Abstract
In this paper, we are using Dynamic key dependent AES algorithm and standard AES (Advanced Encryption Standards) to encrypt and decrypt audio file. To analysis the quality of algorithms both algorithms are successfully tested using histogram analysis, peak signal to noise ratio (PSNR), correlation analysis and entropy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Forouzan, B.: Traditional symmetric-key cipher. In Introduction to Cryptography and Network Security, 1st edn., pp. 55–96. McGraw-Hill, New York (2008)
Forouzan, B.: Traditional asymmetric-key cryptography. In Introduction to Cryptography and Network Security, 1st edn., pp. 293–335. McGraw-Hill, New York (2008)
Diaa, S., Hatem, A.K., Mohiy, M.H.: Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. IJNS 11(2), 78–87 (2010)
Diaa, S., Hatem, A.K., Mohiy, M.H.: Evaluating the performance of symmetric encryption algorithms. IJNS 10(3), 213–219 (2010)
Akash, K.M., Chandra, P., Archana, T.: Performance evaluation of cryptographic algorithms: DES and AES. In: IEEE Students’ Conference on Electrical, Electronics and Computer Science (2011)
Verma, O.P., Ritu, A., Dhiraj, D., Shobha, T.: Performance analysis of data encryption algorithms. IEEE (2011)
Radha, A.N., Venkatesulu, M.: A complete binary tree structure block cipher for real-time multimedia. In: Science and Information Conference (2013)
Sruthi, B.A., Karthigaikumar, P., Sandhya, R., Naveen, J.K., Siva Mangai, N.M.: A secure cryptographic scheme for audio signals (2013)
Ganesh Babu, S., IIango, P.: Higher dimensional chaos for audio encryption. IEEE (2013)
Pavithra, S., Ramadevi, E.: Throughput analysis of symmetric algorithms. IJANA 4(2), 1574–1577 (2012)
Bismita, G., Chittaranjan, P.: Selective Encryption on MP3 compression. MES J. Technol. Manag. (2011)
Raghunandhan, K.R., Radhakrishna, D., Sudeepa, K.B., Ganesh, A.: Efficient audio encryption algorithm for online applications using transposition and multiplicative non-binary system. IJERT 2(6) (2013)
Majdi, A., Lin, Y.H.: Simple encryption/decryption application. IJCSS, 1(1) (2007)
Saurabh, S., Pushpendra, K.P.: A study on different approaches of selective encryption technique. IJCSCN 2(6), 658–662 (2012)
Shine, P.J., Sudhish, N.G., Deepthi, P.P.: An audio encryption technique based on LFSR based alternating step generator. IEEE Connect (2014)
Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28, 656–715 (2006)
Agarwal, P., Singh, A., Kilicman, A.: Development of key dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant. Adv. Mech. Eng. 10(7), 1–18 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Singh, A., Agarwal, P., Chand, M. (2021). A Comparative Study of Audio Encryption Analysis Using Dynamic AES and Standard AES Algorithms. In: Balas, V., Jain, L., Balas, M., Shahbazova, S. (eds) Soft Computing Applications. SOFA 2018. Advances in Intelligent Systems and Computing, vol 1222. Springer, Cham. https://doi.org/10.1007/978-3-030-52190-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-52190-5_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52189-9
Online ISBN: 978-3-030-52190-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)