Multimedia Tools and Applications

, Volume 76, Issue 5, pp 7105–7128 | Cite as

An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps



This paper presents a very simple and efficient encryption scheme based on controlled chaotic maps and ADPCM (Adaptive Differential Pulse Code Modulation) coding, in order to secure the real-time voice communication for operating at 16, 24, 32 or 40 kbps. This encryption algorithm adopts three main operations one to generate chaotic values using two chaotic logistic maps starting from independent initial conditions, the second to transform them into binary words using random encoding tables and the third to execute some basic operations and substitutions. It has important properties of randomness that can pass NIST batteries of tests. The evaluation and simulation analysis indicate that our proposal possesses an excellent statistical and cryptographic properties; it provides low correlation between adjacent samples in encryption speech, extremely sensitive encryption keys and has a large key space which is sufficient to protect against brute-force attack. As an illustrative example, an application on a commonly-encoder type used in communications, standard ITU-T G.726, is presented.


Chaotic system Audio and speech signals Encryption scheme Statistical tests 


  1. 1.
    Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101–111CrossRefMATHGoogle Scholar
  2. 2.
    Alanazi HO, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani Y (2010) DES, new comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):152–157Google Scholar
  3. 3.
    Alligood KT, Sauer TD, Yorke JA (1996) Chaos : an introduction to dynamical systems. Springer, New YorkMATHGoogle Scholar
  4. 4.
    Anees A, Siddiqui AM, Ahmed F (2014) Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul 19:3106–3118MathSciNetCrossRefGoogle Scholar
  5. 5.
    Audio File and Compression Formats, for use with oracle multimedia.
  6. 6.
    Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50–54MathSciNetCrossRefMATHGoogle Scholar
  7. 7.
    Barenghi A, Bertoni GM, Breveglieri L, Pelosi G (2013) A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. J Syst Softw 86:1864–1878CrossRefGoogle Scholar
  8. 8.
    Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35:408–419MathSciNetCrossRefMATHGoogle Scholar
  9. 9.
    Boriga R, Dăscălescu AC, Diaconu A (2014) A new one-dimensional chaotic map and its use in a novel real-time image encryption scheme. Hindawi Publishing Corporation, Advances in Multimedia 2014:15Google Scholar
  10. 10.
    CCITT Recommendation G.726 for 40, 32, 24, 16 kbit/s, Adaptive Differential Pulse Code Modulation (ADPCM), December 1990.
  11. 11.
    CCITT Recommendation G.726 for 5, 4, 3 and 2-bit/sample, Embedded Adaptive Differential Pulse Code Modulation (ADPCM), 1990.
  12. 12.
    Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749–761MathSciNetCrossRefMATHGoogle Scholar
  13. 13.
    Cheng CJ, Cheng CB (2013) An asymmetric image cryptosystem based on the adaptive synchronization of an uncertain unified chaotic system and a cellular neural network. Commun Nonlinear Sci Numer Simul 18:2825–2837MathSciNetCrossRefMATHGoogle Scholar
  14. 14.
    Francois M, Grosges T, Barchiesi D, Erra R (2013) A new pseudo-random number generator based on two chaotic maps. Informatica 24(2):181–197MathSciNetGoogle Scholar
  15. 15.
    Hamdi M, Hermassi H, Rhouma R, Belghith S (2014) A new secure and efficient scheme of ADPCM encoder based on chaotic encryption. IEEE Int Conf Adv Technol Signal Image Process 1:7–11Google Scholar
  16. 16.
    Hamdi M, Rhouma R, Belghith S (2015) A very efficient pseudo-random number generator based on chaotic maps and s-box tables. Int J Comput Electr Autom Control Inf Eng 9(2):481–485Google Scholar
  17. 17.
    Hermassi H, Hamdi M, Rhouma R, Belghith S (2015) A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map. Multimedia Tools Appl 74:1–24CrossRefGoogle Scholar
  18. 18.
    Huang D (2000) Lossless compression for μ-law (A-law) and IMA ADPCM on the basis of a fast RLS algorithm. IEEE Int Conf Multimed Expo (ICME) 3:1775–1778CrossRefGoogle Scholar
  19. 19.
    ITU-T Test Signals for Telecommunication Systems.
  20. 20.
    Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I Fundam Theory Appl 48(2):163–169MathSciNetCrossRefMATHGoogle Scholar
  21. 21.
    Ji X, Bai S, Guo Y, Guo H (2015) A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding. Commun Nonlinear Sci Numer Simul 22:321–333CrossRefGoogle Scholar
  22. 22.
    Jolfaei A, Mirghadri A (2011) Image encryption using chaos and block cipher. Comput Inf Sci 4(1):172–185Google Scholar
  23. 23.
    Kazmi S, Ikram N (2013) Chaos based key expansion function for block ciphers. Multimed Tools Appl 66:267–281CrossRefGoogle Scholar
  24. 24.
    Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32:1518–1529MathSciNetCrossRefMATHGoogle Scholar
  25. 25.
    Lasota A, Mackey MC (1994) Chaos, fractals, and noise: stochastic aspects of dynamics. Springer, New YorkCrossRefMATHGoogle Scholar
  26. 26.
    Ling C, Wu X (2008) A back-iteration method for reconstructing chaotic sequences in finite-precision machines. Circ Syst Signal Process 27(6):883–891MathSciNetCrossRefMATHGoogle Scholar
  27. 27.
    Mao Y, Chen G, Lian S (2014) A novel fast image encryption scheme based on 3d chaotic baker maps. World Sci Int J Bifurcation Chaos 14(10):3613–3624MathSciNetCrossRefMATHGoogle Scholar
  28. 28.
    Masmoudi A, Puech W, Bouhlel MS (2010) An efficient PRBG based on chaotic map and engel continued fractions. J Softw Eng Appl (Sci Res) 3(12):1141–1147CrossRefGoogle Scholar
  29. 29.
    Özkaynak F, Yavuz S (2013) Security problems for a pseudorandom sequence generator based on the Chen chaotic system. Comput Phys Commun 184(9):2178–2181CrossRefMATHGoogle Scholar
  30. 30.
    Piret G, Quisquater JJ (2003) A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. Cryptographic Hardware and Embedded Systems – (CHES). In: Computer Science. Springer, Berlin, pp 77–88Google Scholar
  31. 31.
    Purwar RK, Priyanka (2013) An improved image encryption scheme using chaotic logistic maps. Int J Latest Trends Eng Technol (IJLTET) 2(3)Google Scholar
  32. 32.
    Shannon CE (1949) Communication theory of secrecy system. Bell Syst Tech J 28:656–715MathSciNetCrossRefMATHGoogle Scholar
  33. 33.
    Shlomo Y (2003) Gini’s mean difference: a superior measure of variability for non-normal distributions. Metron - Int J Stat LXI(2):285–316MathSciNetGoogle Scholar
  34. 34.
    Wang X, Qin X (2012) A new pseudo-random number generator based on CML and chaotic iteration. Nonlinear Dyn 70(2):1589–1592MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Ecole Nationale d’Ingénieurs de TunisBelvedereTunisia

Personalised recommendations