РОЗРОБКА МЕТОДУ ПЕРЕДАЧІ СЕКРЕТНИХ ПОВІДОМЛЕНЬ НА БАЗІ ХЕШУВАННЯ ЦИФРОВИХ АУДІОФАЙЛІВ (Ukrainian)

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Alternate Title:
      DEVELOPMENT OF A METHOD FOR TRANSMITTING SECRET MESSAGES BASED ON HASHING OF DIGITAL AUDIO FILES. (English)
    • Abstract:
      Steganography and cryptography are at their peak these days. One of the types of steganography is hash steganography. This is a fundamentally new direction in the transmission of secret information. Hash steganography methods are based on the fact that instead of embedding secret information into a container, we transmit a specific sequence of digital signals and recover messages from their hash codes. Digital images are commonly used for these principles to work. However, digital audio files, thanks to the many services and messengers, are becoming an increasingly popular method of transferring information. Therefore, the development of hash steganography methods based on the use of audio signals is urgent. The aim of this work is to improve the efficiency of transmission of a secret message by modifying the hash steganography method. In this paper, the Shazam's algorithm is used to obtain hash codes of a digital audio signals that are resistant to attacks and file transformations. this method does not use embedding additional information in the audio file as a container. In this method, it is proposed to use a hash code (hereinafter the hash) obtained from audio files to build a stegan message. But when transferring and converting audio files, the integrity of their hash code may be compromised due to possible loss of quality and noise. This can interfere with matching files and hash codes and restoring the secret message. One of the popular audio file identification services is the Shazam software application. Shazam allows you to correctly identify audio tracks, even in the presence of noise, extraneous sounds and more. Consider the main steps of this algorithm for their use in obtaining attack-resistant hash codes of audio signals. This algorithm allows representing audio as a set of special points, which are then converted into hash codes using the MD5 method. Secret messages are recovered from these hash codes after receiving a specific sequence of audio signals. The developed algorithm has no analogues for comparison, but it is resistant to attacks. [ABSTRACT FROM AUTHOR]
    • Abstract:
      Copyright of Informatics & Mathematical Methods in Simulation is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)