Abstract
Multimedia file like audio demands special encryption technique due to its large data capacity without compromising correlation between it’s original and encrypted version (closer to zero). Most of the popular block cipher techniques work on multiple rounds whereas the proposed scheme guarantees the necessary low correlation between the original and the encrypted file without multiple rounds. The unique feature is that the consecutive blocks use different keys derived from the original one using the proposed key chaining algorithm and experimental results show that the correlation between the consecutive keys is also close to zero. The used encryption technique is based on DNA encoding with logistic chaotic map using the generated chain of keys. Furthermore, the concept of channel shuffling is introduced to make the encrypted data more secure. The experimental results confirm that the correlation between the original and ciphered block is close to zero and number of samples change rate value is close to 100. Again correlation between the two consecutive ciphered blocks is also close to zero, which conforms the acceptability of proposed scheme.
Similar content being viewed by others
References
Adleman LM (1994) Molecular computation of solutions to combinatorial problems. American Association for the Advancement of Science 266(5187):1021–1024
Adleman LM (1998) Computing with DNA. Sci Am:54–61
Barker WC, Barker E (2012) Recommendation for the triple data encryption algorithm (tdea) block cipher. NIST Special Publication 800–67, Revision-1, pp. 1—26
Bhargava B, Shi C, Wang S-Y (2004) Mpeg video encryption algorithms. Multimed Tools Appl 24(1):57–79
Daemen J, Rijmen V (2001) Rijndael: The advanced encryption standard. Dr Dobb’s Journal:137–139
Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput & Applic:1–15
Enayatifar R, Addula AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng, Elsevier 56:83–93
Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos, Solitons Fractals, Elsevier 29:393–399
Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 8(5):905–917
Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey
Ibtihal M, Driss EO, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. International Journal of Cloud Applications and Computing 7(2):27–40
Jiao SH, Goutte R (2008) Code for encryption hiding data into genomic DNA of living organisms. In: Proceedings of the 9th International Conference on Signal Processing (ICSP’08), China, pages 2166–2169
Kalpana M, Ratnavelu K, Balasubramaniam P (2018) An audio encryption based on synchronization of robust bam fcnns with time delays. Multimed Tools Appl:1–20
Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3d chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943–2959
Kanso A, Smaoui N (2009) Logistic chaotic maps for binary numbers generations. Chaos, Solitons Fractals 40:2557–2568
Lima JB, da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75(14):8403–8418
Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik - International Journal for Light and Electron Optics 127(19):7431–7438
Madain A, Dalhoum ALA, Hiary H, Ortega A, Alfonseca M (2012) Audio scrambling technique based on cellular automata. Multimed Tools Appl 71(3):1803–1822
Mosa E, Messiha NW, Zahran O, El-Samie EA (2011) Chaotic encryption of speech signals. International Journal of Speech Technology 14
Naskar PK, Khan HN, Roy U, Chaudhuri A, Chaudhuri A (2011) Secret image sharing with embedded session key. Computer Information System-Analysis and Technologies 245:286–294
Naskar PK, Chaudhuri A (2015) A robust image encryption technique using dual chaotic map. International Journal of Electronic Security and Digital Forensics, Inderscience 7(4):358–380
Naskar PK, Chaudhuri A (2016) Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image. The Imaging Science Journal, Taylor & Francis 94(8):460–470
Naskar PK, Chaudhuri A, Chaudhuri A (2014) A secure symmetric image encryption based on linear geometry. Applications and Innovations in Mobile Computing (AIMoC)-14:67–74
Naskar PK, Khan HN, Chaudhuri A, Chaudhuri A (2011) Ultra secured and authentic key distribution protocol using a novel secret sharing technique. Int J Comput Appl 19(7):12–15
Naskar PK, Khan HN, Roy U, Chaudhuri A, Chaudhuri A (2011) Shared cryptography with embedded session key for secret audio. Int J Comput Appl 26(8):5–9
National Bureau of Standards (1999) Data encryption standard. Federal Information Processing Standards Publication 46(3):1–22
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech and Music Processing 20:1–11
Servetti A, De Martin JCD (2002) Perception-based partial encryption of compressed speech. IEEE Transactions on Speech and Audio Processing 10(8):637–643
Servetti A, Testa C, De Martin JC (2003) Frequency-selective partial encryption of compressed audio. IEEE International Conference on Acoustics, Speech and Signal Processing:668–671
Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humaniz Comput:1–13
Thorwirth NJ, Horvatic P, Weis R, Zhao J (2002) Security methods for mp3 music delivery. Thirty-Fourth Asilomar Conference on Signal, Systems and Computers, pages 1831–1835
Yakubu MA, Maddage NC, Atrey PK (2015) Audio secret management scheme using shamir’s secret sharing. International Conference on Multimedia Modeling. LNC, pages 396–407
Yan WQ, Fu WG, Kankanhalli MS (2008) Progressive audio scrambling in compressed domain. IEEE Transaction on Multimedia 10(6):960–968
Yu Z, Gao CZ, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918–31923
Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608
Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711–722
Zhou J, Au OC (2010) Security and efficiency analysis of progressive audio scrambling in compressed domain. IEEE International Conference on Acoustics, Speech and Signal Processing:1802–1805
Zhou Y, Bao L, Chen CLP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172–182
Acknowledgements
We are thankful to the Department of Computer Science & Engineering, Government College of Engineering and Textile Technology, Serampore, Hooghly, W.B., India for giving us the platform for planning and developing this work using all departmental facilities.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Naskar, P.K., Paul, S., Nandy, D. et al. DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data. Multimed Tools Appl 78, 25019–25042 (2019). https://doi.org/10.1007/s11042-019-7696-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7696-z