A novel method in audio message encryption based on a mixture of chaos function

Published on Aug 20, 2017in International Journal of Speech Technology
路 DOI :10.1007/S10772-017-9452-Y
Ardalan Ghasemzadeh2
Estimated H-index: 2
(Urmia University of Technology),
Elham Esmaeili2
Estimated H-index: 2
(Urmia University of Technology)
Source
Abstract
Rapid growth of digital data and their security concerns increases the significance of enhancing advanced encryption techniques. Encryption is the backbone of secure communication in networks and the physical process of scrambling and permuting data in order to make them impossible to understand for unauthorized users. This paper proposes a novel audio signal encryption method, based on a mixture of three chaos functions. Due to the reversibility of the chaos functions, the decryption process is the inverse of the encryption process. This method was applied to audio signals with various sizes and the encoded messages were compared to the original ones. Simulation results and theoretical analyses show that the proposed approach offers a significant gain in terms of robustness and computational complexity.
馃摉 Papers frequently viewed together
2009DDECS: Design and Diagnostics of Electronic Circuits and Systems
3 Authors (Jiri Giesl, ..., Karel Vlcek)
2007
1 Author (Liang Li-wei)
References20
Newest
#1Hongjun LiuH-Index: 15
#2Abdurahman Kadir (Xinjiang University of Finance and Economics)H-Index: 16
Last. Yanling LiH-Index: 2
view all 3 authors...
Abstract Here is a proposal of lossless dual-channel audio encryption scheme based on one-time keys, the novelty is to apply chaotic system with changeable multi-scroll to generate key stream to confuse and diffuse audio data, and the one-time keys, such as initial values of state variables, scroll number and initial iteration times of the chaotic system, are dependent on both external keys and hash value of the plain audio file, to make the chaotic trajectory more unpredictable. The algorithm o...
Source
#1Juliano B. Lima (UFPE: Federal University of Pernambuco)H-Index: 11
#2Eronides F. da Silva Neto (UFPE: Federal University of Pernambuco)H-Index: 1
In this paper, we introduce an audio encryption scheme based on the cosine number transform (CNT). The transform, which is defined over a finite field, is recursively applied to blocks of samples of a noncompressed digital audio signal. The blocks are selected using a simple overlapping rule, which provides diffusion of the ciphered data to all processed blocks. A secret-key is used to specify the number of times the transform is applied to each one of such blocks. Computer experiments are carri...
Source
#1Priyadarshini Patil (B.V.B. College of Engineering and Technology)H-Index: 6
#2Prashant Narayankar (B.V.B. College of Engineering and Technology)H-Index: 4
In today's internet era, with online transactions almost every second and terabytes of data being generated everyday on the internet, securing information is a challenge. Cryptography is an integral part of modern world information security making the virtual world a safer place. Cryptography is a process of making information unintelligible to an unauthorized person. Hence, providing confidentiality to genuine users. There are various cryptographic algorithms that can be used. Ideally, a user n...
Source
#1Salwa M. Serag Eldin (Tanta University)H-Index: 5
#2Salah A. Khamis (Tanta University)H-Index: 2
Last. Mohammed A. AlsharqawyH-Index: 1
view all 4 authors...
For any cloud computing (ClComp), encryption of multimedia is one of the main applications as cloud tries to maintain it in a good situation and protect from any tampering. This work provides a new technique for audio for TV cloud computing. Encrypting the audio signals is addressed based on chaotic map and the algorithm was tested using an audio tone (AT) to evaluate the performance. The software of encrypt audio using AT based on chaotic map is specially designed to meet the needs of ClComp of...
Source
#1N. Radha Aathithan (KARE: Kalasalingam University)H-Index: 1
#2M. Venkatesulu (KARE: Kalasalingam University)H-Index: 1
We propose a new symmetric block cipher encryption which provides confidentiality to the multimedia while transmitting through the network. The encryption relies on two typical operations, substitution and transposition. A complete binary tree performs substitution and a 2-d array performs non-linear diffusion in the 2 stage of the encryption/decryption process. The first stage spreads out the bits of a block into a complete binary tree and performs randomized substitution based on a pseudo rand...
#1Goo-Rak Kwon (Chosun University)H-Index: 15
#2Chuntao Wang (Chosun University)H-Index: 1
Last. Suk-Seung Hwang (Chosun University)H-Index: 8
view all 4 authors...
In this paper, we propose an advanced partial encryption of watermarking and scrambling using the magnitude information of Modifed Discrete Cosine Transform (MDCT). In MPEG-1/Audio Layer III (MP3), the magnitude and phase information of modified discrete cosine transform (MDCT) coefficients is encrypted. The proposed method uses both watermarking and scrambling, and aims at protecting the contents against eavesdropping and moreover against illegal mass distribution after descrambled. Experimenta...
Source
#1Iqtadar Hussain (QAU: Quaid-i-Azam University)H-Index: 26
#2Tariq Shah (QAU: Quaid-i-Azam University)H-Index: 30
Last. Muhammad Asif Gondal (National University of Computer and Emerging Sciences)H-Index: 23
view all 3 authors...
In this article, we propose a novel image encryption algorithm by using the linear fractional transformation (LFT) substitution boxes and tangent-delay for elliptic reflecting cavity (TD-ERCS) chaotic sequence. In addition, we apply the proposed approach to an image and come to know that the correlation analysis, UACI analysis, and NPCR analysis of proposed algorithm are much improved than many existing techniques and very easy to put into practice.
Source
#1S. PavithraH-Index: 1
#2E. RamadeviH-Index: 1
#1Om Prakash Verma (DCE: Delhi Technological University)H-Index: 21
#2Ritu Agarwal (DCE: Delhi Technological University)H-Index: 3
Last. Shobha Tyagi (DCE: Delhi Technological University)H-Index: 2
view all 4 authors...
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and speed are also important concerns. These are the two main characteristics that differentiate one encryption algorithm from another. This paper provides the performance comparison between four of the most commonly used encryption algorithms: DES(Data Encryption Standard), 3DES(Triple DES), BLOWFISH and AES (Rijndael). The compari...
Source
Cited By13
Newest
In this paper, we present an algorithm for encrypting audio files based on the Ikeda map, a mathematical function of chaos theory. Detailed experimental, security and theoretical analysis is provided on the proposed algorithm using histogram analysis, using different measurements including the signal-to-noise ratio, the peak signal-to-noise ratio, the number of samples change rate and the correlation coefficient. The provided results show a highly secure and strong algorithm against different ty...
Source
#1Ruipeng Zhang (Agricultural University of Hebei)
#2Jiang Chai (Agricultural University of Hebei)
Last. Ying Liang (Agricultural University of Hebei)
view all 5 authors...
Abstract null null With the development of science and technology, the power source of the automobile industry has gradually changed from non-renewable energy sources such as petroleum to electric energy, a clean and renewable energy source. By the end of 2020, scientists have found that the global demand for batteries has greatly increased. The demand for power batteries has reached 50% of all battery demand, occupying half of the market. In addition, scientists also boldly predict that by 2025...
Source
Encryption algorithms based on chaos theory are frequently used due to the sensitivity of initial conditions, control parameters, and pseudo-randomness. They are very useful for data encryption for images, audio, or videos. In this paper, a novel audio encryption method is proposed to provide information security. Firstly, the one-dimensional uncompressed 16-bit audio file of even length is taken. Then chaotic Henon map and tent map is XORed to create the pseudo-random number sequence as the sec...
Source
#1Haris Aziz (University of the Sciences)H-Index: 1
#2Syed Gilani (Pir Mehr Ali Shah Arid Agriculture University)H-Index: 9
Last. Shahzada Khurram (IUB: Islamia University)H-Index: 3
view all 5 authors...
The recent decade has witnessed an exponential surge of digital content, especially multimedia and its applications. The security requirements of these innovative platforms necessitate the significance of enhancing advanced encryption schemes. In this paper, a novel encryption scheme is presented for real-time audio applications. The framework of the proposed scheme is grounded on the principles of confusion and diffusion. The confusion incorporates nonlinearity by the application of Mordell ell...
Source
#1Elsayed Elshamy (Menoufia University)H-Index: 3
#2Aziza I. Hussein (Minia University)H-Index: 10
Last. Hamdy M. Kelash (Menoufia University)H-Index: 7
view all 5 authors...
New hybrid cryptosystems represent a highly effective method for increasing security levels of Voice over Internet Protocol (VoIP) systems. In this paper, a dual-security cryptosystem for VoIP voicemail is proposed based on two-factor authentication, followed by Baker Map and RC6 encryption. Two security system models are proposed: the first involves biometric voiceprint encryption with pin code, and the second involves dual-biometric encryption via voiceprint with fingerprint. Parameters were s...
Source
#1Prabir Kumar Naskar (Government College)H-Index: 3
#2Surojit Bhattacharyya (MCKV Institute of Engineering)H-Index: 1
Last. Atal Chaudhuri (Jadavpur University)H-Index: 8
view all 3 authors...
This paper presents a robust audio encryption scheme based on three consecutive phases, accomplished as cyclic shift followed by ciphering and wound up by shuffling, to break the high correlation amongst the neighbouring region of a plain audio. To encrypt a plain audio, the entire audio is split into different blocks of 64 bytes each and distinct key blocks are used for those audio blocks in the foregoing three phases. At first, the correlation of each audio block is reduced by the cyclic shift...
Source
#2Sadiq A. MehdiH-Index: 5
Last. Sattar B. SadkhanH-Index: 13
view all 3 authors...
Source
#1C. LakshmiH-Index: 3
Last. Rengarajan AmirtharajanH-Index: 21
view all 5 authors...
Owing to the rapid development and advancements in the field of networks and communication, sharing of multimedia contents over insecure networks has become vital. The confidentiality of audio signals is predominantly needed in military and intelligence bureau applications. The proposed algorithm addresses this issue by encrypting audio signal using chaotic maps in spatial and transform domain. Discrete Fourier transform (DFT), discrete cosine transform (DCT) and integer wavelet transform (IWT) ...
Source
Source
#1Xingyuan Wang (Dalian Maritime University)H-Index: 11
#2Yining Su (Dalian Maritime University)H-Index: 1
Transferring multimedia files like audio is a common problem with information security. Therefore, various encryption technologies are needed to protect these contents. This paper proposes a new audio encryption scheme that provides a high degree of security. The novelty of this scheme is the use of chaotic systems and DNA coding to confuse and diffuse audio data. The initial value of the chaotic system is controlled by the hash value of the audio, making the chaotic trajectory unpredictable. Co...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.