A novel group based cryptosystem based on electromagnetic rotor machine

11/03/2020
by   Ashish Kumar, et al.
0

In this paper, an algorithm is aimed to make a cryptosystem for gray level images based on voice features, secret sharing scheme and electromagnetic rotor machine. Here, Shamir secret sharing (k n) threshold scheme is used to secure a key along with voice features of (n k) users. Keystream is molded by coefficients of a voice sample, using this key stream, rotor machines rotating cylinders positions are initialized and internal wiring is decided by pseudo random number of Henon chaotic map, where initial seed for chaotic system is chosen from keystream. And furthermore, shares of key stream are distributed among users. Speech processing is fused with electromagnetic machine to provide authentication as well as group based encryption. Perceptual linear predication (PLP) coefficients are utilized for formation of secret key. Simulation experiments and statistical analysis demonstrate that the proposed algorithm is sensitive to initial secret keystream, entropy, mean value analysis and histogram of the encrypted image is admirable. Hence, the proposed scheme is resistible to any vulnerable situation.

READ FULL TEXT

page 1

page 4

research
03/31/2020

Yet another insecure group key distribution scheme using secret sharing

A recently proposed group key distribution scheme known as UMKESS, based...
research
10/26/2017

High Capacity, Secure (n, n/8) Multi Secret Image Sharing Scheme with Security Key

The rising need of secret image sharing with high security has led to mu...
research
08/06/2019

Tightly Coupled Secret Sharing and Its Application to Group Authentication

Group oriented applications are getting more and more popular in today's...
research
08/27/2019

Authenticated Hand-Over Algorithm for Group Communication

Shamir or Blakley secret sharing schemes are used for the authentication...
research
02/19/2021

Introducing an experimental distortion-tolerant speech encryption scheme for secure voice communication

The current increasing need for privacy-preserving voice communications ...
research
05/24/2023

An Efficient Key Management Scheme For In-Vehicle Network

Vehicle technology has developed rapidly these years, however, the secur...
research
09/28/2018

A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems

In this paper, we propose a novel biometric cryptosystem for vectorial b...

Please sign up or login with your details

Forgot password? Click here to reset