Skip to main content
Top
Published in: Wireless Personal Communications 1/2020

07-02-2020

Transmission of Chaotic-based Encrypted Audio Through OFDM

Authors: S. F. El-Zoghdy, Hala S. El-sayed, Osama S. Faragallah

Published in: Wireless Personal Communications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays, wireless communications play a vital role in all aspects in our daily life activities. A major part of such communications is audio and its rate increases dramatically. Securing audio during such communications is very important issue. Though OFDM is characterized by its strength against various broadcast impairments, the distinct time and frequency features makes signal of traditional OFDM vulnerable to malicious eavesdropping and intrusion. This paper proposes a communication model for encrypting and transmitting audio over OFDM systems. The 2D Baker, Logistic and Standard chaotic encryption schemes are utilized in the suggested model to encrypt and decrypt the transmitted audio. A simulation model for the proposed communication system is built using various encryption/decryption quality indicators to assess and compare its performance. The results demonstrate a good performance for the suggested communication model using all of the three studied chaotic encryption schemes. It also shows that the proposed communication mode is immune against noise distortion. One more noticed point from the result is that, the performance of the 2D Standard Map chaotic map in the proposed communication model is superior to that of the other two studied chaotic encryption schemes in terms of Spectral Distortion, Log Likelihood Ratio, Correlation Coefficient, Segmental Signal-to-Noise Ratio (SNRseg) and SNR encryption/decryption quality metrics.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chang, R. W. (1996). Synthesis of band-limited orthogonal signals for multichannel data transmission. Bell System Technical Journal,45(10), 1775–1796.CrossRef Chang, R. W. (1996). Synthesis of band-limited orthogonal signals for multichannel data transmission. Bell System Technical Journal,45(10), 1775–1796.CrossRef
2.
go back to reference Henrik, S., & Luders, C. (2005). Theory and applications of OFDM and CDMA. New York: Wiley. Henrik, S., & Luders, C. (2005). Theory and applications of OFDM and CDMA. New York: Wiley.
3.
go back to reference Huo, F., & Gong, G. (2014). A new efficient physical layer OFDM encryption scheme. In Proceedings of IEEE INFOCOM Conference Toronto (pp. 1024–1032). Huo, F., & Gong, G. (2014). A new efficient physical layer OFDM encryption scheme. In Proceedings of IEEE INFOCOM Conference Toronto (pp. 1024–1032).
4.
go back to reference LAN MAN Standards Committee of the IEEE Computer Society. (2004). Air interface for fixed broadband wireless access systems, Part 16. LAN MAN Standards Committee of the IEEE Computer Society. (2004). Air interface for fixed broadband wireless access systems, Part 16.
5.
go back to reference Mohamed, M. A., Samarah, A. S., & Fath Allah, M. I. (2012). Study of performance parameters effects on OFDM systems. International Journal of Computer Science Issues,9(3), 410–441. Mohamed, M. A., Samarah, A. S., & Fath Allah, M. I. (2012). Study of performance parameters effects on OFDM systems. International Journal of Computer Science Issues,9(3), 410–441.
6.
go back to reference Hilmey, M., Elhalafwy, S., & Zein Eldin, M. (2009). Efficient transmission of chaotic and AES encrypted images with OFDM over an AWGN channel. In Proceedings of international IEEE conference on computer engineering & systems (ICCES 2009) Cairo (pp. 353–358). Hilmey, M., Elhalafwy, S., & Zein Eldin, M. (2009). Efficient transmission of chaotic and AES encrypted images with OFDM over an AWGN channel. In Proceedings of international IEEE conference on computer engineering & systems (ICCES 2009) Cairo (pp. 353–358).
7.
go back to reference Hao, L. (2013). Secure OFDM system design for wireless communications. Ph. D. thesis, University of Western Ontario, Graduate Program in Electrical and Computer Engineering. Hao, L. (2013). Secure OFDM system design for wireless communications. Ph. D. thesis, University of Western Ontario, Graduate Program in Electrical and Computer Engineering.
8.
go back to reference Serag Eldin, S. M. (2014). Optimized OFDM transmission of encrypted image over fading channel. Sensing and Imaging,15(1), 1–14. Serag Eldin, S. M. (2014). Optimized OFDM transmission of encrypted image over fading channel. Sensing and Imaging,15(1), 1–14.
9.
go back to reference Shoewu, O., & Olatinwo, S. O. (2013). Securing text messages using elliptic curve cryptography and orthogonal frequency division multiplexing. The Pacific Journal of Science and Technology,14(2), 220–227. Shoewu, O., & Olatinwo, S. O. (2013). Securing text messages using elliptic curve cryptography and orthogonal frequency division multiplexing. The Pacific Journal of Science and Technology,14(2), 220–227.
10.
go back to reference Eldokany, I., El-Rabaie, E. M., Elhalafawy, S., Zein Eldin, M., et al. (2015). Efficient transmission of encrypted images with OFDM in the presence of carrier frequency offset. Wireless Personal Communications,84, 475–521.CrossRef Eldokany, I., El-Rabaie, E. M., Elhalafawy, S., Zein Eldin, M., et al. (2015). Efficient transmission of encrypted images with OFDM in the presence of carrier frequency offset. Wireless Personal Communications,84, 475–521.CrossRef
11.
go back to reference Al-Dweik, A., Mirahmadi, M., Shami, A., Ding, Z., & Hamila, R. (2013). Joint secured and robust technique for OFDM systems. In Proceedings of 20th IEEE International Conference on Electronics, Circuits, and Systems (ICECS) (pp. 865–868). Al-Dweik, A., Mirahmadi, M., Shami, A., Ding, Z., & Hamila, R. (2013). Joint secured and robust technique for OFDM systems. In Proceedings of 20th IEEE International Conference on Electronics, Circuits, and Systems (ICECS) (pp. 865–868).
12.
go back to reference Zeng, L., Zhang, X., Chen, L., Fan, Z., & Wang, Y. (2012). Scrambling-based speech encryption via compressed sensing. EURASIP Journal on Advances in Signal Processing,2012, 257.CrossRef Zeng, L., Zhang, X., Chen, L., Fan, Z., & Wang, Y. (2012). Scrambling-based speech encryption via compressed sensing. EURASIP Journal on Advances in Signal Processing,2012, 257.CrossRef
13.
go back to reference Al Saad, S. N., & Hato, E. (2014). A speech encryption based on chaotic maps. International Journal of Computer Applications,93(4), 19–28.CrossRef Al Saad, S. N., & Hato, E. (2014). A speech encryption based on chaotic maps. International Journal of Computer Applications,93(4), 19–28.CrossRef
14.
go back to reference Kohad, H., Ingle, V. R., & Gaikwad, M. A. (2012). An overview of speech encryption techniques. International Journal of Engineering Research and Development,3(4), 29–32. Kohad, H., Ingle, V. R., & Gaikwad, M. A. (2012). An overview of speech encryption techniques. International Journal of Engineering Research and Development,3(4), 29–32.
15.
16.
go back to reference Elshamy, A. M., Rashed, A. N. Z. A. A., Mohamed, O. S., Faragalla, Y., Mu, S. A., Alshebeili, F. E., et al. (2013). Optical image encryption based on chaotic baker map and double random phase encoding. Journal of Lightwave Technology,31(15), 2533–2539.CrossRef Elshamy, A. M., Rashed, A. N. Z. A. A., Mohamed, O. S., Faragalla, Y., Mu, S. A., Alshebeili, F. E., et al. (2013). Optical image encryption based on chaotic baker map and double random phase encoding. Journal of Lightwave Technology,31(15), 2533–2539.CrossRef
18.
go back to reference abd ulkareem, M., & Abduljaleel, I. Q. (2013). Speech encryption using chaotic map and blow fish algorithms. Journal of Basrah Researches,39(2), 68–76. abd ulkareem, M., & Abduljaleel, I. Q. (2013). Speech encryption using chaotic map and blow fish algorithms. Journal of Basrah Researches,39(2), 68–76.
19.
go back to reference Elshamy, E. M., El-Rabaie, E. M., Faragallah, O. S., Elshakankiry, O. A., Abd El-Samie, F. E., El-sayed, H. S., et al. (2015). Efficient audio cryptosystem based on chaotic maps and double random phase encoding. International Journal of Speech Technology,18(4), 619–631.CrossRef Elshamy, E. M., El-Rabaie, E. M., Faragallah, O. S., Elshakankiry, O. A., Abd El-Samie, F. E., El-sayed, H. S., et al. (2015). Efficient audio cryptosystem based on chaotic maps and double random phase encoding. International Journal of Speech Technology,18(4), 619–631.CrossRef
20.
go back to reference Abdul-Rahaim, L. A. (2009). Proposed realization of modified scrambling using 2D-DWT Based OFDM transceivers. MASAUM Journal of Computing,1(2), 245–251. Abdul-Rahaim, L. A. (2009). Proposed realization of modified scrambling using 2D-DWT Based OFDM transceivers. MASAUM Journal of Computing,1(2), 245–251.
21.
go back to reference Dachselt, F., & Schwarz, W. (2001). Chaos and cryptography. IEEE Transactions on Circuits and Systems,48(2), 163–169.MathSciNetCrossRef Dachselt, F., & Schwarz, W. (2001). Chaos and cryptography. IEEE Transactions on Circuits and Systems,48(2), 163–169.MathSciNetCrossRef
22.
go back to reference Asiml, M., & Jeotil, V. (2007). On image encryption: Comparison between AES and a novel chaotic encryption scheme. In IEEE ICSCN 2007, MIT Campus, Anna University, Chennai, India (pp. 65–69). Asiml, M., & Jeotil, V. (2007). On image encryption: Comparison between AES and a novel chaotic encryption scheme. In IEEE ICSCN 2007, MIT Campus, Anna University, Chennai, India (pp. 65–69).
23.
go back to reference Al-Dhahir, N., & Minn, H. (2005). A new multicarrier transceiver based on the discrete cosine transform. In Proceedings of the IEEE Wireless Communications and Networking Conference (vol. 1, pp. 45–50). Al-Dhahir, N., & Minn, H. (2005). A new multicarrier transceiver based on the discrete cosine transform. In Proceedings of the IEEE Wireless Communications and Networking Conference (vol. 1, pp. 45–50).
24.
go back to reference Tan, P., & Beaulieu, N. C. (2006). A comparison of DCT-based OFDM and DFT-based OFDM in frequency offset and fading channels. IEEE Transactions on Communications,54(11), 2113–2125.CrossRef Tan, P., & Beaulieu, N. C. (2006). A comparison of DCT-based OFDM and DFT-based OFDM in frequency offset and fading channels. IEEE Transactions on Communications,54(11), 2113–2125.CrossRef
25.
go back to reference Vats, V. B., Garg, K. K., & Abad, A. (2008). Performance analysis of DFT-OFDM, DCT-OFDM, and DWT-OFDM systems in AWGN. In Proceedimgs of the IEEE 4th International Conference on Wireless and Mobile Communications (pp. 214–216). Vats, V. B., Garg, K. K., & Abad, A. (2008). Performance analysis of DFT-OFDM, DCT-OFDM, and DWT-OFDM systems in AWGN. In Proceedimgs of the IEEE 4th International Conference on Wireless and Mobile Communications (pp. 214–216).
26.
go back to reference Pande, A., & Zambreno, J. (2011). A chaotic encryption scheme for real-time embedded systems: design and implementation. Berlin: Springer. Pande, A., & Zambreno, J. (2011). A chaotic encryption scheme for real-time embedded systems: design and implementation. Berlin: Springer.
27.
go back to reference Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos,8(6), 1259–1284.MathSciNetCrossRef Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos,8(6), 1259–1284.MathSciNetCrossRef
28.
go back to reference Srividya, G., & Nandakumar, P. (2011). A triple-key chaotic image encryption method. In International Conference on Communications and Signal Processing (ICCSP) (pp. 266–270). Srividya, G., & Nandakumar, P. (2011). A triple-key chaotic image encryption method. In International Conference on Communications and Signal Processing (ICCSP) (pp. 266–270).
29.
go back to reference Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. In Proceedings of IEEE, International Conference of Multimedia and Expo (vol. 1, pp. 553–556). Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. In Proceedings of IEEE, International Conference of Multimedia and Expo (vol. 1, pp. 553–556).
30.
go back to reference Hedelin, P., Norden, F., & Skoglund, J. (1999). SD optimization of spectral coders. In IEEE Workshop on Speech Coding Proceedings (pp. 28–30). Hedelin, P., Norden, F., & Skoglund, J. (1999). SD optimization of spectral coders. In IEEE Workshop on Speech Coding Proceedings (pp. 28–30).
31.
go back to reference Sang, W. K, Young, G. K., & Simon, M. K. (2003). Generalized selection combining based on the log-likelihood ratio. In IEEE International Conference on Communications ICC (vol. 4, pp. 2789–2794). Sang, W. K, Young, G. K., & Simon, M. K. (2003). Generalized selection combining based on the log-likelihood ratio. In IEEE International Conference on Communications ICC (vol. 4, pp. 2789–2794).
Metadata
Title
Transmission of Chaotic-based Encrypted Audio Through OFDM
Authors
S. F. El-Zoghdy
Hala S. El-sayed
Osama S. Faragallah
Publication date
07-02-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07187-4

Other articles of this Issue 1/2020

Wireless Personal Communications 1/2020 Go to the issue