Skip to main content
Log in

A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The concept of encryption is as old as the reality that confidential information has been interchanging among people. The art of transferring secret information between two parties or groups is known as cryptography. It contains the algorithms, key exchange protocols, and approaches to consistently and securely avoid unauthorized access to confidential information. Nowadays information is in digital form, therefore this factor necessitates some cryptographic algorithms for secure data transmission. In this work, we have designed a new approach for audio encryption to securely store and transfer audio signals. The suggested encryption algorithm is primarily based on Gensio-Tesi chaotic map. Substitution and permutation networks are engendered by the Gensio-Tesi chaotic system for the encryption of signals. The other important feature discussed here is the performance of offered algorithm which is ascertained by some extensive audio analysis. Experimental results reveal that the designed scheme has an essential level of security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

The authors confirm that the data supporting the findings of this study are available within the article and its supplementary material. Raw data that support the finds of this study are available from the corresponding author, upon reasonable request.

References

  1. Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894–69907. https://doi.org/10.1109/ACCESS.2020.2987197

  2. Advanced Encryption Standard (AES) (n.d.) (PDF), Federal Information Processing Standards, 26 November 2001, https://doi.org/10.6028/NIST.FIPS.197.197

  3. Al-hazaimeh OM, Abu-Ein AA, Nahar KM, Al-Qasrawi IS (2022) Chaotic elliptic map for speech encryption. Indonesian J Elec Eng Comp Sci 25(2):1103–1114

  4. Arunkumar S, Mukesh K (2022) "Enhanced Audio Encryption using 2-D Zaslavsky Chaotic Map," 2022 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–4, https://doi.org/10.1109/ICCCI54379.2022.9740761

  5. Basu S (2011) International data encryption algorithm (IDEA) - a typical illustration. J Global Res Comp Sci 2011:116–118.1

    Google Scholar 

  6. Farsana FJ, Devi VR, Gopakumar K (2020) An audio encryption scheme based on fast Walsh Hadamard transform and mixed chaotic keystreams. Appl Comput Inform

  7. Genesio R, Tesi A (1992) A harmonic balance method for the analysis of chaotic dynamics in nonlinear systems. Automatica 28:531–548

    Article  MATH  Google Scholar 

  8. Hassan NF, Aladhami A, Mahdi MS (2022) Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps. Iraqi J Sci 63(2):830–842. https://doi.org/10.24996/ijs.2022.63.2.36

    Article  Google Scholar 

  9. Hato E, Shihab D (2015) Lorenz and Rossler chaotic system for speech signal encryption. Int J Comput Appl 128:09758887

    Google Scholar 

  10. Kordov K (2019) A novel audio encryption algorithm with permutation-substitution architecture. Electronics 8:530. https://doi.org/10.3390/electronics8050530

    Article  Google Scholar 

  11. Lima JB, da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75(14):8403–8418

    Article  Google Scholar 

  12. Lin C-H, Hu G-H, Chen J-S, Yan J-J, Tang K-H (2022) Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys. Multimed Syst 28(5):1793–1808

  13. Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik 127:7431–7438

    Article  Google Scholar 

  14. Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13:2137–2150

    Article  Google Scholar 

  15. Sarker IH, Abushark YB, Alsolami FJ, Khan AI (2020) IntruDTree: a machine learning based cyber security intrusion detection model. Symmetry 12:754

    Article  Google Scholar 

  16. Sarker IH, Khan AI, Abushark YB, Alsolami F (2022) Internet of things (IoT) security intelligence: a comprehensive overview, Machine Learning Solutions and Research Directions. Mobile Netw Appl. https://doi.org/10.1007/s11036-022-01937-3

  17. Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio Speech Music Process 2017:20

    Article  Google Scholar 

  18. Sathiyamurthi P, Ramakrishnan S (2022) Speech encryption using hybrid-hyper chaotic system and binary masking technique. Multimed Tools Appl 81:6331–6349. https://doi.org/10.1007/s11042-021-11757-4

    Article  Google Scholar 

  19. Schneier B (1993) Description of a new variable-length key, 64-bit block cipher (blowfish). Fast software encryption, in: Cambridge Security Workshop Proceedings

  20. Shah D, Shah T, Jamal SS (2020) Digital audio signals encryption by Mobius transformation and Hénon map. Multimed Syst 26:235–245

    Article  Google Scholar 

  21. Shah D, Shah T, Ahamad I, Haider MI, Khalid I (2021) A three-dimensional chaotic map and their applications to digital audio security. Multimed Tools Appl 80:22251–22273

    Article  Google Scholar 

  22. Tamimi AA; Abdalla AM (22–24 October 2014) An Audio Shuffle-Encryption Algorithm. In: Proceedings of the World Congress on Engineering and Computer Science, San Francisco, CA, USA, Volume 1

  23. Walter T (1997) A brief history of the data encryption standard. In: Internet besieged: countering cyberspace scofflaws. ACM Press/Addison-Wesley Publishing Co, New York, pp 275–280

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Ethics declarations

Conflict of interest

The authors have not any conflict of interest regarding the publication of this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alanazi, A.S., Munir, N., Khan, M. et al. A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system. Multimed Tools Appl 82, 26577–26593 (2023). https://doi.org/10.1007/s11042-023-14964-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14964-3

Keywords

Navigation