[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system

Published: 09 March 2023 Publication History

Abstract

The concept of encryption is as old as the reality that confidential information has been interchanging among people. The art of transferring secret information between two parties or groups is known as cryptography. It contains the algorithms, key exchange protocols, and approaches to consistently and securely avoid unauthorized access to confidential information. Nowadays information is in digital form, therefore this factor necessitates some cryptographic algorithms for secure data transmission. In this work, we have designed a new approach for audio encryption to securely store and transfer audio signals. The suggested encryption algorithm is primarily based on Gensio-Tesi chaotic map. Substitution and permutation networks are engendered by the Gensio-Tesi chaotic system for the encryption of signals. The other important feature discussed here is the performance of offered algorithm which is ascertained by some extensive audio analysis. Experimental results reveal that the designed scheme has an essential level of security.

References

[1]
Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894–69907.
[2]
Advanced Encryption Standard (AES) (n.d.) (PDF), Federal Information Processing Standards, 26 November 2001,
[3]
Al-hazaimeh OM, Abu-Ein AA, Nahar KM, Al-Qasrawi IS (2022) Chaotic elliptic map for speech encryption. Indonesian J Elec Eng Comp Sci 25(2):1103–1114
[4]
Arunkumar S, Mukesh K (2022) "Enhanced Audio Encryption using 2-D Zaslavsky Chaotic Map," 2022 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–4,
[5]
Basu S International data encryption algorithm (IDEA) - a typical illustration J Global Res Comp Sci 2011 2011 116-118.1
[6]
Farsana FJ, Devi VR, Gopakumar K (2020) An audio encryption scheme based on fast Walsh Hadamard transform and mixed chaotic keystreams. Appl Comput Inform
[7]
Genesio R and Tesi A A harmonic balance method for the analysis of chaotic dynamics in nonlinear systems Automatica 1992 28 531-548
[8]
Hassan NF, Aladhami A, and Mahdi MS Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps Iraqi J Sci 2022 63 2 830-842
[9]
Hato E and Shihab D Lorenz and Rossler chaotic system for speech signal encryption Int J Comput Appl 2015 128
[10]
Kordov K A novel audio encryption algorithm with permutation-substitution architecture Electronics 2019 8 530
[11]
Lima JB and da Silva Neto EF Audio encryption based on the cosine number transform Multimed Tools Appl 2016 75 14 8403-8418
[12]
Lin C-H, Hu G-H, Chen J-S, Yan J-J, Tang K-H (2022) Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys. Multimed Syst 28(5):1793–1808
[13]
Liu H, Kadir A, and Li Y Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys Optik 2016 127 7431-7438
[14]
Preishuber M, Hütter T, Katzenbeisser S, and Uhl A Depreciating motivation and empirical security analysis of chaos-based image and video encryption IEEE Trans Inf Forensics Secur 2018 13 2137-2150
[15]
Sarker IH, Abushark YB, Alsolami FJ, and Khan AI IntruDTree: a machine learning based cyber security intrusion detection model Symmetry 2020 12 754
[16]
Sarker IH, Khan AI, Abushark YB, Alsolami F (2022) Internet of things (IoT) security intelligence: a comprehensive overview, Machine Learning Solutions and Research Directions. Mobile Netw Appl.
[17]
Sathiyamurthi P and Ramakrishnan S Speech encryption using chaotic shift keying for secured speech communication EURASIP J Audio Speech Music Process 2017 2017 20
[18]
Sathiyamurthi P and Ramakrishnan S Speech encryption using hybrid-hyper chaotic system and binary masking technique Multimed Tools Appl 2022 81 6331-6349
[19]
Schneier B (1993) Description of a new variable-length key, 64-bit block cipher (blowfish). Fast software encryption, in: Cambridge Security Workshop Proceedings
[20]
Shah D, Shah T, and Jamal SS Digital audio signals encryption by Mobius transformation and Hénon map Multimed Syst 2020 26 235-245
[21]
Shah D, Shah T, Ahamad I, Haider MI, and Khalid I A three-dimensional chaotic map and their applications to digital audio security Multimed Tools Appl 2021 80 22251-22273
[22]
Tamimi AA; Abdalla AM (22–24 October 2014) An Audio Shuffle-Encryption Algorithm. In: Proceedings of the World Congress on Engineering and Computer Science, San Francisco, CA, USA, Volume 1
[23]
Walter T A brief history of the data encryption standard Internet besieged: countering cyberspace scofflaws 1997 New York ACM Press/Addison-Wesley Publishing Co 275-280

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Multimedia Tools and Applications
Multimedia Tools and Applications  Volume 82, Issue 17
Jul 2023
1554 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 09 March 2023
Accepted: 22 February 2023
Revision received: 14 February 2023
Received: 02 February 2022

Author Tags

  1. Audio encryption
  2. Chaotic system
  3. Spectrogram

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media