Abstract

When the number of the mixed signals is less than that of the source signals, the underdetermined blind source separation (BSS) is a significant difficult problem. Due to the fact that the great amount data of speech communications and real-time communication has been required, we utilize the intractability of the underdetermined BSS problem to present a dual key speech encryption method. The original speech is mixed with dual key signals which consist of random key signals (one-time pad) generated by secret seed and chaotic signals generated from chaotic system. In the decryption process, approximate calculation is used to recover the original speech signals. The proposed algorithm for speech signals encryption can resist traditional attacks against the encryption system, and owing to approximate calculation, decryption becomes faster and more accurate. It is demonstrated that the proposed method has high level of security and can recover the original signals quickly and efficiently yet maintaining excellent audio quality.

1. Introduction

As speech communications in our daily life become more and more common, the importance of providing a high level of security is sharply increasing. For that reason, a series of speech encryption methods have been proposed. Among which, the analogue encryption is one of the most popular encryption techniques widely used in speech communication. Generally, there are four categories of cryptographic algorithms in speech communication: frequency-domain scrambling (e.g., the frequency inverter and the band splitter), time-domain scrambling (e.g., the time element scrambling), amplitude scrambling (also known as the masking technique that covers the speech signal by the linear addition of pseudorandom amplitudes), and two-dimensional scrambling that combines the frequency-domain scrambling with the time-domain scrambling [1, 2]. In addition, there are many other analogue speech encryption algorithms in the transform domain, for example, discrete cosine transform, fast Fourier transform, wavelet transform, and so forth [35]. Up to date, many new speech encryption algorithms including BSS-based [2, 6], chaotic cryptosystem [710], and encryption using circulant transformations [11] have been developed. Due to the fact that the great amount data of speech communications and real-time communication has been required, it is not suitable to utilize traditional encryption methods directly for speech communication encryption. As such, to explore speech encryption methods that have a high level of security and efficiency and high speed in decryption while retaining excellent audio quality is an urgent issue.

Blind source separation (BSS) is used to recover unknown source or signals that are independent mutually of their observed mixtures without knowing the mixing coefficients. So, it is also known as independent component analysis (ICA). Recently, signals encryption has been more applied on the image cryptosystems [1214] but less on the speech encryption. Speech encryption method based BSS, of which the security dependent on the difficulty of solving the underdetermined BSS problem where the number of the observed mixed signals is less than that of the source signals. The sufficient condition for constructing the underdetermined mixing matrix for encryption is presented based on the source inseparability of BSS [15].

One-time pad [16] is a simple and completely unbreakable symmetric cipher, and it has two perfect characteristics: the key is random and has the same length as the message. The key space is large enough to resist brute-force attacks as long as the key is long enough. So, the message is secure as long as the key is protected. Motivated by the randomness and initial conditions’ sensitivity of chaotic signals, we present an underdetermined BSS-based dual key speech encryption scheme in this paper. The dual key of which are random signals (one-time pad) and chaotic signals, namely, key signals I and II, respectively. The main purpose of the algorithm is to mask the original speech signals by mixing the original speech with key signals I and II. In the decryption process, approximate calculation method is used to recover the original speech signals. The underdetermined blind source separation is a significant challenge in blind source separation (BSS) where the number of the source signals is greater than that of the mixed signals. In addition, the using of the key signals I and II (one-time pad and chaotic signal) ensures high security of the algorithm. Both extensive computer simulations and performance analysis results show that the proposed method has high level of security while retaining excellent audio quality.

The rest of this paper is organized as follows. In Section 2, firstly, we introduce the BSS mixing model and the underdetermined BSS problem briefly, secondly, the details of speech encryption and decryption are described, and finally, we analyze the feasibility of approximate calculation in the decryption process. Sections 3 and 4 conduct computer simulations to illustrate and analyze the performance of the method. We conclude this paper in Section 5.

2. Proposed Method

2.1. BSS Mixing Model and Underdetermined Problem [2]

Suppose that is independent source signals and observed mixtures of the source signals are . The linear BSS mixing model is represented as follows: where , which is column vector collected from the source signals, similarly, column vector collects the observed signals, and is an mixing matrix that contains the mixing coefficients. The aim of BSS is to find a demixing matrix such that output vector: where is a permutation matrix and is a diagonal scaling matrix. When the number of the mixed signals is less than that of the source signals; that is, , BSS becomes a difficult case of the underdetermined problem, in which the complete separation of the source signals is impossible.

2.2. Encryption

The main idea of the proposed algorithm is to construct the intractable underdetermined BSS problem in encryption, and in decryption it can only be solved with the dual key. The block diagram of the underdetermined BSS-based speech encryption scheme is shown in Figure 1.

Two main steps in the encryption process are the segment splitter and the underdetermined mixing. Suppose that the original speech is divided into frames, and every frame is encrypted, respectively; is the frame pointer. The frame is encrypted as follows.(1)Segment splitter: the segment splitter first partitions the frame into segments , , where is the segment length.(2)Underdetermined mixing: the source signals are composed of three parts, they are original speech signals, key signals I generated by pseudorandom number generator (PRNG) with secret seed , and key signals II from chaotic system. denotes original speech, key signals I are , and is key signals II. Therefore, column vector of the source signals is . A underdetermined mixing matrix for encryption is first generated randomly, where is a matrix of full rank, which is pseudorandomly generated with normal distribution between −1 and 1, , are scalar values to make the original speech be covered well by the dual key signals. The encryption equation can be represented as follows: where is the observed signals. (Parameters , , secret seed , initial condition of chaotic system, and scalar , are inserted into the head data of the encryption speech in a definite format for transmission.)

2.3. Decryption

Once the mixture signals are received, the key signals I are regenerated by the secret seed and the key signals II are produced by the chaotic system using the initial conditions. Usually, BSS is then performed [2, 17] to recover original signals. But in this paper, we employ approximate calculation to recover original signals.

2.3.1. The Approximate Calculation for Decryption

Multiply at both sides of (3), and we get equation: Similarly, multiply at both sides of (3), and then get equation denoted by Equations (4) and (5) can be represented by (7) and (8), respectively, Since the original speech signals are independent statistically of the key signals I and II, we have ,, that is, ,,, ; therefore, (7) and (8) are represented approximately by (9) and (10): Plus (9) and (10), we can get equation: So we obtain an estimate for as follows: Substituting in (3) with (11), original signals can be estimated as

2.3.2. The Steps of Calculating Original Signals for Decryptions

Parameters , and scalar , are transmitted together with the secret seed and initial condition of chaotic system in the head data of the encryption speech. The original speech signals can be decrypted with very high quality by employing the decryption equation (13). Supposing that the mixed signals are received and the double key signals are regenerated, the original signals can be calculated as follows:(a)calculate , , , , , respectively;(b)calculate and ;(c)calculate using (13).

2.3.3. Analysis of the Approximate Calculation for Decryption

Key signals I and II are generated by pseudorandom number generator (PRNG) and chaotic system, respectively. They are both independent statistically of the original signals. For illustrating the feasibility of the approximate calculation, we compute values of , , , and in the example. The original signals of digital “1” in English are regarded as a frame, which is divided into two segments, that is, , , the original signals , correspondingly key signals I and II are , . The key signals I are generated by PRNG with the secret seed , and choosing initial condition , , the key signals II are generated by Chen-Lee chaotic system [18]: Finally, we calculate the values of , , , and get the average values of diagonal elements value of , , , and are 1.3775, 5365.35, −0.5212, and 876.29, respectively.

In the example, the original signals are also splitted into other different numbers of segments, which are , 8, corresponding to , 4000, use the same key signals I and II, and compute , , , and , respectively. Table 1 shows the results of the average value of diagonal elements and upper-triangular for comparison of , , , and in three different cases.

From Table 1 we can see that the average values of diagonal elements of are considerably much smaller than those of , and the average values of upper-triangular elements of are also much smaller than those of , and obviously, , ; therefore, using approximate calculation for decryption is feasible, which means that the decryption method in this paper not only have the characteristic of computing simply and quickly but also maintaining excellent audio quality.

3. Computer Simulations

In order to illustrate the feasibility of the proposed scheme, we carry out extensive computer simulation. In common experiments, recorded audio files in wave format are adopted and transmitted within local area network. In our experiment, we use the speech file recording a man saying the digit “1” in English. The speech signals are sampled at 16 KHz, as shown in Figure 2(a). For the purpose of simplifying experiment process, we regard the speech signals as one frame directly and separate them into two segments; that is, , , as shown in Figure 2(a). The key signals I are generated by PRNG with the secret seed , and Figure 2(b) is the split wave of key signals I. Choosing initial condition and , the key signals II are generated by Chen-Lee chaotic system [18]: and the split wave of which is showed in Figure 2(c). Choosing , the underdetermined mixing matrix used for simulation is using (3), and two cipher texts are deduced quickly. Figure 2(d) shows the two cipher-text segments. Obviously, the original speech signals are well covered with the mixed sets of key signals I and II. In the decryption process, the mixed signals are received and the double key signals are regenerated; we can regain the original speech signals according to the steps of approximate calculation decryption method. The recovered signals are showed in Figure 2(e).

4. Performance Analysis

4.1. Signal-to-Noise Ratio Computation

For the purpose of quantifying the performance of the proposed method, we calculated the signal-to-noise ratio (SNR) index of original signals segments in each encrypted signal segments and decrypted signals segments. Particularly, the SNR index of original segments in the decrypted segments is represented as follows: where is original signals and is decrypted original signals that are calculated by the approximate calculation method. If is replaced by , which denotes encrypted signals, we can obtain the SNR index of encrypted signals. Employing the data in computer simulations, we can get SNR of two original signals segments in two encrypted segments and two decrypted signals segments. Table 2 shows the results.

These SNR indexes show that in the encrypted segments dual key signals have well masked the original segments, and the original signals in the decrypted segments that are recovered by approximate calculation method have excellent quality.

4.2. Security Analysis

We take advantage of the underdetermined BSS problem to propose a dual key encryption algorithm in this paper. There are three aspects to ensure the security of the algorithm. Firstly, the intractability of the underdetermined BSS problem can be ensured by the mixing matrix for encryption. Secondly, the key signals I that as long as the original speech signals have the prefect property of the one-time pad cipher, which is statistically independent and non-Gaussian characteristics.

Finally the key signals II are generated from the Chen-Lee chaotic system that has the characteristic of power randomness and high sensitivity to initial condition. In order to illustrate the sensitivity of the proposed encryption algorithm to secret keys, we choose an estimate of the initial condition that is , , in which there is a slight mismatch with the real initial condition and use the same key signals I with secret seed . Figure 3 shows two segments of the recovered signals utilizing the approximate calculation for decryption. Obviously, the recovered signals with the wrong secret key are totally different from the original speech signals. In short, the proposed method is sensitive to secret keys and immune against the ordinary attacks on cryptosystems, for example, cipher-text-only attack, known-plaintext attack, chosen-plaintext attack, and brute-force attract.

5. Conclusions

In this paper, we proposed a new dual key encryption scheme based on the underdetermined BSS problem. Since the mixing matrix for encryption ensures the intractability of the underdetermined BSS problem, and the key signals I approximately have the prefect property of the one-time pad cipher, and the key signals II are generated from the chaotic system that has the characteristic of power randomness and high sensitivity to initial condition. In the decryption process, using approximate calculation decryption method can recover the original signals quickly and efficiently yet maintaining high level audio quality. The design of this encryption method has five merits: it is impossible to recover the original signals without the parameters in the head data of the encryption speech signals; the approximate calculation method used in decryption process ensures the recovery of the original signals efficiently yet maintaining excellent speech quality; the key signals I approximately has the prefect property of the one-time pad cipher, in which the length of the key is the same as the original speech signals; hence, the space of the keys is so large that all brute-force attacks against the system are infeasible; the key signals II generated from chaotic system that provides the present scheme having the property of cipher text are very sensitive to secret keys, and it can resist all kinds of traditional attacks against cryptosystems.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

This work was sponsored by the National Nature Science Foundation of China (61173106), Specialized Research Fund for the Doctoral Program of Higher Education of China (20100161120021), the Natural Science Foundation of Hunan Province of China (14JJ3062), and Young Teacher’s Growth Program of Hunan University.