Skip to main content
Log in

A novel method in audio message encryption based on a mixture of chaos function

  • Published:
International Journal of Speech Technology Aims and scope Submit manuscript

Abstract

Rapid growth of digital data and their security concerns increases the significance of enhancing advanced encryption techniques. Encryption is the backbone of secure communication in networks and the physical process of scrambling and permuting data in order to make them impossible to understand for unauthorized users. This paper proposes a novel audio signal encryption method, based on a mixture of three chaos functions. Due to the reversibility of the chaos functions, the decryption process is the inverse of the encryption process. This method was applied to audio signals with various sizes and the encoded messages were compared to the original ones. Simulation results and theoretical analyses show that the proposed approach offers a significant gain in terms of robustness and computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Aathithan, N. R., & Venkatesulu, M. A. (2013). Complete binary tree structure block cipher for real-time multimedia. London: Science and Information Conference.

    Google Scholar 

  • Diaa, S., Hatem, A. K., & Mohiy, H. (2010). Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security, 10(3), 213–219.

    Google Scholar 

  • Eldin, S. M. S., Khamis, S. A., Hassanin, A. A. I. M., & Alsharqawy, M. A. (2014). New audio encryption package for TV cloud computing. International Journal of Speech Technology, 18, 131–142.

    Article  Google Scholar 

  • Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos Solitons Fractals, 29(2), 393–399.

    Article  MATH  Google Scholar 

  • Gnanajeyaraman, R., & Prasadh, K. (2009). Audio encryption using higher dimensional chaotic map. International Journal of Recent Trends in Engineering, 1, 103–107.

    Google Scholar 

  • Han, F. Y., & Zhu, C. X. (2011). An novel chaotic image encryption algorithm based on tangent-delay ellipse reflecting cavity map system. Procedia Engineering, 23, 186–191.

    Article  Google Scholar 

  • Hussain, I., Shah, T., & Gondal, M. A. (2012). Image encryption algorithm based on PGL(2,GF(2 8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dynamics, 70, 181–187.

    Article  MathSciNet  Google Scholar 

  • Kwon, G. R., Wang, C., Lian, S., & Hwang, S. S. (2012) Advanced partial encryption using watermarking and scrambling in MP3. Multimedia Tools and Applications, 59(3), 885–895.

    Article  Google Scholar 

  • Lima, J. B., & Da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75, 8403–8418.

    Article  Google Scholar 

  • Liu, H., Kadir, A., & Li, Y. (2016). Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik, 127, 7431–7438.

    Article  Google Scholar 

  • May, R. M. (1975). Biological populations obeying difference equations: Stable points, stable cycles, and chaos. Journal of Theoretical Biology, 51, 511–524.

    Article  Google Scholar 

  • May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261, 459–467.

    Article  MATH  Google Scholar 

  • Minaam, D. S. A., Abdual-Kader, H. M., & Hadhoud, M. M. (2010). Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. International Journal of Network Security, 11, 78–87.

    Google Scholar 

  • Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617–624.

    Article  Google Scholar 

  • Pavithra, S., & Ramadevi, E. (2012). Throughput Analysis of Symmetric Algorithms. International Journal of Advanced Networking and Applications, 4(2), 1574–1577.

    Google Scholar 

  • Peng, X., Cui, Z., Cai, L., & Yu, L. (2003). Digital audio signal encryption with a virtual optics scheme. Optik, 114, 69–75.

    Article  Google Scholar 

  • Raghu, R., Radha, K. D., Sudeepa, K. B., & Ganesh, A. (2013). Efficient audio encryption algorithm for online applications using transposition and multiplicative non-binary system. International Journal of Engineering Research & Technology, 2(6), 472–477.

    Google Scholar 

  • Verma, O. P., Agarwal, R., Dafouti, D., & Tyagi, S. (2011). Peformance analysis of data encryption algorithms in ICECT 2011–2011 3rd International Conference on Electronics Computer Technology 5, pp. 399–403.

  • Wang, H., et al. (2010). Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Transactions on Multimedia, 12, 215–223.

    Article  Google Scholar 

  • Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11, 514–522.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ardalan Ghasemzadeh or Elham Esmaeili.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ghasemzadeh, A., Esmaeili, E. A novel method in audio message encryption based on a mixture of chaos function. Int J Speech Technol 20, 829–837 (2017). https://doi.org/10.1007/s10772-017-9452-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10772-017-9452-y

Keywords

Navigation