Skip to main content

Controlled Chaos Position Transformation and Noise Generation-Based Keyless Speech Encryption Technique

  • Conference paper
  • First Online:
Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 237 Accesses

Abstract

The exponential developments in the field of communication, data transfer, and computational technologies have created tremendous growth in the development of encryption techniques. In this contest, there will always be a healthy demand for efficient and strong encryption techniques to store data in encrypted domain to avoid the possibility of data breach in the shared networks. In this paper, a novel approach for multi-level keyless speech encryption technique based on controlled chaos position transformation and controlled noise generation is developed. In the proposed algorithm, speech sample positions are randomized with the help of controlled chaos position transformation system and then noise is generated in the randomized speech samples with the help of controlled noise generation system. Secret noise generation level of the noise generation system increases the security of the developed algorithm. It is then attached in the end of encrypted speech with the help of combinational masking scheme, which makes the developed encryption technique keyless. The developed algorithm is tested over a huge number of speech samples and the obtained result shows improvement in UACI and SNR by 17.4% and 49.29%, respectively, than the related work found in the literature. The proposed algorithm is compared with different relevant works and found superior to them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chang S, Cohen T, Ostdiek B (2018) What is machine learning? Phys Rev D 97:056009

    Article  Google Scholar 

  2. Kahate A (2013) Cryptography and network security. Tata McGraw-Hill Education

    Google Scholar 

  3. Satti MVK (2007) Quasi group based crypto-system

    Google Scholar 

  4. Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci Numer Simul 15(12):3998–4006

    Google Scholar 

  5. Tamimi AA, Abdalla AM (2012) A double-shuffle image-encryption algorithm. In: Proceedings of the International conference on image processing, computer vision, and pattern recognition (IPCV). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), p 1

    Google Scholar 

  6. Yahya AA, Abdalla AM (2008) A shuffle image-encryption algorithm. J Comput Sci 4(12):999

    Article  Google Scholar 

  7. Kaur M, Kaur S (2014) Survey of various encryption techniques for audio data. Int J Adv Res Comput Sci Softw Eng 4(5):1314–1317

    Google Scholar 

  8. Al-kateeb ZN, Mohammed SJ (2020) A novel approach for audio file encryption using hand geometry. Multimedia Tools Appl 79(27):19615–19628

    Article  Google Scholar 

  9. Teerakanok T, Kamolphiwong S (2009) Accelerating asymmetric-key cryptography using parallel-key cryptographic algorithm (PCA). In: 2009 6th International conference on electrical engineering/electronics, computer, telecommunications and information technology, vol. 2. IEEE, pp 812–815

    Google Scholar 

  10. Sathiyamurthi P, Ramakrishnan S (2020) Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimedia Tools Appl 1–19

    Google Scholar 

  11. Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio Speech Music Process 2017(1):1–11

    Article  Google Scholar 

  12. Mosa E, Messiha NW, Zahran O, Abd El-Samie FE (2011) Chaotic encryption of speech signals. Int J Speech Technol 14(4):285

    Google Scholar 

  13. Belmeguenai A, Ahmida Z, Ouchtati S, Djemii R. A novel approach based on stream cipher for selective speech encryption

    Google Scholar 

  14. Tamimi AA, Abdalla AM (2014) An audio shuffle-encryption algorithm. In: The world congress on engineering and computer science

    Google Scholar 

  15. Moreno-Alvarado R, Rivera-Jaramillo E, Nakano M, Perez-Meana H (2020) Simultaneous audio encryption and compression using compressive sensing techniques. Electronics 9(5):863

    Article  Google Scholar 

  16. Etem T, Kaya T (2020) Self-generated encryption model of acoustics. Appl Acoust 170:107481

    Article  Google Scholar 

  17. Kaur H, Sekhon GS (2012) A four level speech signal encryption algorithm. Int J Comput Sci Commun 3(2):151–153

    Google Scholar 

  18. Belazi A, Khan M, Abd El-Latif AA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn 87(1):337–361

    Google Scholar 

  19. Farsana FJ, Gopakumar K (2016) A novel approach for speech encryption: Zaslavsky map as pseudo random number generator. Procedia Comput Sci 93:816–823

    Article  Google Scholar 

  20. Eaton JW, Bateman D, Hauberg S, Wehbring R (2014) GNU Octave version 6.1.0. Available from https://www.gnu.org/software/octave/download.html

  21. Nagakrishnan R, Revathi A (2020) A robust cryptosystem to enhance the security in speech based person authentication. Multimedia Tools Appl 79(29):20795–20819

    Article  Google Scholar 

  22. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284

    Article  MathSciNet  Google Scholar 

  23. Lin Q-H, Yin F-L, Mie T-M, Liang H-L (2004) A speech encryption algorithm based on blind source separation. In: 2004 International conference on communications, circuits and systems (IEEE Cat. No. 04EX914). IEEE, vol 2, pp 1013–1017

    Google Scholar 

  24. Lin Q-H, Yin F-L, Mei T-M, Liang H (2006) A blind source separation based method for speech encryption. IEEE Trans Circuits Syst I Regul Pap 53(6):1320–1328

    Article  MathSciNet  Google Scholar 

  25. Yilmaz O, Rickard S (2004) Blind separation of speech mixtures via time-frequency masking. IEEE Trans Signal Process 52(7):1830–1847

    Article  MathSciNet  Google Scholar 

  26. Lima JB, da Silva Neto Eronides F (2016) Audio encryption based on the cosine number transform. Multimedia Tools Appl 75(14):8403–8418

    Google Scholar 

  27. Davis GM (ed) (2018) Noise reduction in speech applications. CRC

    Google Scholar 

  28. Thirupalu U, Kesavulu Reddy E (2019) A new cryptosystem for ciphers using transposition techniques. Int J Eng Res Technol (IJERT) 8(4):402–406

    Google Scholar 

  29. Farsana FJ, Gopakumar K (2020) Speech encryption algorithm based on nonorthogonal quantum state with hyperchaotic keystreams. Adv Math Phys 2020:12. Article ID 8050934

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Himadri Mandal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Srivastava, T.K., Ghosh, A., Mandal, H., Phadikar, A., Adhikary, P. (2022). Controlled Chaos Position Transformation and Noise Generation-Based Keyless Speech Encryption Technique. In: Mandal, L., Tavares, J.M.R.S., Balas, V.E. (eds) Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1657-1_29

Download citation

Publish with us

Policies and ethics