Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


January Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the January 2023 Edition of the journal. The last date of research paper submission is December 15, 2022.

Cogent Sharing Of Covert File Using Audio Cryptographic Scheme

P. V. Khobragade, Nilesh Uke Published in

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
Info Co-published with IJCA
Download full text
  1. P V Khobragade and Nilesh Uke. Article: Cogent Sharing Of Covert File Using Audio Cryptographic Scheme. International Journal of Applied Information Systems 1(8):1-4, April 2012. BibTeX

    	author = "P. V. Khobragade and Nilesh Uke",
    	title = "Article: Cogent Sharing Of Covert File Using Audio Cryptographic Scheme",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 1,
    	number = 8,
    	pages = "1-4",
    	month = "April",
    	note = "Published by Foundation of Computer Science, New York, USA"


In an audio secret sharing scheme, the shares are created by embedding the secret message into an audio file. The audio or the music file which is used to embed the given message is called cover sound. A 2-out-of-2 audio cryptography is a secret sharing scheme that can be used to hide a digital message into 2 shares and we can perceive the message by playing these 2 sounds simultaneously. In this paper a new (2, 2) audio cryptography scheme is proposed. The proposed scheme hides a digital secret message into two audio files. The original secret sound or audio file can be recovered back by playing simultaneously both the audio files.


  1. Menezes, A. , Oorschot, P. V. , Vanstone, S. ,"Handbook of Applied Cryptography", CRC Press, 1996
  2. G. Blakley, "Safeguarding Cryptographic Keys", in Proc. American Federation of Information Processing Societies (AFIPS) Arlington, VA, June 1979, vol. 48, pp. 313-317.
  3. Shamir, A. ,"How to share a secret", Commun. Of the ACM, 22 (11), pp. 612-613, 1979.
  4. Naor, M. , Shamir, A. , "Visual cryptography", Eurocrypt 94, Springer-Verlag LNCS Vol. 950, pp. 1-12, 1995.
  5. Y. Desmedt, S. Hou and J. Quisquater, "Audio and optical cryptography," in Advances in Cryptology-Asiacrypt'98, Springer-Verlag LNCS, pp. 392-404.
  6. Ching-Nung Yang, "Improvements on Audio and Optical Cryptography", in Journal of Information Science and Engineering, May 2002, vol. 18, Number 3, pp 381-391
  7. Lin, C. C. , Laih, C. S. , Yang, C. N. , "New Audio Secret Sharing Schemes With Time Division Technique", J. of Information Science and Engineering, 19, pp. 605-614, 2003.
  8. Socek, Daniel dan Spyros S. Magliveras. General Access Structure in Audio Cryptography. in IEEE International Conference on Electro Information Technology (EIT 2005), May 22-25, 2005, Lincoln NE, USA.
  9. Mohammad Ehdaie, Taraneh Eghlidos, Mohammad Reza Aref, "A Novel Secret Sharing Scheme from Audio Perspective "2008 IEEE International al Symposium on Telecommunications 16-19 June pp 13-18
  10. http://ccrma. standford. edu/courses/422/project/waveform


Audio Cryptography, Secret Sharing, Cover Sound, Visual Cryptography, Threshold Scheme