Abstract
This paper presents a very simple and efficient encryption scheme based on controlled chaotic maps and ADPCM (Adaptive Differential Pulse Code Modulation) coding, in order to secure the real-time voice communication for operating at 16, 24, 32 or 40 kbps. This encryption algorithm adopts three main operations one to generate chaotic values using two chaotic logistic maps starting from independent initial conditions, the second to transform them into binary words using random encoding tables and the third to execute some basic operations and substitutions. It has important properties of randomness that can pass NIST batteries of tests. The evaluation and simulation analysis indicate that our proposal possesses an excellent statistical and cryptographic properties; it provides low correlation between adjacent samples in encryption speech, extremely sensitive encryption keys and has a large key space which is sufficient to protect against brute-force attack. As an illustrative example, an application on a commonly-encoder type used in communications, standard ITU-T G.726, is presented.
Similar content being viewed by others
References
Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101–111
Alanazi HO, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani Y (2010) DES, new comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):152–157
Alligood KT, Sauer TD, Yorke JA (1996) Chaos : an introduction to dynamical systems. Springer, New York
Anees A, Siddiqui AM, Ahmed F (2014) Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul 19:3106–3118
Audio File and Compression Formats, for use with oracle multimedia. https://docs.oracle.com/database/121/AIVUG/ap_audfmts.htm
Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50–54
Barenghi A, Bertoni GM, Breveglieri L, Pelosi G (2013) A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. J Syst Softw 86:1864–1878
Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35:408–419
Boriga R, Dăscălescu AC, Diaconu A (2014) A new one-dimensional chaotic map and its use in a novel real-time image encryption scheme. Hindawi Publishing Corporation, Advances in Multimedia 2014:15
CCITT Recommendation G.726 for 40, 32, 24, 16 kbit/s, Adaptive Differential Pulse Code Modulation (ADPCM), December 1990. http://www.itu.int/rec/T-REC-G.726/
CCITT Recommendation G.726 for 5, 4, 3 and 2-bit/sample, Embedded Adaptive Differential Pulse Code Modulation (ADPCM), 1990. http://www.itu.int/rec/T-REC-G.727
Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749–761
Cheng CJ, Cheng CB (2013) An asymmetric image cryptosystem based on the adaptive synchronization of an uncertain unified chaotic system and a cellular neural network. Commun Nonlinear Sci Numer Simul 18:2825–2837
Francois M, Grosges T, Barchiesi D, Erra R (2013) A new pseudo-random number generator based on two chaotic maps. Informatica 24(2):181–197
Hamdi M, Hermassi H, Rhouma R, Belghith S (2014) A new secure and efficient scheme of ADPCM encoder based on chaotic encryption. IEEE Int Conf Adv Technol Signal Image Process 1:7–11
Hamdi M, Rhouma R, Belghith S (2015) A very efficient pseudo-random number generator based on chaotic maps and s-box tables. Int J Comput Electr Autom Control Inf Eng 9(2):481–485
Hermassi H, Hamdi M, Rhouma R, Belghith S (2015) A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map. Multimedia Tools Appl 74:1–24
Huang D (2000) Lossless compression for μ-law (A-law) and IMA ADPCM on the basis of a fast RLS algorithm. IEEE Int Conf Multimed Expo (ICME) 3:1775–1778
ITU-T Test Signals for Telecommunication Systems. https://www.itu.int/net/itu-t/sigdb/speaudio/
Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I Fundam Theory Appl 48(2):163–169
Ji X, Bai S, Guo Y, Guo H (2015) A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding. Commun Nonlinear Sci Numer Simul 22:321–333
Jolfaei A, Mirghadri A (2011) Image encryption using chaos and block cipher. Comput Inf Sci 4(1):172–185
Kazmi S, Ikram N (2013) Chaos based key expansion function for block ciphers. Multimed Tools Appl 66:267–281
Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32:1518–1529
Lasota A, Mackey MC (1994) Chaos, fractals, and noise: stochastic aspects of dynamics. Springer, New York
Ling C, Wu X (2008) A back-iteration method for reconstructing chaotic sequences in finite-precision machines. Circ Syst Signal Process 27(6):883–891
Mao Y, Chen G, Lian S (2014) A novel fast image encryption scheme based on 3d chaotic baker maps. World Sci Int J Bifurcation Chaos 14(10):3613–3624
Masmoudi A, Puech W, Bouhlel MS (2010) An efficient PRBG based on chaotic map and engel continued fractions. J Softw Eng Appl (Sci Res) 3(12):1141–1147
Özkaynak F, Yavuz S (2013) Security problems for a pseudorandom sequence generator based on the Chen chaotic system. Comput Phys Commun 184(9):2178–2181
Piret G, Quisquater JJ (2003) A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. Cryptographic Hardware and Embedded Systems – (CHES). In: Computer Science. Springer, Berlin, pp 77–88
Purwar RK, Priyanka (2013) An improved image encryption scheme using chaotic logistic maps. Int J Latest Trends Eng Technol (IJLTET) 2(3)
Shannon CE (1949) Communication theory of secrecy system. Bell Syst Tech J 28:656–715
Shlomo Y (2003) Gini’s mean difference: a superior measure of variability for non-normal distributions. Metron - Int J Stat LXI(2):285–316
Wang X, Qin X (2012) A new pseudo-random number generator based on CML and chaotic iteration. Nonlinear Dyn 70(2):1589–1592
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hamdi, M., Rhouma, R. & Belghith, S. An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps. Multimed Tools Appl 76, 7105–7128 (2017). https://doi.org/10.1007/s11042-016-3377-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3377-3