Skip to main content
Log in

An audio encryption algorithm based on a non-degenerate 2D integer domain hyper chaotic map over GF(2n)

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To ensure the security transmission of audio signals in instant messaging tools, a chaos-based dual-channel one-time one-key audio encryption scheme was proposed. First, a non-degenerate 2D integer domain hyper chaotic map (2D-IDHCM) over GF(2n) was constructed, the results of dynamics analysis showed that the 2D-IDHCM has ergodicity and large Lyapunov exponents. Then, based on 2D-IDHCM, two keyed strong S-Boxes were constructed. Further, an audio encryption & decryption algorithm was designed using 2D-IDHCM and keyed strong S-Boxes. The novelty includes: (1) 2D-IDHCM has no dynamic degradation, fast iteration speed and no need for data type conversion, which improves the efficiency of the algorithm. (2) The algorithm includes confusion process and diffusion process, which are resistant to most common attacks. Experimental results and security analysis demonstrated that the algorithm is sensitive to the initial condition, reduces the correlation of the original audio, and the total key space can reach 2224. In addition, NPCR and UACI are all close to their ideal values of 99.6094070% and 33.4635070%, and the information entropy is close to the ideal value of 8.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Suryadi MT, Satria Y, Boyke M (2023) Digital audio protection with confusion and diffusion scheme using double-scroll chaotic function. J Hunan Univ Nat Sci 50(5):45–52

  2. Joshi AB, Gaffar A (2023) A technique for securing digital audio files based on rotation and XOR operations. Soft Comput 28:5523–5540

  3. Jana S, Dutta N, Maji A K et al (2022) A novel time-stamp-based audio encryption scheme using sudoku puzzle[C]//Proceedings of International Conference on Frontiers in Computing and Systems: COMSYS 2021. Springer Nature Singapore, Singapore, pp 159–169

  4. Kumar A, Dua M (2023) Audio encryption using two chaotic map based dynamic diffusion and double DNA encoding. Appl Acoust 203:109196

    Article  Google Scholar 

  5. Shah D, Shah T, Ahamad I et al (2021) A three-dimensional chaotic map and their applications to digital audio security. Multimed Tools Appl 80:22251–22273

    Article  Google Scholar 

  6. Fu SM, Cheng XF, Liu J (2023) Dynamics, circuit design, feedback control of a new hyper chaotic system and its application in audio encryption. Sci Rep 13(1):19385

    Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 

  7. Wang X, Liu P (2021) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst I Regul Pap 69(3):1291–1301

    Article  Google Scholar 

  8. Wang M, Liu H, Zhao M (2022) Bit-level image encryption algorithm based on random-time S-Box substitution. Eur Phys J Special Topics 231(16):3225–3237

    Article  ADS  Google Scholar 

  9. Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik 127(19):7431–7438

    Article  ADS  Google Scholar 

  10. Wu R, Gao S, Wang X et al (2022) AEA-NCS: An audio encryption algorithm based on a nested chaotic system. Chaos, Solitons Fractals 165:112770

    Article  Google Scholar 

  11. Rahul B, Kuppusamy K, Senthilrajan A (2023) Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm. Multimedia Tools Appl 82(28):43729–43758

    Article  Google Scholar 

  12. Liu H (2023) Audio block encryption using 3D chaotic system with adaptive parameter perturbation. Multimed Tools Appl 82:27973–27987

    Article  Google Scholar 

  13. Ben Farah MA, Guesmi R, Kachouri A et al (2020) A new design of cryptosystem based on S-Box and chaotic permutation. Multimed Tools Appl 79(27–28):19129–19150

    Article  Google Scholar 

  14. Si Y, Liu H, Zhao M (2023) Constructing keyed strong S-Box with higher nonlinearity based on 2D hyper chaotic map and algebraic operation. Integration 88:269–277

    Article  Google Scholar 

  15. Liu H, Wang X, Zhao M et al (2022) Constructing strong S-Box by 2D chaotic map with application to irreversible parallel key expansion. Int J Bifurcation Chaos 32(11):2250163

    Article  MathSciNet  Google Scholar 

  16. Fan C, Ding Q (2023) A novel algorithm to analyze the dynamics of digital chaotic maps in finite-precision domain. Chin Phys B 32(1):010501

    Article  ADS  Google Scholar 

  17. Luo Y, Liu Y, Liu J et al (2021) Counteracting dynamical degradation of a class of digital chaotic systems via unscented Kalman filter and perturbation. Inf Sci 556:49–66

    Article  MathSciNet  Google Scholar 

  18. Fan C, Ding Q (2021) Analysis and resistance of dynamic degradation of digital chaos via functional graphs. Nonlinear Dyn 103(1):1081–1097

    Article  Google Scholar 

  19. Wang Q, Yu S, Guyeux C, Bahi JM, Fang X (2014) Theoretical design and circuit implementation of integer domain chaotic systems. Int J Bifurcation Chaos 24(10):1450128

    Article  MathSciNet  Google Scholar 

  20. Bashier E, Jabeur TB (2021) An efficient secure image encryption algorithm based on total shuffling, integer chaotic maps and median filter. J Internet Serv Inform Secur 11(2):46–77

    Google Scholar 

  21. Si Y, Liu H, Chen Y (2021) Constructing keyed strong S-Box using an enhanced quadratic map. Int J Bifurcation Chaos 31(10):2150146

    Article  MathSciNet  Google Scholar 

  22. Cao Y, Liu H, Xu D (2023) Constructing a nondegenerate 2D integer-domain hyperchaotic map over GF(2n) with application in parallel hashing. Int J Bifurcation Chaos 33(15):2350181

    Article  Google Scholar 

  23. Zhao M, Liu H (2022) Construction of a nondegenerate 2D chaotic map with application to irreversible parallel key expansion algorithm. Int J Bifurcation Chaos 32(6):2250081

    Article  MathSciNet  Google Scholar 

  24. Cao W, Mao Y, Zhou Y (2020) Designing a 2D infinite collapse map for image encryption. Signal Process 171:107457

    Article  Google Scholar 

  25. Si Y, Liu H, Chen Y (2022) Constructing a 3D exponential hyper chaotic map with application to PRNG. Int J Bifurcation Chaos 32(7):2250095

    Article  Google Scholar 

  26. Demirtaş M (2023) A lossless audio encryption method based on Chebyshev map. Orclever Proc Res Dev 2(1):28–38

    Article  Google Scholar 

  27. Albahrani EA, Alshekly TK, Lafta SH (2023) New secure and efficient substitution and permutation method for audio encryption algorithm. J Supercomput 79(15):16616–16646

    Article  Google Scholar 

  28. Adhikari S, Karforma S (2021) A novel audio encryption method using Henon-Tent chaotic pseudo random number sequence. Int J Inf Technol 13(4):1463–1471

    Google Scholar 

  29. Shah D, Shah T, Jamal SS (2020) Digital audio signals encryption by Mobius transformation and Hénon map. Multimedia Syst 26:235–245

    Article  Google Scholar 

  30. Aziz H, Gilani SMM, Hussain I et al (2021) A noise-tolerant audio encryption framework designed by the application of S8 symmetric group and chaotic systems. Math Probl Eng 2021:5554707

  31. Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl 82(16):23899–23914

    Article  Google Scholar 

  32. Naskar PK, Bhattacharyya S, Chaudhuri A (2021) An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn 103:2019–2042

    Article  Google Scholar 

  33. Alanazi AS, Munir N, Khan M et al (2023) A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system. Multimed Tools Appl 82(17):26577–26593

    Article  Google Scholar 

  34. Wang M, Liu H, Zhao M (2023) Construction of a non-degeneracy 3D chaotic map and application to image encryption with keyed S-Box. Multimed Tools Appl 82:34541–34563

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the Natural Science Foundation of Shandong Province (No. ZR2022MF232), and the Teaching and Research Program of University of Jinan (No. J2203).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongjun Liu.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cao, Y., Liu, H. An audio encryption algorithm based on a non-degenerate 2D integer domain hyper chaotic map over GF(2n). Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18746-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18746-3

Keywords

Navigation