Skip to main content
Log in

New audio encryption package for TV cloud computing

  • Published:
International Journal of Speech Technology Aims and scope Submit manuscript

Abstract

For any cloud computing (ClComp), encryption of multimedia is one of the main applications as cloud tries to maintain it in a good situation and protect from any tampering. This work provides a new technique for audio for TV cloud computing. Encrypting the audio signals is addressed based on chaotic map and the algorithm was tested using an audio tone (AT) to evaluate the performance. The software of encrypt audio using AT based on chaotic map is specially designed to meet the needs of ClComp of Egyptian Radio and Television Union (ERTU). The proposed software of ClComp of ERTU is practical in nature and aims to provide individuals with an understanding of how to create cutting-edge web applications to be deployed distributive across the latest hosting platforms of ClComp of ERTU, including public/hybrid ClComp of ERTU, peer-to-peer networks, clusters, and multi-servers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  • Baldini, G., Picchi, O., Luise, M., Sturman, T. A., vergari, F., Moy, C., et al. (2012). The euler project: Application of software defined radio in joint security operations. IEEE Communications Magazine, 50(3), 55–71.

    Google Scholar 

  • Constantiou, I. D., & Mahnke, V. (2010). Consumer behaviour and mobile TV services: Do men differ from women in their adoption intentions? Journal of Electronic Commerce Research, 11(2), 127–139.

    Google Scholar 

  • Crochiere, R. E., Tribolet, J. M., & Rabiner, L. R. (1950). An interpretation of the log likelihood ratio as a measure of waveform coder performance. IEEE Transactions on Acoustics, Speech, and Signal Processing, ASSP–25(3), 315–323.

    Google Scholar 

  • Eldin, S. M. S., Khamis, S. A., Hassanin, A.-A. I. M., Alsharqawy, M. A. (2013). ERTU’s package for gray image watermark application. Journal of Selected Areas in Telecommunications (JSAT), October Edition, 2013.

  • Elmasry, G. F., Jain, M., Welsh, R., Jakubowski, K., & Wittaker, K. (2012). Security and network operations challenges with cellular infrastructure in the tactical Theater. IEEE Communications Magazine, 50(3), 72–80.

    Article  Google Scholar 

  • Fadlullah, Z. Md., Kato, N., Lu, R., Shen, X. ( Sherman), & Nozaki, Y. (2012). Toward secure targeted broadcast in smart grid. IEEE Communications Magazine, 50(5), 150–156.

  • Garner, G. M., & Ryu, H. (Eric). (2011). Synchronization of audio/video bridging networks using IEEE 802.1AS. Communications Magazine, IEEE, 49(2), 140–147.

  • He, D., Chen, C., Bu, J., Chan, S., Zhang, Y., & Guizani, M. (2012). Secure service provision in smart grid communications. IEEE Communications Magazine, 50(8), 52–61.

    Article  Google Scholar 

  • Hedelin, P., Norden, F., & Skoglund, J. (1999). SD optimization of spectral coders. In IEEE Workshop on Speech Coding Proceedings, 28–30.

  • Högberg, J. (2010). Mobile Provided Identity Authentication on the Web, http://projectliberty.org/liberty/content/download/4315/28869/file/WPBridgingIMS_AndInternetIdentity_V1.0.pdf. Acce-ssed July 2013.

  • Iqbal, A., & Ahmed, K. M. (2011). A hybrid satellite terrestrial cooperative network over non identically distributed fading channels. Journal of Communications, 6(7), 581–589.

  • Lee, E.-K., Gerla, M., & Oh, S. Y. (2012). Physical layer security in wireless smart grid. IEEE Communications Magazine, 50(8), 46–52.

  • Li, R., Qin, Z., Sha, L., Wang, B. (2009). A novel audio scrambling algorithm in variable dimension space, Feb. 2009, (pp.1647–1651).

  • Marin-Lopez, R., Pereniguez, F., Gomez-Skarmeta, A. F., & Ohba, Y. (2012). Network access security for the internet: Protocol for carrying authentication for network access. IEEE Communications Magazine, 50(3), 84–92.

    Article  Google Scholar 

  • Mierau, G., Aachen, R., Sträßer, M. & Aachen, R. (2011). Mobile Native vs. Web-based Learning Applications: A comparison between two modern mobile learning approaches, 8. http://www.netmarketshare.com/browser-market-share.aspx?qprid=2&qpcustomd=1&qptimeframe=Y (report generated November 25, 2011)

  • Naeem, E. A., AbdElnaby, M. M., & Hadhoud, M. M. (2009). Chaotic image encryption in transform domains. IEEE, 71–76.

  • Polák, L., & Kratochvíl, T. (2011). Analysis and simulation of the transmission distortions of the mobile digital television DVB-SH Part 1: Terrestrial mode DVB-SH-A with OFDM. Radioengineering, 20(4), 952–960.

    Google Scholar 

  • Polák, L., & Kratochvíl, T. (2012). Analysis and simulation of the transmission distortions of the mobile digital television DVB-SH Part 2: Satellite Mode DVB-SH-B with TDM. Radioengineering, 21(1), 126–133.

  • Qiu, M., Su, H., Chan, M., Ming, Z., & Laurence, T. (2012). Balance of security strength and energy for a PMU monitoring system in smart grid. IEEE Communications Magazine, 50(5), 142–149.

  • Raza, H. (2011). A brief survey of radio access network backhaul evaluation: Part I. IEEE Communications Magazine, 49(6), 164–171.

  • Sridharan, S., Dawson, E., & Goldburg, B. (1991). Fast fourier transform based speech encryption system. IEEE Proceedings-I, 135(3), 215–223.

    Google Scholar 

  • Su, H., Qui, M., & Wang, H. (2012). Secure wireless communication system for smart grid with rechargeable electric vehicles. IEEE Communications Magazine, 50(8), 62–68.

    Article  Google Scholar 

  • Tamayo-Fernández, R., Mendoza-Valencia, P. J., & Serrano-Santoyo, A. (2011). An architecture for design and planning of mobile television networks. Journal of Applied Research and Technology, 9, 277–290.

    Google Scholar 

  • Tartarelli, S., d’Heureuse, N., & Nicolini, S. (2010). Lessons learned on the usage of call logs for security and management in IP telephony. IEEE Communications Magazine, 50(12), 76–82.

    Article  Google Scholar 

  • Tribolet, J. M., Noll, P., McDermott, B. J., & Crochier, R. E. (1978). A study of complexity and quality of speech waveform coders. IEEE International Conference on Acoustics, Speech, and SignalProcessing, ICASSP ’78, 556–590.

  • Vingelmann, P., Fitzek, F. H., Pedersen, M. V., Heide, J., & Charaf, H. (2011). Synchronized multimedia streaming on the iPhone platform with network coding. The 8th Annual IEEE Consumer Communications and Networking Conference—Multimedia & Entertainment Networking and Services, 49(6), 126–132.

  • Yasumoto, K., Nunokawa, Y., Sun, W., & Ito, M. (2011). Improving mobile terrestrial TV playback quality with cooperative streaming in MANET. IEEE WCNC 2010—Service and application, 2101–2106.

  • Yin, P., Min, L. (2010). A color image encryption algorithm based generalized Chaos synchronization for bidirectional discrete systems for audio signal communication. International Conference on Intelligent Control and Information Processing, Dalian, China, (pp.443–447) August 13–15, 2010.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed A. Alsharqawy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Eldin, S.M.S., Khamis, S.A., Hassanin, AA.I.M. et al. New audio encryption package for TV cloud computing. Int J Speech Technol 18, 131–142 (2015). https://doi.org/10.1007/s10772-014-9253-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10772-014-9253-5

Keywords

Navigation