Skip to main content
Log in

DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Multimedia file like audio demands special encryption technique due to its large data capacity without compromising correlation between it’s original and encrypted version (closer to zero). Most of the popular block cipher techniques work on multiple rounds whereas the proposed scheme guarantees the necessary low correlation between the original and the encrypted file without multiple rounds. The unique feature is that the consecutive blocks use different keys derived from the original one using the proposed key chaining algorithm and experimental results show that the correlation between the consecutive keys is also close to zero. The used encryption technique is based on DNA encoding with logistic chaotic map using the generated chain of keys. Furthermore, the concept of channel shuffling is introduced to make the encrypted data more secure. The experimental results confirm that the correlation between the original and ciphered block is close to zero and number of samples change rate value is close to 100. Again correlation between the two consecutive ciphered blocks is also close to zero, which conforms the acceptability of proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Adleman LM (1994) Molecular computation of solutions to combinatorial problems. American Association for the Advancement of Science 266(5187):1021–1024

    Article  Google Scholar 

  2. Adleman LM (1998) Computing with DNA. Sci Am:54–61

  3. Barker WC, Barker E (2012) Recommendation for the triple data encryption algorithm (tdea) block cipher. NIST Special Publication 800–67, Revision-1, pp. 1—26

  4. Bhargava B, Shi C, Wang S-Y (2004) Mpeg video encryption algorithms. Multimed Tools Appl 24(1):57–79

    Article  Google Scholar 

  5. Daemen J, Rijmen V (2001) Rijndael: The advanced encryption standard. Dr Dobb’s Journal:137–139

  6. Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput & Applic:1–15

  7. Enayatifar R, Addula AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng, Elsevier 56:83–93

    Article  Google Scholar 

  8. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos, Solitons Fractals, Elsevier 29:393–399

    Article  MATH  Google Scholar 

  9. Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 8(5):905–917

    Article  Google Scholar 

  10. Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey

    Book  Google Scholar 

  11. Ibtihal M, Driss EO, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. International Journal of Cloud Applications and Computing 7(2):27–40

    Article  Google Scholar 

  12. Jiao SH, Goutte R (2008) Code for encryption hiding data into genomic DNA of living organisms. In: Proceedings of the 9th International Conference on Signal Processing (ICSP’08), China, pages 2166–2169

  13. Kalpana M, Ratnavelu K, Balasubramaniam P (2018) An audio encryption based on synchronization of robust bam fcnns with time delays. Multimed Tools Appl:1–20

  14. Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3d chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943–2959

    Article  MathSciNet  MATH  Google Scholar 

  15. Kanso A, Smaoui N (2009) Logistic chaotic maps for binary numbers generations. Chaos, Solitons Fractals 40:2557–2568

    Article  MATH  Google Scholar 

  16. Lima JB, da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75(14):8403–8418

    Article  Google Scholar 

  17. Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik - International Journal for Light and Electron Optics 127(19):7431–7438

    Article  Google Scholar 

  18. Madain A, Dalhoum ALA, Hiary H, Ortega A, Alfonseca M (2012) Audio scrambling technique based on cellular automata. Multimed Tools Appl 71(3):1803–1822

    Article  Google Scholar 

  19. Mosa E, Messiha NW, Zahran O, El-Samie EA (2011) Chaotic encryption of speech signals. International Journal of Speech Technology 14

  20. Naskar PK, Khan HN, Roy U, Chaudhuri A, Chaudhuri A (2011) Secret image sharing with embedded session key. Computer Information System-Analysis and Technologies 245:286–294

  21. Naskar PK, Chaudhuri A (2015) A robust image encryption technique using dual chaotic map. International Journal of Electronic Security and Digital Forensics, Inderscience 7(4):358–380

    Article  Google Scholar 

  22. Naskar PK, Chaudhuri A (2016) Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image. The Imaging Science Journal, Taylor & Francis 94(8):460–470

    Article  Google Scholar 

  23. Naskar PK, Chaudhuri A, Chaudhuri A (2014) A secure symmetric image encryption based on linear geometry. Applications and Innovations in Mobile Computing (AIMoC)-14:67–74

  24. Naskar PK, Khan HN, Chaudhuri A, Chaudhuri A (2011) Ultra secured and authentic key distribution protocol using a novel secret sharing technique. Int J Comput Appl 19(7):12–15

    Google Scholar 

  25. Naskar PK, Khan HN, Roy U, Chaudhuri A, Chaudhuri A (2011) Shared cryptography with embedded session key for secret audio. Int J Comput Appl 26(8):5–9

    Google Scholar 

  26. National Bureau of Standards (1999) Data encryption standard. Federal Information Processing Standards Publication 46(3):1–22

    Google Scholar 

  27. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  28. Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MathSciNet  MATH  Google Scholar 

  29. Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech and Music Processing 20:1–11

    Google Scholar 

  30. Servetti A, De Martin JCD (2002) Perception-based partial encryption of compressed speech. IEEE Transactions on Speech and Audio Processing 10(8):637–643

    Article  Google Scholar 

  31. Servetti A, Testa C, De Martin JC (2003) Frequency-selective partial encryption of compressed audio. IEEE International Conference on Acoustics, Speech and Signal Processing:668–671

  32. Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humaniz Comput:1–13

  33. Thorwirth NJ, Horvatic P, Weis R, Zhao J (2002) Security methods for mp3 music delivery. Thirty-Fourth Asilomar Conference on Signal, Systems and Computers, pages 1831–1835

  34. Yakubu MA, Maddage NC, Atrey PK (2015) Audio secret management scheme using shamir’s secret sharing. International Conference on Multimedia Modeling. LNC, pages 396–407

  35. Yan WQ, Fu WG, Kankanhalli MS (2008) Progressive audio scrambling in compressed domain. IEEE Transaction on Multimedia 10(6):960–968

    Article  Google Scholar 

  36. Yu Z, Gao CZ, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918–31923

    Article  Google Scholar 

  37. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  38. Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711–722

    Article  Google Scholar 

  39. Zhou J, Au OC (2010) Security and efficiency analysis of progressive audio scrambling in compressed domain. IEEE International Conference on Acoustics, Speech and Signal Processing:1802–1805

  40. Zhou Y, Bao L, Chen CLP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

Download references

Acknowledgements

We are thankful to the Department of Computer Science & Engineering, Government College of Engineering and Textile Technology, Serampore, Hooghly, W.B., India for giving us the platform for planning and developing this work using all departmental facilities.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prabir Kumar Naskar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naskar, P.K., Paul, S., Nandy, D. et al. DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data. Multimed Tools Appl 78, 25019–25042 (2019). https://doi.org/10.1007/s11042-019-7696-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7696-z

Keywords

Navigation