Skip to main content
Log in

Providing security and privacy to huge and vulnerable songs repository using visual cryptography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the today’s scenario, the number of online song repositories such as iTunes, Hungama.com, etc. is increasing day-by-day. The reason for this can be attributed to the exponential growth in the Internet users in the past few years. These song repositories store huge number of songs (mostly in millions) and charge their users for listening and downloading them. With increased number of users requires more enhanced security measures to protect such vulnerable songs repository. Any breach in security of such song repositories would not only cause huge financial loss but also copyright infringement for the owners. Therefore, in this paper we have presented a novel and efficient approach for providing security and privacy to huge and vulnerable songs repository using visual cryptography. Presented approach not only provides confidentiality to the songs but also provides integrity verification with access control to the songs repository. We have also removed various basic security constraints of (2, 2) visual cryptography existed in most of the state of art approaches like meaningless pattern of the shares, explicit codebook requirement, contrast loss, lossy recovery etc which are eliminated in the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Al-Ayyoub M, AlZu’bi S, Jararweh Y, Shehab MA, Gupta BB (2016) Accelerating 3D Medical Volume Segmentation Using GPUs. Springer, MTAP

    Google Scholar 

  2. Al-Nuaimy W, El-Bendary MAM, Shafik A, Shawki F, Abou-El-azm AE, El-Fishawy NA, Elhalafawy SM et al (2011) An SVD audio watermarking approach using chaotic encrypted images. Digital Signal Process 21(6):764–779

    Article  Google Scholar 

  3. Bhat V, Sengupta I, Das A (2010) An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digital Signal Process 20(6):1547–1558

    Article  Google Scholar 

  4. Ciptasari RW, Rhee K-H, Sakurai K (2014) An enhanced audio ownership protection scheme based on visual cryptography. EURASIP J Inf Secur 1(1):2

    Article  Google Scholar 

  5. Dhar PK, Shimamura T (2015) Blind SVD-based audio watermarking using entropy and log-polar transformation. JISA 20:74–83

    Google Scholar 

  6. Fu MS, Au OC (2004) Joint visual cryptography and watermarking. Int. Conf. Multimedia and Expo in Proc. IEEE, Taipei, Taiwan

  7. George JT, Arokiaraj Jovith A (2016) A Fragmented Approach: Audio Steganography using Phase Coding and LSB. Int J Appl Eng Res 11(7):5228–5230

    Google Scholar 

  8. Hemalatha S, Dinesh Acharya U, Renuka A (2015) Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image. Procedia Comput Sci 47:272–281

    Article  Google Scholar 

  9. Hemalatha S, Dinesh Acharya U, Renuka A (2016) Audio data hiding technique using integer wavelet transform. Int J Electron Secur Digit Forensics 8(2):131–147

    Article  Google Scholar 

  10. Hu H-T, Hsu L-Y (2015) Robust, transparent and high-capacity audio watermarking in DCT domain. Signal Process 109:226–235

    Article  Google Scholar 

  11. Hu H-T, Hsu L-Y, Chou H-H (2014) Perceptual-based DWPT-DCT framework for selective blind audio watermarking. Signal Process 105:316–327

    Article  Google Scholar 

  12. Hua G, Huang J, Shi YQ, Goh J, Thing VLL (2016) Twenty years of digital audio watermarking—a comprehensive review. Signal Process 128:222–242

    Article  Google Scholar 

  13. Khalil M, Adib A (2014) Audio watermarking with high embedding capacity based on multiple access techniques. Digital Signal Process 34:116–125

    Article  Google Scholar 

  14. Lee C-W, Tsai W-H (2013) A covert communication method via spreadsheets by secret sharing with a self-authentication capability. J Syst Softw 86(2):324–334

    Article  Google Scholar 

  15. Li J, Yu C, Gupta BB, Ren X (2017) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Springer, MTAP

    Google Scholar 

  16. Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik-Int J Light and Electron Optics 127(19):7431–7438

    Article  Google Scholar 

  17. Naor M, Pinkas B (1997) Visual authentication and identification. Crypto97, LNCS, vol. 1294, pp 322340

  18. Naor M and Shamir A (1995) Visual cryptography, Advances in Cryptograhy: EUROCRYPT94, LNCS, Perugia, Italy, vol. 950, pp. 112

  19. Shivani S, Agarwal S (2016) VPVC: Progressive Verifiable Visual Cryptography. Pattern Anal Applic Doi:https://doi.org/10.1007/s10044-016-0571-x, ISSN 1433-7541

  20. Shivani S, Agarwal S (n.d.) Speech Secret Sharing. Advances in Computer Science and Information Technology (ACSIT) p-ISSN: 2393-9907; e-ISSN: 2393-9915, Vol. 3, Issue 2

  21. Singh D, Shivani S, Agarwal S (2013) Quantization-based fragile watermarking using block-wise authentication and pixel-wise recovery scheme for tampered image. Int J Image Graph 13(02):1340002

    Article  Google Scholar 

  22. Washio S, Watanabe Y (2014) Security of audio secret sharing scheme encrypting audio secrets with bounded shares. In 2014 I.E. International Conference on Acoustics, Speech and Signal Processing (ICASSP) Florence, pp. 7396–7400

  23. Xia Z, Wang X, Sun X, Wang Q (2015) A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans Parallel Distrib Syst 27(2):340–352

    Article  Google Scholar 

  24. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608

    Article  Google Scholar 

  25. Zarepour-Ahmadabadi J, Ahmadabadi MES, Latif AM (2016) An adaptive secret image sharing with a new bitwise steganographic property. Inform Sci 369:467–480

    Article  MathSciNet  Google Scholar 

  26. Zhou Z, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):24412453

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shivendra Shivani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shivani, S., Tiwari, S., Mishra, K.K. et al. Providing security and privacy to huge and vulnerable songs repository using visual cryptography. Multimed Tools Appl 77, 11101–11120 (2018). https://doi.org/10.1007/s11042-017-5240-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5240-6

Keywords

Navigation