Unknown

Dataset Information

0

Encrypted audio dataset based on the Collatz conjecture.


ABSTRACT: In information security, one way to keep a secret content is through encryption. The objective is to alter the content so that it is not intelligible, and therefore only the intended user can reveal the secret content. With the aim to provide examples of encrypted audio data, we applied a novel method of encryption based on the Collatz conjecture in five hundred speech recordings (50 speakers, 10 different messages), and then five hundred encrypted audio files were obtained. The main characteristics of our encrypted recordings are as follows: the spectrogram is quasi-uniform, histograms have a repetitive pattern, average of samples is around -0.4, standard deviation is around 0.55; Shannon entropy is around 7.5 (for 8-bits per sample). The novelty of the results consists in obtaining a completely different behavior than natural speech recordings, i.e.: spectrogram with higher energy in low frequencies, histogram with Gaussian behavior, average of samples around 0, standard deviation around 0.11, entropy around 5.5. A more comprehensive analysis of our encrypted signals may be obtained from the article "High-uncertainty audio signal encryption based on the Collatz conjecture" in the Journal of Information Security and Applications.

SUBMITTER: Renza D 

PROVIDER: S-EPMC6811906 | biostudies-literature | 2019 Oct

REPOSITORIES: biostudies-literature

altmetric image

Publications

Encrypted audio dataset based on the Collatz conjecture.

Renza Diego D   Mendoza Sebastian S   Ballesteros L Dora M DM  

Data in brief 20190917


In information security, one way to keep a secret content is through encryption. The objective is to alter the content so that it is not intelligible, and therefore only the intended user can reveal the secret content. With the aim to provide examples of encrypted audio data, we applied a novel method of encryption based on the Collatz conjecture in five hundred speech recordings (50 speakers, 10 different messages), and then five hundred encrypted audio files were obtained. The main characteris  ...[more]

Similar Datasets

| S-EPMC9065631 | biostudies-literature
| S-EPMC7689366 | biostudies-literature
| S-EPMC7480696 | biostudies-literature
| S-EPMC7924541 | biostudies-literature
| S-EPMC8333307 | biostudies-literature
| S-EPMC10900609 | biostudies-literature
| S-EPMC6925457 | biostudies-literature
| S-EPMC10114508 | biostudies-literature
| S-EPMC7214825 | biostudies-literature
| S-EPMC6884625 | biostudies-literature