (MOS) and correlation coefficient (r(S, Sr)) between input secret and revealed secret are found 5 and 0.99 respectively when there is no attack during the transmission. In case the total (either in one or more shares) attack is less than 50% of the size of a single share, MOS of the revealed secret lies between 3.8 to 4.

[1]  David S. Rosenblum,et al.  From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.

[2]  Yvo Desmedt,et al.  Audio and Optical Cryptography , 1998, ASIACRYPT.

[3]  Tsung-Ying Sun,et al.  An audio secret sharing system based on fractal encoding , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[4]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[5]  Yôiti Suzuki,et al.  Audio Secret Sharing for 1-Bit Audio , 2005, KES.

[6]  Ching-Nung Yang Improvements on Audio and Optical Cryptography , 2002, J. Inf. Sci. Eng..

[7]  Jun Zhong,et al.  Towards unsupervised physical activity recognition using smartphone accelerometers , 2016, Multimedia Tools and Applications.

[8]  Li Liu,et al.  Recognizing Complex Activities by a Probabilistic Interval-Based Model , 2016, AAAI.

[9]  D. Socek,et al.  General access structures in audio cryptography , 2005, 2005 IEEE International Conference on Electro Information Technology.

[10]  M.R. Aref,et al.  A novel secret sharing scheme from audio perspective , 2008, 2008 International Symposium on Telecommunications.

[11]  Ching-Nung Yang,et al.  New Audio Secret Sharing Schemes With Time Division Technique , 2003, J. Inf. Sci. Eng..

[12]  Sonali Patil,et al.  Analysing Secret Sharing Schemes for Audio Sharing , 2016 .

[13]  Luming Zhang,et al.  Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.

[14]  Jonathan G. Fiscus,et al.  DARPA TIMIT:: acoustic-phonetic continuous speech corpus CD-ROM, NIST speech disc 1-1.1 , 1993 .

[15]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[16]  Luming Zhang,et al.  Fortune Teller: Predicting Your Career Path , 2016, AAAI.

[17]  Mohammad Reza Aref,et al.  Some new issues on secret sharing schemes , 2008, 2008 International Conference on Telecommunications.