Design of Extended Hamming Code Technique Encryption for Audio Signals by Double Code Error Prediction
PDF

Keywords

Hamming code
double code error prediction
audio signal
encryption
parity check

How to Cite

Design of Extended Hamming Code Technique Encryption for Audio Signals by Double Code Error Prediction. (2021). Journal of Information Technology and Digital World, 3(3), 179-192. https://doi.org/10.36548/jitdw.2021.3.003

Abstract

Noise can scramble a message that is sent. This is true for both voicemails and digital communications transmitted to and from computer systems. During transmission, mistakes tend to happen. Computer memory is the most commonplace to use Hamming code error correction. With extra parity/redundancy bits added to Hamming code, single-bit errors may be detected and corrected. Short-distance data transmissions often make use of Hamming coding. The redundancy bits are interspersed and evacuated subsequently when scaling it for longer data lengths. The new hamming code approach may be quickly and easily adapted to any situation. As a result, it's ideal for sending large data bitstreams since the overhead bits per data bit ratio is much lower. The investigation in this article is extended Hamming codes for product codes. The proposal particularly emphasises on how well it functions with low error rate, which is critical for multimedia wireless applications. It provides a foundation and a comprehensive set of methods for quantitatively evaluating this performance without the need of time-consuming simulations. It provides fresh theoretical findings on the well-known approximation, where the bit error rate roughly equal to the frame error rate times the minimal distance to the codeword length ratio. Moreover, the analytical method is applied to actual design considerations such as shorter and punctured codes along with the payload and redundancy bits calculation. Using the extended identity equation on the dual codes, decoding can be done at the first instance. The achievement of 43.48% redundancy bits is obtained during the testing process which is a huge proportion reduced in this research work.

PDF

References

Shakya, Subarana. "An efficient security framework for data migration in a cloud computing environment." Journal of Artificial Intelligence 1, no. 01 (2019): 45-53.

T. Fujiwara et al., "Error Detecting Capabilities of the Shortened Hamming Codes Adopted for Error Detection in IEEE Standard 802.3," IEEE Trans. Communications, vol. 37, no. 9, pp. 986-989, Sep 1989.

Manoharan, J. Samuel. "A Novel User Layer Cloud Security Model based on Chaotic Arnold Transformation using Fingerprint Biometric Traits." Journal of Innovative Image Processing (JIIP) 3, no. 01 (2021): 36-51.

D. De Villiers and R. Van Zyl, ZACube-2 : the Successor to Africa’s First Nanosatellite, French South African, Institute of Technology, Bellville, South Africa, 2018.

Sathesh, A. "Enhanced soft computing approaches for intrusion detection schemes in social media networks." Journal of Soft Computing Paradigm (JSCP) 1, no. 02 (2019): 69-79.

W. Xiong, and D. W. Matolak, "Performance of Hamming Codes in Systems Employing Different Code Symbol Energies," IEEE Communications Society, pp. 1055-1058[Wireless and Communications and Networking Conference (WCNC)].

Manoharan, Samuel. "An improved safety algorithm for artificial intelligence enabled processors in self driving cars." Journal of Artificial Intelligence 1, no. 02 (2019): 95-104.

Wyner, "Recent results in the Shannon theory", IEEE Trans. Inf. Theory, vol. 20, pp. 2-10, 1974.

Mugunthan, S. R. "Soft computing based autonomous low rate DDOS attack detection and security for cloud computing." J. Soft Comput. Paradig.(JSCP) 1, no. 02 (2019): 80-90.

S. S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): design and construction", Proc. DCC, pp. 158-167

Smys, S., and Haoxiang Wang. "Security Enhancement in Smart Vehicle Using Blockchain-based Architectural Framework." Journal of Artificial Intelligence 3, no. 02 (2021): 90-100.

V. Stankovic, A. D. Liveris, Z. Xiong and C. N. Georghiades, "On code design for the Slepian-Wolf problem and lossless multiterminal networks", IEEE Trans. Inf. Theory, vol. 52, no.4, pp. 1495-1507, 2006

Sharma, Rajesh, and Akey Sungheetha. "An Efficient Dimension Reduction based Fusion of CNN and SVM Model for Detection of Abnormal Incident in Video Surveillance." Journal of Soft Computing Paradigm (JSCP) 3, no. 02 (2021): 55-69.

S. Pradhan and K. Ramchandran, "Generalized coset codes for distributed binning", IEEE Trans. Inf. Theory, vol. 51, no.10, pp. 3457-3474, 2005.

Haoxiang, Wang, and Smys Smys. "Soft Computing Strategies for Optimized Route Selection in Wireless Sensor Network." Journal of Soft Computing Paradigm (JSCP) 2, no. 01 (2020): 1-12.

Satyanarayan NV, Sujatha NL, Ramaraju JSS. Detecting and Correcting Multiple Upsets with 64-bit Decimal Matrix Code in Memories, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (IJAREEIE). 2014; 3(8):11496–504.

B. Umashankar. "Improved Hamming Code for Error Detection and Correction", 2007 2nd International Symposium on Wireless Pervasive Computing, 02/2007.

Suma, V. "Community Based Network Reconstruction for an Evolutionary Algorithm Framework." Journal of Artificial Intelligence 3, no. 01 (2021): 53-61.

Baek S-S, Won Y-S, Han D-G, Ryou J-C. The Effect of Eight-Shuffling AES Implementations Techniques against Side Channel Analysis. 2015 Mar; 8(5):91–7.

Shakya, Subarna, and Lalitpur Nepal Pulchowk. "Intelligent and adaptive multi-objective optimization in WANET using bio inspired algorithms." J Soft Comput Paradigm (JSCP) 2, no. 01 (2020): 13-23.

Vignesh B. Pipelined Quadratic Equation Based Novel Multiplication Method for Cyptographic applications. 2014; 7(4):34–9.

Jacob, I. Jeena, and P. Ebby Darney. "Artificial Bee Colony Optimization Algorithm for Enhancing Routing in Wireless Networks." Journal of Artificial Intelligence 3, no. 01 (2021): 62-71.

Nagalakshmi, Malathy, Tanya Sharma, and N. S. Kumar. "Flexible Language-Agnostic Framework To Emit Informative Compile-Time Error Messages." In Inventive Computation and Information Technologies, pp. 859-868. Springer, Singapore, 2021.

Sanyal, Hrithik, and Rajneesh Agrawal. "Study of Holoportation: Using Network Errors for Improving Accuracy and Efficiency." In Proceedings of International Conference on Sustainable Expert Systems: ICSES 2020, vol. 176, p. 107. Springer Nature, 2021.

Biswas, Abhishek, and Pushan Kumar Dutta. "Novel Approach of Automation to Risk Management: The Reduction in Human Errors." In International Conference on Mobile Computing and Sustainable Informatics, pp. 683-696. Springer, Cham, 2020.

Sugi, S. Shinly Swarna, and S. Raja Ratna. "Survey on the Security Threats in IoT System." In International Conference on Mobile Computing and Sustainable Informatics, pp. 721-728. Springer, Cham, 2020.

Prasanna, I. Philo, and M. Suguna. "Detection of Distributed Denial of Service Attack Using NSL-KDD Dataset-A Survey." In International conference on Computer Networks, Big data and IoT, pp. 866-875. Springer, Cham, 2019