Abstract
Rapid growth of digital data and their security concerns increases the significance of enhancing advanced encryption techniques. Encryption is the backbone of secure communication in networks and the physical process of scrambling and permuting data in order to make them impossible to understand for unauthorized users. This paper proposes a novel audio signal encryption method, based on a mixture of three chaos functions. Due to the reversibility of the chaos functions, the decryption process is the inverse of the encryption process. This method was applied to audio signals with various sizes and the encoded messages were compared to the original ones. Simulation results and theoretical analyses show that the proposed approach offers a significant gain in terms of robustness and computational complexity.
Similar content being viewed by others
References
Aathithan, N. R., & Venkatesulu, M. A. (2013). Complete binary tree structure block cipher for real-time multimedia. London: Science and Information Conference.
Diaa, S., Hatem, A. K., & Mohiy, H. (2010). Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security, 10(3), 213–219.
Eldin, S. M. S., Khamis, S. A., Hassanin, A. A. I. M., & Alsharqawy, M. A. (2014). New audio encryption package for TV cloud computing. International Journal of Speech Technology, 18, 131–142.
Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos Solitons Fractals, 29(2), 393–399.
Gnanajeyaraman, R., & Prasadh, K. (2009). Audio encryption using higher dimensional chaotic map. International Journal of Recent Trends in Engineering, 1, 103–107.
Han, F. Y., & Zhu, C. X. (2011). An novel chaotic image encryption algorithm based on tangent-delay ellipse reflecting cavity map system. Procedia Engineering, 23, 186–191.
Hussain, I., Shah, T., & Gondal, M. A. (2012). Image encryption algorithm based on PGL(2,GF(2 8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dynamics, 70, 181–187.
Kwon, G. R., Wang, C., Lian, S., & Hwang, S. S. (2012) Advanced partial encryption using watermarking and scrambling in MP3. Multimedia Tools and Applications, 59(3), 885–895.
Lima, J. B., & Da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75, 8403–8418.
Liu, H., Kadir, A., & Li, Y. (2016). Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik, 127, 7431–7438.
May, R. M. (1975). Biological populations obeying difference equations: Stable points, stable cycles, and chaos. Journal of Theoretical Biology, 51, 511–524.
May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261, 459–467.
Minaam, D. S. A., Abdual-Kader, H. M., & Hadhoud, M. M. (2010). Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. International Journal of Network Security, 11, 78–87.
Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617–624.
Pavithra, S., & Ramadevi, E. (2012). Throughput Analysis of Symmetric Algorithms. International Journal of Advanced Networking and Applications, 4(2), 1574–1577.
Peng, X., Cui, Z., Cai, L., & Yu, L. (2003). Digital audio signal encryption with a virtual optics scheme. Optik, 114, 69–75.
Raghu, R., Radha, K. D., Sudeepa, K. B., & Ganesh, A. (2013). Efficient audio encryption algorithm for online applications using transposition and multiplicative non-binary system. International Journal of Engineering Research & Technology, 2(6), 472–477.
Verma, O. P., Agarwal, R., Dafouti, D., & Tyagi, S. (2011). Peformance analysis of data encryption algorithms in ICECT 2011–2011 3rd International Conference on Electronics Computer Technology 5, pp. 399–403.
Wang, H., et al. (2010). Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Transactions on Multimedia, 12, 215–223.
Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11, 514–522.
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Ghasemzadeh, A., Esmaeili, E. A novel method in audio message encryption based on a mixture of chaos function. Int J Speech Technol 20, 829–837 (2017). https://doi.org/10.1007/s10772-017-9452-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10772-017-9452-y