Skip to main content
Erschienen in: Neural Processing Letters 3/2019

27.06.2019

Double-Key Secure for N-1-N Sound Record Data (SRD) by the Drive-Response of BAM NNs

verfasst von: M. Kalpana, K. Ratnavelu, P. Balasubramaniam, W. A. M. Othman

Erschienen in: Neural Processing Letters | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this work, the problem of N sound record data (audio) encryption based on double-key secure is proposed. The first key is the math tricks to cumulate N audio files in a single file. The second key is the values of the parameters \(A,\ B,\ D,\ \tilde{A},\ \tilde{B},\ \tilde{D},\) of the constructed drive-response bidirectional associative memory neural networks to be found by suitable Lyapunov–Krasovskii functional and satisfying the linear matrix inequality to obtain the dynamical signal (irregular), which are used to encrypt an audio file. Further, the key sensitivity of \(1e-10\) of the proposed method are large adequate key space to make hacker’s attack infeasible. Numerical simulations, cryptanalysis of the proposed scheme are provided to show the best performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yang YG, Tian J, Sun SJ, Xu P (2015) Quantum-assisted encryption for digital audio signals. Opt Int J Light Electron Opt 126:3221–3226CrossRef Yang YG, Tian J, Sun SJ, Xu P (2015) Quantum-assisted encryption for digital audio signals. Opt Int J Light Electron Opt 126:3221–3226CrossRef
2.
Zurück zum Zitat Chang D, Li Z, Wang M, Zeng Y (2018) A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication. AEU Int J Electron Commun 88:20–29CrossRef Chang D, Li Z, Wang M, Zeng Y (2018) A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication. AEU Int J Electron Commun 88:20–29CrossRef
3.
Zurück zum Zitat Yan F, Iliyasu AM, Guo Y, Yang H (2018) Flexible representation and manipulation of audio signals on quantum computers. Theor Comput Sci 752:71–85MathSciNetCrossRef Yan F, Iliyasu AM, Guo Y, Yang H (2018) Flexible representation and manipulation of audio signals on quantum computers. Theor Comput Sci 752:71–85MathSciNetCrossRef
4.
Zurück zum Zitat Shahadi HI (2018) Covert communication model for speech signals based on an indirect and adaptive encryption technique. Comput Electr Eng 68:425–436CrossRef Shahadi HI (2018) Covert communication model for speech signals based on an indirect and adaptive encryption technique. Comput Electr Eng 68:425–436CrossRef
5.
Zurück zum Zitat Pu Z, Rao R (2018) Exponential stability criterion of high-order BAM neural networks with delays and impulse via fixed point approach. Neurocomputing 292:63–71CrossRef Pu Z, Rao R (2018) Exponential stability criterion of high-order BAM neural networks with delays and impulse via fixed point approach. Neurocomputing 292:63–71CrossRef
6.
Zurück zum Zitat Balasubramaniam P, Kalpana M, Rakkiyappan R (2011) Existence and global asymptotic stability of fuzzy cellular neural networks with time delay in the leakage term and unbounded distributed delays. Circuits Syst Signal Process 30:1595–1616MathSciNetCrossRef Balasubramaniam P, Kalpana M, Rakkiyappan R (2011) Existence and global asymptotic stability of fuzzy cellular neural networks with time delay in the leakage term and unbounded distributed delays. Circuits Syst Signal Process 30:1595–1616MathSciNetCrossRef
7.
Zurück zum Zitat Huang C, Cao J (2018) Impact of leakage delay on bifurcation in high-order fractional BAM neural networks. Neural Netw 98:223–235CrossRef Huang C, Cao J (2018) Impact of leakage delay on bifurcation in high-order fractional BAM neural networks. Neural Netw 98:223–235CrossRef
8.
Zurück zum Zitat Huang C, Meng Y, Cao J, Alsaedi A, Alsaadi FE (2017) New bifurcation results for fractional BAM neural network with leakage delay. Chaos Solitons Fractals 100:31–44MathSciNetCrossRef Huang C, Meng Y, Cao J, Alsaedi A, Alsaadi FE (2017) New bifurcation results for fractional BAM neural network with leakage delay. Chaos Solitons Fractals 100:31–44MathSciNetCrossRef
9.
Zurück zum Zitat Aouiti C, Gharbia IB, Cao J, M’hamdi MS, Alsaedi A (2018) Existence and global exponential stability of pseudo almost periodic solution for neutral delay BAM neural networks with time-varying delay in leakage terms. Chaos Solitons Fractals 107:111–127MathSciNetCrossRef Aouiti C, Gharbia IB, Cao J, M’hamdi MS, Alsaedi A (2018) Existence and global exponential stability of pseudo almost periodic solution for neutral delay BAM neural networks with time-varying delay in leakage terms. Chaos Solitons Fractals 107:111–127MathSciNetCrossRef
10.
Zurück zum Zitat Chen C, Li L, Peng H, Yang Y (2018) Adaptive synchronization of memristor-based BAM neural networks with mixed delays. Appl Math Comput 322:100–110MathSciNetMATH Chen C, Li L, Peng H, Yang Y (2018) Adaptive synchronization of memristor-based BAM neural networks with mixed delays. Appl Math Comput 322:100–110MathSciNetMATH
11.
Zurück zum Zitat Kalpana M, Balasubramaniam P, Ratnavelu K (2015) Direct delay decomposition approach to synchronization of chaotic fuzzy cellular neural networks with discrete, unbounded distributed delays and Markovian jumping parameters. Appl Math Comput 254:291–304MathSciNetMATH Kalpana M, Balasubramaniam P, Ratnavelu K (2015) Direct delay decomposition approach to synchronization of chaotic fuzzy cellular neural networks with discrete, unbounded distributed delays and Markovian jumping parameters. Appl Math Comput 254:291–304MathSciNetMATH
12.
Zurück zum Zitat Mansi, Chawla R (2015) A review on audio cryptography. Int J Mod Commun Technol Res 3:14–16 Mansi, Chawla R (2015) A review on audio cryptography. Int J Mod Commun Technol Res 3:14–16
13.
Zurück zum Zitat Kalpana M, Ratnavelu K, Balasubramaniam P, Kamali MZM (2018) Synchronization of chaotic-type delayed neural networks and its application. Nonlinear Dyn 93:543–555CrossRef Kalpana M, Ratnavelu K, Balasubramaniam P, Kamali MZM (2018) Synchronization of chaotic-type delayed neural networks and its application. Nonlinear Dyn 93:543–555CrossRef
14.
Zurück zum Zitat Ratnavelu K, Kalpana M, Balasubramaniam P, Wong K, Raveendran P (2017) Image encryption method based on chaotic fuzzy cellular neural networks. Signal Process 140:87–96CrossRef Ratnavelu K, Kalpana M, Balasubramaniam P, Wong K, Raveendran P (2017) Image encryption method based on chaotic fuzzy cellular neural networks. Signal Process 140:87–96CrossRef
16.
Zurück zum Zitat Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105CrossRef Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105CrossRef
17.
Zurück zum Zitat Li H, Qin Z, Zhang X, Wang X (2011) Auditory cryptography security algorithm with audio shelters. Proc Eng 15:2695–2699CrossRef Li H, Qin Z, Zhang X, Wang X (2011) Auditory cryptography security algorithm with audio shelters. Proc Eng 15:2695–2699CrossRef
18.
Zurück zum Zitat Muthukumar P, Balasubramaniam P, Ratnavelu K (2018) Sliding mode control for generalized robust synchronization of mismatched fractional order dynamical systems and its application to secure transmission of voice messages. ISA Trans 82:51–61CrossRef Muthukumar P, Balasubramaniam P, Ratnavelu K (2018) Sliding mode control for generalized robust synchronization of mismatched fractional order dynamical systems and its application to secure transmission of voice messages. ISA Trans 82:51–61CrossRef
19.
Zurück zum Zitat Silva-García VM, Flores-Carapia R, Rentería-Márquez C, Luna-Benoso B, Aldape-Pérez M (2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123–135MathSciNetMATH Silva-García VM, Flores-Carapia R, Rentería-Márquez C, Luna-Benoso B, Aldape-Pérez M (2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123–135MathSciNetMATH
20.
Zurück zum Zitat Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as PRBG for voice encryption in wireless communication. Proc Comput Sci 65:314–323CrossRef Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as PRBG for voice encryption in wireless communication. Proc Comput Sci 65:314–323CrossRef
21.
Zurück zum Zitat Shatheesh Sam I, Devaraj P, Bhuvaneswaran Raghuvel S (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56:315–330CrossRef Shatheesh Sam I, Devaraj P, Bhuvaneswaran Raghuvel S (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56:315–330CrossRef
22.
Zurück zum Zitat Wang W, Yuan M, Luo X, Liu L, Zhang Y (2018) Anti-synchronization control of BAM memristive neural networks with multiple proportional delays and stochastic perturbations. Mod Phys Lett B 32:1850028MathSciNetCrossRef Wang W, Yuan M, Luo X, Liu L, Zhang Y (2018) Anti-synchronization control of BAM memristive neural networks with multiple proportional delays and stochastic perturbations. Mod Phys Lett B 32:1850028MathSciNetCrossRef
23.
Zurück zum Zitat Wang W, Yu X, Luo X, Li L (2018) Stability analysis of memristive multidirectional associative memory neural networks and applications in information storage. Mod Phys Lett B 32:1850207MathSciNetCrossRef Wang W, Yu X, Luo X, Li L (2018) Stability analysis of memristive multidirectional associative memory neural networks and applications in information storage. Mod Phys Lett B 32:1850207MathSciNetCrossRef
24.
Zurück zum Zitat Yuan M, Wang W, Luo X, Liu L, Zhao W (2018) Finite-time anti-synchronization of memristive stochastic BAM neural networks with probabilistic time-varying delays. Chaos Solitons Fractals 113:244–260MathSciNetCrossRef Yuan M, Wang W, Luo X, Liu L, Zhao W (2018) Finite-time anti-synchronization of memristive stochastic BAM neural networks with probabilistic time-varying delays. Chaos Solitons Fractals 113:244–260MathSciNetCrossRef
25.
Zurück zum Zitat Wang W, Yu X, Luo X, Kurths J (2018) Synchronization control of memristive multidirectional associative memory neural networks and applications in network security communication. IEEE Access 6:36002–36018CrossRef Wang W, Yu X, Luo X, Kurths J (2018) Synchronization control of memristive multidirectional associative memory neural networks and applications in network security communication. IEEE Access 6:36002–36018CrossRef
26.
Zurück zum Zitat Wang W, Yu X, Luo X, Kurths J (2018) Finite-time synchronization of chaotic memristive multidirectional associative memory neural networks and applications in image encryption. IEEE Access 6:35764–35779CrossRef Wang W, Yu X, Luo X, Kurths J (2018) Finite-time synchronization of chaotic memristive multidirectional associative memory neural networks and applications in image encryption. IEEE Access 6:35764–35779CrossRef
27.
Zurück zum Zitat Yuan M, Luo X, Wang W, Li L, Peng H (2019) Pinning synchronization of coupled memristive recurrent neural networks with mixed time-varying delays and perturbations. Neural Process Lett 49:239–262CrossRef Yuan M, Luo X, Wang W, Li L, Peng H (2019) Pinning synchronization of coupled memristive recurrent neural networks with mixed time-varying delays and perturbations. Neural Process Lett 49:239–262CrossRef
28.
Zurück zum Zitat Wang W, Yu M, Luo X, Liu L, Yuan M, Zhao W (2017) Synchronization of memristive BAM neural networks with leakage delay and additive time-varying delay components via sampled-data control. Chaos Solitons Fractals 104:84–97MathSciNetCrossRef Wang W, Yu M, Luo X, Liu L, Yuan M, Zhao W (2017) Synchronization of memristive BAM neural networks with leakage delay and additive time-varying delay components via sampled-data control. Chaos Solitons Fractals 104:84–97MathSciNetCrossRef
29.
Zurück zum Zitat Yang R, Gao H, Shi P (2009) Novel robust stability criteria for stochastic Hopfield neural networks with time delays. IEEE Trans Syst Man Cybern Part B (Cybern) 39:467–474CrossRef Yang R, Gao H, Shi P (2009) Novel robust stability criteria for stochastic Hopfield neural networks with time delays. IEEE Trans Syst Man Cybern Part B (Cybern) 39:467–474CrossRef
30.
Zurück zum Zitat Kalpana M, Ratnavelu K, Balasubramaniam P (2019) An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimed Tools Appl 78:5969–5988CrossRef Kalpana M, Ratnavelu K, Balasubramaniam P (2019) An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimed Tools Appl 78:5969–5988CrossRef
31.
Zurück zum Zitat Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Opt Int J Light Electron Opt 127:7431–7438CrossRef Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Opt Int J Light Electron Opt 127:7431–7438CrossRef
32.
Zurück zum Zitat Nadir J, Ein AA, Alqadi Z (2016) A technique to encrypt–decrypt stereo wave file. Int J Comput Inf Technol 05:465–470 Nadir J, Ein AA, Alqadi Z (2016) A technique to encrypt–decrypt stereo wave file. Int J Comput Inf Technol 05:465–470
Metadaten
Titel
Double-Key Secure for N-1-N Sound Record Data (SRD) by the Drive-Response of BAM NNs
verfasst von
M. Kalpana
K. Ratnavelu
P. Balasubramaniam
W. A. M. Othman
Publikationsdatum
27.06.2019
Verlag
Springer US
Erschienen in
Neural Processing Letters / Ausgabe 3/2019
Print ISSN: 1370-4621
Elektronische ISSN: 1573-773X
DOI
https://doi.org/10.1007/s11063-019-10067-z

Weitere Artikel der Ausgabe 3/2019

Neural Processing Letters 3/2019 Zur Ausgabe

Neuer Inhalt