Skip to main content
Erschienen in: Wireless Personal Communications 2/2018

25.10.2017

Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption

verfasst von: Osama S. Faragallah

Erschienen in: Wireless Personal Communications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The paper proposes a secure audio cryptosystem that realize integrity, authentication and confidentiality. The proposed audio cryptosystem achieves integrity by applying a message digest algorithm, authentication by employing LSB watermarking and confidentiality through encryption with Advanced Encryption Standard (AES) or RC6. The main concept of the proposed audio cryptosystem relays on XORing the plain-audio with one selected image from a private image database. Then, the mixed plain-audio blocks are LSB watermarked with the selected image hash value prior to ciphering. The proposed audio cryptosystem is prepared with the potential of increasing immunity against brute force attacks and providing integrity, authentication and confidentiality through the selected image hash value addition using LSB embedding as an extra key. Also, the extra XORing step removes residual intelligibility from the plain-audio blocks, fills the speechless intervals of audio conversation and helps in destroying format and pitch information. The proposed audio cryptosystem is compared with audio encryption using AES, and RC6 through encryption key performance indicators. The comparison outcomes ensured the superiority of the proposed audio cryptosystem. Security investigation of the proposed audio cryptosystem is studied from a precise cryptographic standpoint and tests ensured the superiority of the proposed audio cryptosystem from a cryptographic standpoint.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Li, H., Qin, Z., Shao, L., & Wang, B. (2009). A novel audio scrambling algorithm in variable dimension space. In 11th International Conference on Advanced Communication Technology ICACT 2009 (Vol. 03, pp. 1647–1651), February 15–18, 2009. Li, H., Qin, Z., Shao, L., & Wang, B. (2009). A novel audio scrambling algorithm in variable dimension space. In 11th International Conference on Advanced Communication Technology ICACT 2009 (Vol. 03, pp. 1647–1651), February 15–18, 2009.
2.
Zurück zum Zitat Anas, N. M., Rahman, Z., Shafii, A., Rahman, M. N. A., & Amin, Z. A. M. (2005). Secure speech communication over public switched telephone network. In APACE 2005. Asia-Pacific Conference on Applied Electromagnetcs, December 20–21, 2005. Anas, N. M., Rahman, Z., Shafii, A., Rahman, M. N. A., & Amin, Z. A. M. (2005). Secure speech communication over public switched telephone network. In APACE 2005. Asia-Pacific Conference on Applied Electromagnetcs, December 20–21, 2005.
3.
Zurück zum Zitat Daemen, J., & Rijmen, V. (2001). Advanced Encryption Standard (AES), FIPS 197, Technical Report, Katholijke Universiteit, Leuven/ESAT, November 2001. Daemen, J., & Rijmen, V. (2001). Advanced Encryption Standard (AES), FIPS 197, Technical Report, Katholijke Universiteit, Leuven/ESAT, November 2001.
4.
Zurück zum Zitat Daemen, J., & Rijmen, V. (2001). The advanced encryption standard. Dr. Dobb’s Journal, 26(3), 137–139.MATH Daemen, J., & Rijmen, V. (2001). The advanced encryption standard. Dr. Dobb’s Journal, 26(3), 137–139.MATH
5.
Zurück zum Zitat Lan, L. (2011). The AES encryption and decryption realization based on FPGA. In Seventh International Conference on Computational Intelligence and Security (CIS) (pp. 603–607). Lan, L. (2011). The AES encryption and decryption realization based on FPGA. In Seventh International Conference on Computational Intelligence and Security (CIS) (pp. 603–607).
6.
Zurück zum Zitat Dalmisli, K. V., & Ors, B. (2009). Design of new tiny circuits for AES encryption algorithm. In 3rd International Conference on Signals, Circuits and Systems (SCS) (pp. 1–5). Dalmisli, K. V., & Ors, B. (2009). Design of new tiny circuits for AES encryption algorithm. In 3rd International Conference on Signals, Circuits and Systems (SCS) (pp. 1–5).
7.
Zurück zum Zitat Feldhofer, M., Wolkerstorfer, J., & Rijmen, V. (2005). AES implementation on a grain of sand. IEE Proceedings of Information Security, 152(1), 13–20.CrossRef Feldhofer, M., Wolkerstorfer, J., & Rijmen, V. (2005). AES implementation on a grain of sand. IEE Proceedings of Information Security, 152(1), 13–20.CrossRef
8.
Zurück zum Zitat Lu, C., & Tseng, S. (2002). Integrated design of AES (advanced encryption standard) encrypter and decrypter. In Proceedings of The IEEE International Conference on Application-Specific Systems, Architectures and Processors (pp. 277–285). Lu, C., & Tseng, S. (2002). Integrated design of AES (advanced encryption standard) encrypter and decrypter. In Proceedings of The IEEE International Conference on Application-Specific Systems, Architectures and Processors (pp. 277–285).
9.
Zurück zum Zitat Zhu, Q., Li, L., Liu, J., & Xu, N. (2009). The analysis and design of accounting information security system based on AES algorithm. In International Conference on Machine Learning and Cybernetics (Vol. 5, pp. 2713–2718). Zhu, Q., Li, L., Liu, J., & Xu, N. (2009). The analysis and design of accounting information security system based on AES algorithm. In International Conference on Machine Learning and Cybernetics (Vol. 5, pp. 2713–2718).
10.
Zurück zum Zitat Rivest, R. L., Robshaw, M. J. B., Sidney, R., & Yin, Y. L. (1998). The RC6TM block cipher. Cambridge, MA: M. I. T Laboratory for Computer Science. Rivest, R. L., Robshaw, M. J. B., Sidney, R., & Yin, Y. L. (1998). The RC6TM block cipher. Cambridge, MA: M. I. T Laboratory for Computer Science.
11.
Zurück zum Zitat Contini, S., Rivest, R. L., Robshaw, M. J. B., & Yin, Y. L. (1998). The Security of the RC6TM Block Cipher (Version 1.0). RSA Laboratories, M. I. T Laboratory for Computer Science. Contini, S., Rivest, R. L., Robshaw, M. J. B., & Yin, Y. L. (1998). The Security of the RC6TM Block Cipher (Version 1.0). RSA Laboratories, M. I. T Laboratory for Computer Science.
12.
Zurück zum Zitat Ragab, A. H. M., Ismail, N. A., & FaragAllah,O. S. (2001). Enhancements and implementation of RC6 block cipher for data security. In Proceedings of International Conference on Electrical and Electronic Technology (Vol. 1, pp. 133–137). Ragab, A. H. M., Ismail, N. A., & FaragAllah,O. S. (2001). Enhancements and implementation of RC6 block cipher for data security. In Proceedings of International Conference on Electrical and Electronic Technology (Vol. 1, pp. 133–137).
13.
Zurück zum Zitat Meier, W., Knudsen, L. R. (2000). Correlations in RC6 with a reduced number of rounds source. In Proceedings of The 7th International Workshop on Fast Software Encryption (pp. 94–108). Meier, W., Knudsen, L. R. (2000). Correlations in RC6 with a reduced number of rounds source. In Proceedings of The 7th International Workshop on Fast Software Encryption (pp. 94–108).
14.
Zurück zum Zitat Kim, G., Kim, J., & Cho, G. (2009). An improved RC6 algorithm with the same structure of encryption and decryption. In The 11th International Conference on Advanced Communication Technology (ICACT) (Vol. 2, pp. 1211–1215). Kim, G., Kim, J., & Cho, G. (2009). An improved RC6 algorithm with the same structure of encryption and decryption. In The 11th International Conference on Advanced Communication Technology (ICACT) (Vol. 2, pp. 1211–1215).
15.
Zurück zum Zitat Den Boer, B., & Bosselaers, A. (1994). Collisions for the compression function of MD5. In T. Helleseth (Ed.), Advances in Cryptology. proc. Encrypt′ 93. LNCS 765 (pp. 293–304). Springer. Den Boer, B., & Bosselaers, A. (1994). Collisions for the compression function of MD5. In T. Helleseth (Ed.), Advances in Cryptology. proc. Encrypt′ 93. LNCS 765 (pp. 293–304). Springer.
16.
Zurück zum Zitat Dobbertin, H. (1996). The status of MD5 after a recent attack, RSA laboratories. CryptoBytes, 2(2), 1–6. Dobbertin, H. (1996). The status of MD5 after a recent attack, RSA laboratories. CryptoBytes, 2(2), 1–6.
17.
Zurück zum Zitat Elshamy, E. M., El-Rabaie, S., Faragallah, O. S., Elshakankiry, O., Abd El-Samie, F. E., El-sayed, H. S., et al. (2015). Efficient audio cryptosystem based on chaotic maps and double random phase encoding. International Journal of Speech Technology, 18(4), 619–631.CrossRef Elshamy, E. M., El-Rabaie, S., Faragallah, O. S., Elshakankiry, O., Abd El-Samie, F. E., El-sayed, H. S., et al. (2015). Efficient audio cryptosystem based on chaotic maps and double random phase encoding. International Journal of Speech Technology, 18(4), 619–631.CrossRef
18.
Zurück zum Zitat Elhoseny, H. M., Faragallah, O. S., Ahmed, H. E. H., Kazemian, H. B., El-sayed, H. S., & Abd El-Samie, F. E. (2016). The effect of fractional Fourier transform in encryption quality for digital images. Optik-International Journal for Light and Electron Optics, 127(1), 315–319.CrossRef Elhoseny, H. M., Faragallah, O. S., Ahmed, H. E. H., Kazemian, H. B., El-sayed, H. S., & Abd El-Samie, F. E. (2016). The effect of fractional Fourier transform in encryption quality for digital images. Optik-International Journal for Light and Electron Optics, 127(1), 315–319.CrossRef
19.
Zurück zum Zitat Elhoseny, H. M., Ahmed, H. E. H., Abbas, A. M., Kazemian, H. B., Faragallah, O. S., El-Rabaie, S. M., et al. (2015). Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. Signal, Image and Video Processing Journal, 9(3), 611–622.CrossRef Elhoseny, H. M., Ahmed, H. E. H., Abbas, A. M., Kazemian, H. B., Faragallah, O. S., El-Rabaie, S. M., et al. (2015). Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. Signal, Image and Video Processing Journal, 9(3), 611–622.CrossRef
20.
Zurück zum Zitat Elshamy, A. M., Rashed, A. N. Z., Mohamed, A. E. N. A., Faragallah, O. S., Mu, Y., Alshebeili, S. A., & El-Samie, F. A. (2013). Optical image encryption based on chaotic baker map and double random Phase encoding. IEEE/OSA Journal of Lightwave Technology, 31(15), 2533–2539. Elshamy, A. M., Rashed, A. N. Z., Mohamed, A. E. N. A., Faragallah, O. S., Mu, Y., Alshebeili, S. A., & El-Samie, F. A. (2013). Optical image encryption based on chaotic baker map and double random Phase encoding. IEEE/OSA Journal of Lightwave Technology, 31(15), 2533–2539.
21.
Zurück zum Zitat Hedelin, P., Norden, F., & Skoglund, J. (1999). SD optimization of spectral coders. In IEEE Workshop on Speech Coding Proc. (pp. 28–30). Hedelin, P., Norden, F., & Skoglund, J. (1999). SD optimization of spectral coders. In IEEE Workshop on Speech Coding Proc. (pp. 28–30).
22.
Zurück zum Zitat Faragallah, O. S., & Afifi, A. (2017). Optical color image cryptosystem using chaotic baker mapping based-double random phase encoding. Optical and Quantum Electronics, 49(3), 1–28. Faragallah, O. S., & Afifi, A. (2017). Optical color image cryptosystem using chaotic baker mapping based-double random phase encoding. Optical and Quantum Electronics, 49(3), 1–28.
23.
Zurück zum Zitat Elashry, I. F., Faragallah, O. S., Abbas, A. M., El-Rabaie, S., & Abd El-Samie, F. E. (2009). Homomorphic image encryption. Journal of Electronic Imaging, 18(3), 033002.CrossRef Elashry, I. F., Faragallah, O. S., Abbas, A. M., El-Rabaie, S., & Abd El-Samie, F. E. (2009). Homomorphic image encryption. Journal of Electronic Imaging, 18(3), 033002.CrossRef
Metadaten
Titel
Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption
verfasst von
Osama S. Faragallah
Publikationsdatum
25.10.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4960-2

Weitere Artikel der Ausgabe 2/2018

Wireless Personal Communications 2/2018 Zur Ausgabe

Neuer Inhalt