Skip to main content
Top
Published in: 3D Research 2/2018

01-06-2018 | 3DR Express

A Novel Fast and Secure Approach for Voice Encryption Based on DNA Computing

Authors: Hamidreza Kakaei Kate, Jafar Razmara, Ayaz Isazadeh

Published in: 3D Research | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today, in the world of information communication, voice information has a particular importance. One way to preserve voice data from attacks is voice encryption. The encryption algorithms use various techniques such as hashing, chaotic, mixing, and many others. In this paper, an algorithm is proposed for voice encryption based on three different schemes to increase flexibility and strength of the algorithm. The proposed algorithm uses an innovative encoding scheme, the DNA encryption technique and a permutation function to provide a secure and fast solution for voice encryption. The algorithm is evaluated based on various measures including signal to noise ratio, peak signal to noise ratio, correlation coefficient, signal similarity and signal frequency content. The results demonstrate applicability of the proposed method in secure and fast encryption of voice files.

Graphical Abstract

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Kaur, H., & Sekhon, G. S. (2012). A four level speech signal encryption algorithm. International Journal of Computer Science and Communication, 3(2), 151–153. Kaur, H., & Sekhon, G. S. (2012). A four level speech signal encryption algorithm. International Journal of Computer Science and Communication, 3(2), 151–153.
3.
go back to reference Al-Karim, A., Abd al-Jalil, M., & Qays, I. (2013). Speech encryption using chaotic map and blowfish algorithms. Journal of Basrah Researches (Sciences), 39(2), 68–76. Al-Karim, A., Abd al-Jalil, M., & Qays, I. (2013). Speech encryption using chaotic map and blowfish algorithms. Journal of Basrah Researches (Sciences), 39(2), 68–76.
4.
go back to reference Rahman, M. M., Saha, T. K., & Bhuiyan, M. A.-A. (2012). Implementation of RSA algorithm for speech data encryption and decryption. International Journal of Computer Science and Network Security (IJCSNS), 12(3), 74. Rahman, M. M., Saha, T. K., & Bhuiyan, M. A.-A. (2012). Implementation of RSA algorithm for speech data encryption and decryption. International Journal of Computer Science and Network Security (IJCSNS), 12(3), 74.
5.
go back to reference Gnanajeyaraman, R., & Prasadh, K. (2009). Audio encryption using higher dimensional chaotic map. International Journal of Recent Trends in Engineering, 1(2), 103–107. Gnanajeyaraman, R., & Prasadh, K. (2009). Audio encryption using higher dimensional chaotic map. International Journal of Recent Trends in Engineering, 1(2), 103–107.
6.
go back to reference Cui-yan, L., & Fei, G. (2007). A voice encryption algorithm based on hyperchaos mackey-glass system. Telecommunication Engineering, 1(1), 29. Cui-yan, L., & Fei, G. (2007). A voice encryption algorithm based on hyperchaos mackey-glass system. Telecommunication Engineering, 1(1), 29.
7.
go back to reference Sharma, D. (2012). Five level cryptography in speech processing using multi hash and repositioning of speech elements. International Journal of Emerging Technology and Advanced Engineering, 2(3), 21–27. Sharma, D. (2012). Five level cryptography in speech processing using multi hash and repositioning of speech elements. International Journal of Emerging Technology and Advanced Engineering, 2(3), 21–27.
8.
go back to reference Prabu, A., Srinivasara, S., Apparao, T., Rao, M. J., & Babu Rao, K. (2012). Audio encryption in handsets. International Journal of Computer Applications, 40(6), 40–45.CrossRef Prabu, A., Srinivasara, S., Apparao, T., Rao, M. J., & Babu Rao, K. (2012). Audio encryption in handsets. International Journal of Computer Applications, 40(6), 40–45.CrossRef
10.
go back to reference Ahmad, M., Bashir, A., & Omar, F. (2012). Chaos based mixed keystream generation for voice data encryption. International Journal on Cryptography and Information Security, 2(1), 36–45.CrossRef Ahmad, M., Bashir, A., & Omar, F. (2012). Chaos based mixed keystream generation for voice data encryption. International Journal on Cryptography and Information Security, 2(1), 36–45.CrossRef
11.
go back to reference Ashtiyani, M., Moradi Birgani, P., & Karimi Madahi, S. (2012). Speech signal encryption using chaotic symmetric cryptography. Journal of Basic and Applied Scientific Research, 2(2), 1668–1674. Ashtiyani, M., Moradi Birgani, P., & Karimi Madahi, S. (2012). Speech signal encryption using chaotic symmetric cryptography. Journal of Basic and Applied Scientific Research, 2(2), 1668–1674.
12.
go back to reference Gadanayak, B., Pradhan, C., & Chandra Dey, U. (2011). Comparative study of different encryption techniques on MP3 compression. International Journal of Computers and Applications, 26(3), 28–31.CrossRef Gadanayak, B., Pradhan, C., & Chandra Dey, U. (2011). Comparative study of different encryption techniques on MP3 compression. International Journal of Computers and Applications, 26(3), 28–31.CrossRef
13.
go back to reference Gadanayak, B., Pradhan, C., & Baranwal, N. (2011). Secured partial MP3 encryption technique. International Journal of Computer Science and Information Technologies, 2(4), 1584–1587. Gadanayak, B., Pradhan, C., & Baranwal, N. (2011). Secured partial MP3 encryption technique. International Journal of Computer Science and Information Technologies, 2(4), 1584–1587.
14.
go back to reference Sharma, S., Lucknesh, K., & Himanshu, S. (2013). Encryption of an audio file on lower frequency band for secure communication. International Journal of Advanced Research in Computer Science and Software Engineering, 3(7), 214–221. Sharma, S., Lucknesh, K., & Himanshu, S. (2013). Encryption of an audio file on lower frequency band for secure communication. International Journal of Advanced Research in Computer Science and Software Engineering, 3(7), 214–221.
15.
go back to reference Sadkhan, Sattar B., & Saad Mohammed, R. (2015). A proposed voice encryption based on random lorenz map with DCT permutation. International Journal of Advancements in Computing Technology, 7(3), 90–101. Sadkhan, Sattar B., & Saad Mohammed, R. (2015). A proposed voice encryption based on random lorenz map with DCT permutation. International Journal of Advancements in Computing Technology, 7(3), 90–101.
18.
go back to reference Sadkhan, S. B., & Abbas, N. A. (2014). A Proposed voice encryption system based on off-Line ica algorithm. Journal of Babylon university/Pure and Applied Sciences, 22 (7), 1917–1923. Sadkhan, S. B., & Abbas, N. A. (2014). A Proposed voice encryption system based on off-Line ica algorithm. Journal of Babylon university/Pure and Applied Sciences, 22 (7), 1917–1923.
19.
go back to reference Tamimi, A. A., & Abdalla, A. M. (2014). An audio shuffle-encryption algorithm. In The world congress on engineering and computer science. Tamimi, A. A., & Abdalla, A. M. (2014). An audio shuffle-encryption algorithm. In The world congress on engineering and computer science.
20.
go back to reference Li, R. D. Y. (2014). Application of compound chaotic mapping in voice encryption algorithm. International Journal of Computer Science and Network Security (IJCSNS), 14(8), 44. Li, R. D. Y. (2014). Application of compound chaotic mapping in voice encryption algorithm. International Journal of Computer Science and Network Security (IJCSNS), 14(8), 44.
21.
go back to reference Alwahbani, S. M. H., & Bashier, E. B. M. (2013). Speech scrambling based on chaotic maps and one time pad. In Proceedings of 2013 international conference on computer, electrical and electronics engineering: “Research Makes a Difference”, ICCEEE 2013 (pp. 128–133). https://doi.org/10.1109/icceee.2013.6633919 Alwahbani, S. M. H., & Bashier, E. B. M. (2013). Speech scrambling based on chaotic maps and one time pad. In Proceedings of 2013 international conference on computer, electrical and electronics engineering: “Research Makes a Difference”, ICCEEE 2013 (pp. 128–133). https://​doi.​org/​10.​1109/​icceee.​2013.​6633919
22.
go back to reference Akgül, A., Kaçar, S., & Pehlivan, İ. (2015). An audio data encryption with single and double dimension discrete-time chaotic systems. The Online Journal of Science and Technology, 5(3), 14–23. Retrieved from www.tojsat.net Akgül, A., Kaçar, S., & Pehlivan, İ. (2015). An audio data encryption with single and double dimension discrete-time chaotic systems. The Online Journal of Science and Technology, 5(3), 14–23. Retrieved from www.​tojsat.​net
23.
go back to reference Augustine, N., George, S. N., & Pattathil, D. P. (2015). An audio encryption technique through compressive sensing and Arnold transform. International Journal of Trust Management in Computing and Communications, 3(1), 74–92.CrossRef Augustine, N., George, S. N., & Pattathil, D. P. (2015). An audio encryption technique through compressive sensing and Arnold transform. International Journal of Trust Management in Computing and Communications, 3(1), 74–92.CrossRef
29.
go back to reference Lipton, R. (1995). Using DNA to solve NP-complete problems. Science, 268, 542–545.CrossRef Lipton, R. (1995). Using DNA to solve NP-complete problems. Science, 268, 542–545.CrossRef
32.
go back to reference Lipton, R. J., Boneh, D., & Dunworth, C. (1996). Breaking DES using a molecular computer. DNA Based Computers, 27, 37.MathSciNetCrossRef Lipton, R. J., Boneh, D., & Dunworth, C. (1996). Breaking DES using a molecular computer. DNA Based Computers, 27, 37.MathSciNetCrossRef
34.
go back to reference Maniyath, S. R., & Muthuraman, S. (2011). An uncompressed image encryption algorithm based on DNA sequences. Computer Science and Information Technology, 2, 258–270. Maniyath, S. R., & Muthuraman, S. (2011). An uncompressed image encryption algorithm based on DNA sequences. Computer Science and Information Technology, 2, 258–270.
37.
go back to reference Akanksha, A., Bhopale, A., Sharma, J., Meer Shizan, A., & Gautam, D. (2012). Implementation of DNA algorithm for secure voice communication. International Journal of Scientific & Engineering Research, 3(6), 1–5.CrossRef Akanksha, A., Bhopale, A., Sharma, J., Meer Shizan, A., & Gautam, D. (2012). Implementation of DNA algorithm for secure voice communication. International Journal of Scientific & Engineering Research, 3(6), 1–5.CrossRef
38.
go back to reference Vajjiravelu, S., & Punitha, A. (2013). A novel approach to an algorithm for voice encryption using DNA based cryptography. In IJCA Proceedings on national conference on recent trends in computer applications, foundation of computer science (FCS) (pp. 19–21). Vajjiravelu, S., & Punitha, A. (2013). A novel approach to an algorithm for voice encryption using DNA based cryptography. In IJCA Proceedings on national conference on recent trends in computer applications, foundation of computer science (FCS) (pp. 19–21).
39.
go back to reference Salamon, M. (2012). Chaotic electronic circuits in cryptography. In Applied cryptography and network security. Salamon, M. (2012). Chaotic electronic circuits in cryptography. In Applied cryptography and network security.
Metadata
Title
A Novel Fast and Secure Approach for Voice Encryption Based on DNA Computing
Authors
Hamidreza Kakaei Kate
Jafar Razmara
Ayaz Isazadeh
Publication date
01-06-2018
Publisher
3D Display Research Center
Published in
3D Research / Issue 2/2018
Electronic ISSN: 2092-6731
DOI
https://doi.org/10.1007/s13319-018-0167-x

Other articles of this Issue 2/2018

3D Research 2/2018 Go to the issue

Premium Partner