Skip to main content
Erschienen in: International Journal of Speech Technology 4/2017

20.08.2017

A novel method in audio message encryption based on a mixture of chaos function

verfasst von: Ardalan Ghasemzadeh, Elham Esmaeili

Erschienen in: International Journal of Speech Technology | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Rapid growth of digital data and their security concerns increases the significance of enhancing advanced encryption techniques. Encryption is the backbone of secure communication in networks and the physical process of scrambling and permuting data in order to make them impossible to understand for unauthorized users. This paper proposes a novel audio signal encryption method, based on a mixture of three chaos functions. Due to the reversibility of the chaos functions, the decryption process is the inverse of the encryption process. This method was applied to audio signals with various sizes and the encoded messages were compared to the original ones. Simulation results and theoretical analyses show that the proposed approach offers a significant gain in terms of robustness and computational complexity.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Aathithan, N. R., & Venkatesulu, M. A. (2013). Complete binary tree structure block cipher for real-time multimedia. London: Science and Information Conference. Aathithan, N. R., & Venkatesulu, M. A. (2013). Complete binary tree structure block cipher for real-time multimedia. London: Science and Information Conference.
Zurück zum Zitat Diaa, S., Hatem, A. K., & Mohiy, H. (2010). Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security, 10(3), 213–219. Diaa, S., Hatem, A. K., & Mohiy, H. (2010). Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security, 10(3), 213–219.
Zurück zum Zitat Eldin, S. M. S., Khamis, S. A., Hassanin, A. A. I. M., & Alsharqawy, M. A. (2014). New audio encryption package for TV cloud computing. International Journal of Speech Technology, 18, 131–142.CrossRef Eldin, S. M. S., Khamis, S. A., Hassanin, A. A. I. M., & Alsharqawy, M. A. (2014). New audio encryption package for TV cloud computing. International Journal of Speech Technology, 18, 131–142.CrossRef
Zurück zum Zitat Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos Solitons Fractals, 29(2), 393–399.CrossRefMATH Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos Solitons Fractals, 29(2), 393–399.CrossRefMATH
Zurück zum Zitat Gnanajeyaraman, R., & Prasadh, K. (2009). Audio encryption using higher dimensional chaotic map. International Journal of Recent Trends in Engineering, 1, 103–107. Gnanajeyaraman, R., & Prasadh, K. (2009). Audio encryption using higher dimensional chaotic map. International Journal of Recent Trends in Engineering, 1, 103–107.
Zurück zum Zitat Han, F. Y., & Zhu, C. X. (2011). An novel chaotic image encryption algorithm based on tangent-delay ellipse reflecting cavity map system. Procedia Engineering, 23, 186–191.CrossRef Han, F. Y., & Zhu, C. X. (2011). An novel chaotic image encryption algorithm based on tangent-delay ellipse reflecting cavity map system. Procedia Engineering, 23, 186–191.CrossRef
Zurück zum Zitat Hussain, I., Shah, T., & Gondal, M. A. (2012). Image encryption algorithm based on PGL(2,GF(2 8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dynamics, 70, 181–187.CrossRefMathSciNet Hussain, I., Shah, T., & Gondal, M. A. (2012). Image encryption algorithm based on PGL(2,GF(2 8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dynamics, 70, 181–187.CrossRefMathSciNet
Zurück zum Zitat Kwon, G. R., Wang, C., Lian, S., & Hwang, S. S. (2012) Advanced partial encryption using watermarking and scrambling in MP3. Multimedia Tools and Applications, 59(3), 885–895.CrossRef Kwon, G. R., Wang, C., Lian, S., & Hwang, S. S. (2012) Advanced partial encryption using watermarking and scrambling in MP3. Multimedia Tools and Applications, 59(3), 885–895.CrossRef
Zurück zum Zitat Lima, J. B., & Da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75, 8403–8418.CrossRef Lima, J. B., & Da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75, 8403–8418.CrossRef
Zurück zum Zitat Liu, H., Kadir, A., & Li, Y. (2016). Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik, 127, 7431–7438.CrossRef Liu, H., Kadir, A., & Li, Y. (2016). Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik, 127, 7431–7438.CrossRef
Zurück zum Zitat May, R. M. (1975). Biological populations obeying difference equations: Stable points, stable cycles, and chaos. Journal of Theoretical Biology, 51, 511–524.CrossRef May, R. M. (1975). Biological populations obeying difference equations: Stable points, stable cycles, and chaos. Journal of Theoretical Biology, 51, 511–524.CrossRef
Zurück zum Zitat May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261, 459–467.CrossRefMATH May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261, 459–467.CrossRefMATH
Zurück zum Zitat Minaam, D. S. A., Abdual-Kader, H. M., & Hadhoud, M. M. (2010). Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. International Journal of Network Security, 11, 78–87. Minaam, D. S. A., Abdual-Kader, H. M., & Hadhoud, M. M. (2010). Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. International Journal of Network Security, 11, 78–87.
Zurück zum Zitat Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617–624.CrossRef Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617–624.CrossRef
Zurück zum Zitat Pavithra, S., & Ramadevi, E. (2012). Throughput Analysis of Symmetric Algorithms. International Journal of Advanced Networking and Applications, 4(2), 1574–1577. Pavithra, S., & Ramadevi, E. (2012). Throughput Analysis of Symmetric Algorithms. International Journal of Advanced Networking and Applications, 4(2), 1574–1577.
Zurück zum Zitat Peng, X., Cui, Z., Cai, L., & Yu, L. (2003). Digital audio signal encryption with a virtual optics scheme. Optik, 114, 69–75.CrossRef Peng, X., Cui, Z., Cai, L., & Yu, L. (2003). Digital audio signal encryption with a virtual optics scheme. Optik, 114, 69–75.CrossRef
Zurück zum Zitat Raghu, R., Radha, K. D., Sudeepa, K. B., & Ganesh, A. (2013). Efficient audio encryption algorithm for online applications using transposition and multiplicative non-binary system. International Journal of Engineering Research & Technology, 2(6), 472–477. Raghu, R., Radha, K. D., Sudeepa, K. B., & Ganesh, A. (2013). Efficient audio encryption algorithm for online applications using transposition and multiplicative non-binary system. International Journal of Engineering Research & Technology, 2(6), 472–477.
Zurück zum Zitat Verma, O. P., Agarwal, R., Dafouti, D., & Tyagi, S. (2011). Peformance analysis of data encryption algorithms in ICECT 2011–2011 3rd International Conference on Electronics Computer Technology 5, pp. 399–403. Verma, O. P., Agarwal, R., Dafouti, D., & Tyagi, S. (2011). Peformance analysis of data encryption algorithms in ICECT 2011–2011 3rd International Conference on Electronics Computer Technology 5, pp. 399–403.
Zurück zum Zitat Wang, H., et al. (2010). Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Transactions on Multimedia, 12, 215–223.CrossRef Wang, H., et al. (2010). Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Transactions on Multimedia, 12, 215–223.CrossRef
Zurück zum Zitat Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11, 514–522.CrossRef Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11, 514–522.CrossRef
Metadaten
Titel
A novel method in audio message encryption based on a mixture of chaos function
verfasst von
Ardalan Ghasemzadeh
Elham Esmaeili
Publikationsdatum
20.08.2017
Verlag
Springer US
Erschienen in
International Journal of Speech Technology / Ausgabe 4/2017
Print ISSN: 1381-2416
Elektronische ISSN: 1572-8110
DOI
https://doi.org/10.1007/s10772-017-9452-y

Weitere Artikel der Ausgabe 4/2017

International Journal of Speech Technology 4/2017 Zur Ausgabe

Neuer Inhalt