Skip to main content
Log in

New secure and efficient substitution and permutation method for audio encryption algorithm

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

A new substitution and permutation method for the encryption/decryption of two-channel audio files based on chaotic maps is presented. The proposed scheme's structure depends on encoding the original audio data into a new data range. Each value in the resulted range was translated to a binary sequence and both substitution and permutation operations are accomplished using the chaotic state and chaotic parameters. The substitution was attained using the XORing operation and Bernoulli substitution while the permutation method was based on the numbers sequence generated using a hyper chaotic system. A new key generation algorithm is proposed based on the properties of the square root of large prime numbers and a hyper chaotic system to produce the keys. The proposed cipher system was tested by various audio file sizes of (.WAV) extension. Performance evaluation and security measures to assess the algorithm’s security against various attacks. The results of the key space analysis, statistical analysis, mean square error analyses, Peak signal to noise ratio (PSNR) analyses, entropy analyses, homogeneity, contrast, SNR, etc. showed that the proposed cipher is notably secured in opposition to the attackers and possesses an effective diffusion and confusion mechanism for better audio communication with inside the area of telecommunication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Availability of data and materials

Not applicable.

References

  1. Aziz H, Gilani SMM, Hussain I, Janjua AK, Khurram S (2021) A noise-tolerant audio encryption framework designed by the application of S8Symmetric group and chaotic systems. Math Probl Eng. https://doi.org/10.1155/2021/5554707

    Article  Google Scholar 

  2. Naik RB, Singh U (2022) A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann Data Sci. https://doi.org/10.1007/s40745-021-00364-7

    Article  Google Scholar 

  3. Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. J Comput Networks Commun. https://doi.org/10.1155/2017/2721910

    Article  Google Scholar 

  4. Albahrani EA (2017) A new audio encryption algorithm based on chaotic block cipher. In: 2017 Annu. Conf. New Trends Inf. Commun. Technol. Appl. NTICT 2017, no. March, pp 22–27.https://doi.org/10.1109/NTICT.2017.7976129.

  5. Babu NR, Kalpana M, Balasubramaniam P (2021) A novel audio encryption approach via finite-time synchronization of fractional order hyperchaotic system. Multimed Tools Appl 80(12):18043–18067. https://doi.org/10.1007/s11042-020-10288-8

    Article  Google Scholar 

  6. Adhikari S, Karforma S (2021) A novel audio encryption method using Henon-Tent chaotic pseudo random number sequence. Int J Inf Technol 13(4):1463–1471. https://doi.org/10.1007/s41870-021-00714-x

    Article  Google Scholar 

  7. Kakaei Kate H, Razmara J, Isazadeh A (2018) A novel fast and secure approach for voice encryption based on DNA computing. 3D Res. 9(2). https://doi.org/10.1007/s13319-018-0167-x.

  8. Lynnyk V, Sakamoto N, Čelikovský S (2015) Pseudo random number generator based on the generalized Lorenz chaotic system. IFAC-PapersOnLine 28(18):257–261. https://doi.org/10.1016/j.ifacol.2015.11.046

    Article  Google Scholar 

  9. Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101–111. https://doi.org/10.1016/j.cnsns.2013.06.017

    Article  MATH  Google Scholar 

  10. Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as prbg for voice encryption in wireless communication. Procedia Comput Sci; 65(Iccmit) 314–323, 2015. https://doi.org/10.1016/j.procs.2015.09.089.

  11. Krishnamoorthi S, Jayapaul P, Dhanaraj RK, Rajasekar V, Balusamy B, Islam SH (2021) Design of pseudo-random number generator from turbulence padded chaotic map. Nonlinear Dyn 104(2):1627–1643. https://doi.org/10.1007/s11071-021-06346-x

    Article  Google Scholar 

  12. Yousif A, Kashmar AH (2019) Key generator to encryption images based on chaotic maps. Iraqi J Sci 60(2):362–370. https://doi.org/10.24996/ijs.2019.60.2.16

    Article  Google Scholar 

  13. Wang L, Cheng H (2019) Logistic chaotic system

  14. Gaeini A, Mirghadri A, Jandaghi G, Keshavarzi B (2016) A new pseudo-random number generator based on chaotic maps and linear feedback shift register. J Comput Theor Nanosci 13(1):836–845. https://doi.org/10.1166/jctn.2016.4883

    Article  Google Scholar 

  15. Al-Mhadawi MM, Albahrani AA (2019) Hybrid method as pseudo-random bits generator, 1st Int. Sci Conf Comput Appl Sci CAS 2019:250–255. https://doi.org/10.1109/CAS47993.2019.9075715

    Article  Google Scholar 

  16. Ghayad NH, Albahrani EA (2019) A combination of two-dimensional hénon map and two-dimensional rational map as key number generator. 1st Int Sci Conf Comput Appl Sci CAS 2019(2):107–112. https://doi.org/10.1109/CAS47993.2019.9075731

    Article  Google Scholar 

  17. Naskar PK, Bhattacharyya S, Chaudhuri A (2021) An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn 103(2):2019–2042. https://doi.org/10.1007/s11071-020-06164-7

    Article  MATH  Google Scholar 

  18. Ding L, Ding Q (2020) The establishment and dynamic properties of a new 4d hyperchaotic system with its application and statistical tests in gray images. Entropy. https://doi.org/10.3390/e22030310.

  19. Sheela S, Sathyanarayana SV (2016) Application of chaos theory in data security-a survey. Accent Trans Inf Secur 2(5) 1–15, 2016. https://doi.org/10.19101/tis.2017.25001.

  20. Awad A, Saadane A (2010) New chaotic permutation methods for image encryption. IAENG Int J Comput Sci 37(4):34–39

    Google Scholar 

  21. Albhrany E, Alshekly T (2017) A new key stream generator based on 3D Henon map and 3D Cat map 8(February), pp 2114–2120

  22. Al-Zubaidy RN, Al-Bahrani E (2019) New key generation algorithm based on dynamical chaotic substitution box. NTCCIT 2018 - Al Mansour Int Conf New Trends Comput Commun Inf Technol. https://doi.org/10.1109/NTCCIT.2018.8681187.

  23. Kubba ZMJ, Hoomod HK (2019) A hybrid modified lightweight algorithm combined of two cryptography algorithms PRESENT and Salsa20 using chaotic system. 1st Int Sci Conf Comput Appl Sci CAS 2019:199–203. https://doi.org/10.1109/CAS47993.2019.9075488

    Article  Google Scholar 

  24. Albahrani EA, Alshekly TK (2017) A Text encryption algorithm based on self-synchronizing stream cipher and chaotic maps. 3(5):579–585

  25. Al-Bahrani EA, Kadhum RNJ (2019) A new cipher based on Feistel structure and chaotic maps. Baghdad Sci J 16(1):270–280. https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270

    Article  Google Scholar 

  26. Wang X, Su Y (2020) An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access 8:9260–9270. https://doi.org/10.1109/ACCESS.2019.2963329

    Article  Google Scholar 

  27. Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. Eurasip. J Audio, Speech, Music Process. https://doi.org/10.1186/s13636-017-0118-0

    Article  Google Scholar 

  28. Satam IA, Shahab SN, Kamel HA, Al-Hamadani MNA (2021) Execution of a smart street lighting system for energy saving enhancement. Bull Electr Eng Inf 10(4):1884–1892. https://doi.org/10.11591/EEI.V10I4.2924

    Article  Google Scholar 

  29. Albahrani EA, Alshekly TK, Lafta SH (2022) A review on audio encryption algorithms using chaos maps-based techniques. J Cyber Secur Mobility 11(1):53–82. https://doi.org/10.13052/jcsm2245-1439.1113

    Article  Google Scholar 

  30. Albahrani EA, Maryoosh AA, Lafta SH (2020) Block image encryption based on modified play fair and chaotic system. J Inf Secur Appl. https://doi.org/10.1016/j.jisa.2019.102445.

  31. Chawla R (2015) A review on audio cryptography. 7, pp 14–16

  32. Ngineering EC (2016) Literature survey on recent audio; 7(6): 91–95

  33. Students BE (2018) A survey paper on audio security 1. J Inf Technol Sci 4(3):22–27

    Google Scholar 

  34. Abbas EA, Karam TA, Abbas AK (2019) Image cipher system based on RSA and chaotic maps. Eurasian J Math Comput Appl 7(4):4–17. https://doi.org/10.32523/2306-6172-2019-7-4-4-17

    Article  Google Scholar 

  35. Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894–69907. https://doi.org/10.1109/ACCESS.2020.2987197

    Article  Google Scholar 

  36. Hussain S, Shah T, Javeed A (2022) Modified advanced encryption standard (MAES) based on non-associative inverse property loop. Multimedia Tools Appl

  37. Javeed A, Shah T, Ullah A (2020) A color image privacy scheme established on nonlinear system of coupled differential equations. Multimedia Tools Appl 79(43–44):32487–32501

    Article  Google Scholar 

Download references

Acknowledgments

The authors are grateful and appreciative to their institutes, Mustansiriyah University, Al-Imam Al-A’tham University College, and University of Technology-Iraq, due to institute roles in supporting and providing academic time for performing the research.

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

Not applicable.

Corresponding author

Correspondence to Sadeq H. Lafta.

Ethics declarations

Competing interests

Not applicable.

Ethical approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Albahrani, E.A., Alshekly, T.K. & Lafta, S.H. New secure and efficient substitution and permutation method for audio encryption algorithm. J Supercomput 79, 16616–16646 (2023). https://doi.org/10.1007/s11227-023-05249-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05249-5

Keywords

Navigation