Speech encryption using chaotic shift keying for secured speech communication

Published on Dec 1, 2017in Eurasip Journal on Audio, Speech, and Music Processing1.558
· DOI :10.1186/S13636-017-0118-0
P. Sathiyamurthi3
Estimated H-index: 3
(Dr. Mahalingam College of Engineering and Technology),
S. Ramakrishnan12
Estimated H-index: 12
(Dr. Mahalingam College of Engineering and Technology)
Sources
Abstract
This paper throws light on chaotic shift keying-based speech encryption and decryption method. In this method, the input speech signals are sampled and its values are segmented into four levels, namely L 0, L 1, L 2, and L 3. Each level of sampled values is permuted using four chaotic generators such as logistic map, tent map, quadratic map, and Bernoulli’s map. A chaotic shift keying mechanism assigns logistic map for L 0, tent map for L 1, quadratic map for L 2, and Bernoulli’s map for L 3 for shuffling the speech samples at every level. Further, the sampled values are permuted using Chen map which uncovers the chaotic behavior. Various testing methods are applied to analyze the efficiency of the system. The results prove that the proposed system is highly secured against the attackers and possesses a powerful diffusion and confusion mechanism for better speech communication in the field of telecommunication.
Figures & Tables
Download
📖 Papers frequently viewed together
References20
Newest
#1Juliano B. Lima (UFPE: Federal University of Pernambuco)H-Index: 11
#2Eronides F. da Silva Neto (UFPE: Federal University of Pernambuco)H-Index: 1
In this paper, we introduce an audio encryption scheme based on the cosine number transform (CNT). The transform, which is defined over a finite field, is recursively applied to blocks of samples of a noncompressed digital audio signal. The blocks are selected using a simple overlapping rule, which provides diffusion of the ciphered data to all processed blocks. A secret-key is used to specify the number of times the transform is applied to each one of such blocks. Computer experiments are carri...
Source
#1Rana Saad MohammedH-Index: 3
#2Sattar B. Sadkhan (University of Babylon)H-Index: 13
Cryptography techniques must develop with the developing of wireless communication technologies. One of recent research is chaos based cryptography. Since there is data redundant in chaos signal, and not all chaos maps are random, also the attacker can take a periodic shape of chaos signal and found the system parameters. This paper proposed modifies two of chaos maps (Lorenz, Chen) and using it as pseudorandom number generator (PRNG). By using a test for noisy chaotic dynamics the results showe...
Source
#1Alzharaa Mostafa (Zagazig University)H-Index: 1
#2Naglaa F. Soliman (Zagazig University)H-Index: 7
Last. Fathi E. Abd El-Samie (Menoufia University)H-Index: 24
view all 4 authors...
Speech encryption is used to convert clear speech into unintelligible signal in order to avoid eavesdropping for this purpose, cryptographic techniques and chaotic maps can be applicable. In this paper, a speech cryptosystem based on substitution and permutation is presented. The speech signal has been processed using different discrete transforms. Then the system has been developed using different chaotic maps like 2D Logistic map, Henon map, and Baker. Different objective quality measures for ...
Source
#2Camel Tanougast (Metz)H-Index: 22
Last. Ahmed Bouridane (Northumbria University)H-Index: 32
view all 4 authors...
In this paper, a new stream key generator Hybrid Discrete Continuous Chaotic System (HDCCS) based on continuous and discrete chaotic systems is proposed. Our solution provides an easy and robust chaos synchronization while decrease the degradation due to finite precision during a digital implementation. Real-time application to wireless speech encryption effectively hides the original signal. Statistical security analysis for the proposed cryptosystem against cryptanalysis attacks, from a strict...
Source
This paper introduces a speech encryption approach, which is based on permutation of speech segments using chaotic Baker map and substitution using masks in both time and transform domains. Two parameters are extracted from the main key used in the generation of mask. Either the Discrete Cosine Transform (DCT) or the Discrete Sine Transform (DST) can be used in the proposed cryptosystem to remove the residual intelligibility resulting from permutation and masking in time domain. Substitution wit...
Source
#1Long-Jye Sheu (CHU: Chung Hua University)H-Index: 13
In this paper, a new speech encryption using fractional chaotic systems is presented. A two-channel transmission method is used where the original speech is encoded using a nonlinear function of the chaotic states. Conditions for synchronization between fractional chaotic systems through one variable have been investigated theoretically by using the Laplace transform. The keys, key space, key selection rules, and sensitivity to keys are discussed in detail. Results show that the original speech ...
Source
#1Ljupco KocarevH-Index: 44
#2Shiguo LianH-Index: 33
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection.The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptog...
#1Ljupco KocarevH-Index: 44
#2Shiguo LianH-Index: 33
1. Introduction to Chaos.- 2. Chaos-based Cryptography 3. Digitized Chaos for Pseudo-Random Number Generation in Cryptography .- 4. Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography .- 5. Chaos based hash function .- 6. Chaos-Based Video Encryption Algorithms .- 7. Cryptanalysis of chaotic ciphers .- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 1...
Source
May 6, 2009 in ECTI-CON (International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology)
#2Sinchai Kamolphiwong (PSU: Prince of Songkla University)H-Index: 6
In this day, the necessity of security and protection of computer information on network has become more and more important. In cryptography, asymmetric-key is the framework with high flexibility which can be applied to most of cryptographic systems using today. To reduce the encryption and decryption time which is the main drawback of asymmetric-key cryptography, we have proposed a new mechanism called “Parallel-key Cryptographic Algorithm (PCA)” which accelerates the cryptographic system in en...
Source
#1Osman Hilmi Koçal (Uludağ University)H-Index: 3
#2Emrah YürüklüH-Index: 6
Last. Ismail AvcibasH-Index: 21
view all 3 authors...
We investigate the use of chaotic-type features for recorded speech steganalysis. Considering that data hiding within a speech signal distorts the chaotic properties of the original speech signal, we design a steganalyzer that uses Lyapunov exponents and a fraction of false neighbors as chaotic features to detect the existence of a stegosignal. We also discuss the applicability of the proposed method to general audio.
Source
Cited By51
Newest
Abstract null null The Internet has become an increasingly indispensable existence. It not only affects people's daily life and work, but also continuously promotes the development of human economy. But now that the Internet has become popular, people are not only concerned about where the content appears, whether there is traffic or not, the shortcomings of the current network structure are also constantly showing up. In order to solve these existing problems, some researchers have proposed the...
Source
In this paper, we present an algorithm for encrypting audio files based on the Ikeda map, a mathematical function of chaos theory. Detailed experimental, security and theoretical analysis is provided on the proposed algorithm using histogram analysis, using different measurements including the signal-to-noise ratio, the peak signal-to-noise ratio, the number of samples change rate and the correlation coefficient. The provided results show a highly secure and strong algorithm against different ty...
Source
#1Yue Li (NKU: Nankai University)
#2Zengqiang Chen (NKU: Nankai University)H-Index: 49
Last. Shijian Cang (Tianjin University of Science and Technology)H-Index: 12
view all 4 authors...
Source
#1Hamsa A. Abdullah (Nahrain University)H-Index: 5
#2Raya kahtan Mohammed (Nahrain University)H-Index: 1
Due the property of the chaotic systems by means of randomness, sensitivity to the initial values and large size of keys, chaos masking plays a vital rule in secure communication environment. The FPGA implementation provides low cost and high speed for chaotic communication systems. In this paper, a modified chaotic system with hyper chaotic behavior and key size of 2416 is proposed. Speech masking based on the modified chaotic system is implemented. The proposed system is designed based on Syst...
Source
Abstract Speaker Verification (SV) system is the popularly used user’s identity authentication. From this perspective, Improved Encryption with Optimized Variable Size Windowing based SV (IE-OVSW-SV) system has been designed which authenticates the speaker’s identities based on watermarking and encrypting the optimal speech signal features. For encryption, an enhanced AES algorithm was combined with improved RC4 keystream generator to generate the AES key. But it has a high computational complex...
Source
#1Chih-Min Lin (YZU: Yuan Ze University)H-Index: 48
#2Duc-Hung PhamH-Index: 1
Last. Tuan-Tu HuynhH-Index: 12
view all 3 authors...
Source
This paper demonstrates a hardware encryption algorithm that can be integrated directly with sensors on the same chip. In contrast to using power-hungry microprocessors and software implementations, the encryption algorithm was based on a Lorenz chaotic system and was implemented as time scaling chaotic shift keying (TS-CSK). The coupled differential equations of TS-CSK were implemented using low power integrators, multiplexers, switches, and passive components. Both a single-ended and different...
Source
#1Haris Aziz (University of the Sciences)H-Index: 1
#2Syed Gilani (Pir Mehr Ali Shah Arid Agriculture University)H-Index: 9
Last. Shahzada Khurram (IUB: Islamia University)H-Index: 3
view all 5 authors...
The recent decade has witnessed an exponential surge of digital content, especially multimedia and its applications. The security requirements of these innovative platforms necessitate the significance of enhancing advanced encryption schemes. In this paper, a novel encryption scheme is presented for real-time audio applications. The framework of the proposed scheme is grounded on the principles of confusion and diffusion. The confusion incorporates nonlinearity by the application of Mordell ell...
Source
Source
#1Dawood Shah (QAU: Quaid-i-Azam University)H-Index: 6
#2Tariq Shah (QAU: Quaid-i-Azam University)H-Index: 30
Last. Ijaz Khalid (QAU: Quaid-i-Azam University)H-Index: 1
view all 5 authors...
In nonlinear dynamical systems, chaotic behavior is an attractive characteristic that has been broadly examined and researched over the most recent few decades. The chaotic systems are widely used in artificial intelligence and cryptology. Especially, these are considered efficient for multimedia data security. This manuscript has introduced a novel three dimensional (3-D) chaotic systems. The proposed maps are investigated through bifurcation diagrams and phase plots. The resulting diagrams dem...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.