Advertisement

Neural Processing Letters

, Volume 50, Issue 3, pp 2925–2944 | Cite as

Double-Key Secure for N-1-N Sound Record Data (SRD) by the Drive-Response of BAM NNs

  • M. Kalpana
  • K. RatnaveluEmail author
  • P. Balasubramaniam
  • W. A. M. Othman
Article
  • 40 Downloads

Abstract

In this work, the problem of N sound record data (audio) encryption based on double-key secure is proposed. The first key is the math tricks to cumulate N audio files in a single file. The second key is the values of the parameters \(A,\ B,\ D,\ \tilde{A},\ \tilde{B},\ \tilde{D},\) of the constructed drive-response bidirectional associative memory neural networks to be found by suitable Lyapunov–Krasovskii functional and satisfying the linear matrix inequality to obtain the dynamical signal (irregular), which are used to encrypt an audio file. Further, the key sensitivity of \(1e-10\) of the proposed method are large adequate key space to make hacker’s attack infeasible. Numerical simulations, cryptanalysis of the proposed scheme are provided to show the best performance.

Keywords

Bidirectional associative memory Dynamical signal Neural networks Secure Sound record data 

Mathematics Subject Classification

92B20 37B55 34D06 68P25 

Notes

Acknowledgements

This effort was assisted by the University of Malaya, Frontier Research Grant 2017, Grant No. FG037-17AFR. Dr. M. Kalpana is working as a Post-Doctoral Research Fellow at University of Malaya.

References

  1. 1.
    Yang YG, Tian J, Sun SJ, Xu P (2015) Quantum-assisted encryption for digital audio signals. Opt Int J Light Electron Opt 126:3221–3226CrossRefGoogle Scholar
  2. 2.
    Chang D, Li Z, Wang M, Zeng Y (2018) A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication. AEU Int J Electron Commun 88:20–29CrossRefGoogle Scholar
  3. 3.
    Yan F, Iliyasu AM, Guo Y, Yang H (2018) Flexible representation and manipulation of audio signals on quantum computers. Theor Comput Sci 752:71–85MathSciNetCrossRefGoogle Scholar
  4. 4.
    Shahadi HI (2018) Covert communication model for speech signals based on an indirect and adaptive encryption technique. Comput Electr Eng 68:425–436CrossRefGoogle Scholar
  5. 5.
    Pu Z, Rao R (2018) Exponential stability criterion of high-order BAM neural networks with delays and impulse via fixed point approach. Neurocomputing 292:63–71CrossRefGoogle Scholar
  6. 6.
    Balasubramaniam P, Kalpana M, Rakkiyappan R (2011) Existence and global asymptotic stability of fuzzy cellular neural networks with time delay in the leakage term and unbounded distributed delays. Circuits Syst Signal Process 30:1595–1616MathSciNetCrossRefGoogle Scholar
  7. 7.
    Huang C, Cao J (2018) Impact of leakage delay on bifurcation in high-order fractional BAM neural networks. Neural Netw 98:223–235CrossRefGoogle Scholar
  8. 8.
    Huang C, Meng Y, Cao J, Alsaedi A, Alsaadi FE (2017) New bifurcation results for fractional BAM neural network with leakage delay. Chaos Solitons Fractals 100:31–44MathSciNetCrossRefGoogle Scholar
  9. 9.
    Aouiti C, Gharbia IB, Cao J, M’hamdi MS, Alsaedi A (2018) Existence and global exponential stability of pseudo almost periodic solution for neutral delay BAM neural networks with time-varying delay in leakage terms. Chaos Solitons Fractals 107:111–127MathSciNetCrossRefGoogle Scholar
  10. 10.
    Chen C, Li L, Peng H, Yang Y (2018) Adaptive synchronization of memristor-based BAM neural networks with mixed delays. Appl Math Comput 322:100–110MathSciNetzbMATHGoogle Scholar
  11. 11.
    Kalpana M, Balasubramaniam P, Ratnavelu K (2015) Direct delay decomposition approach to synchronization of chaotic fuzzy cellular neural networks with discrete, unbounded distributed delays and Markovian jumping parameters. Appl Math Comput 254:291–304MathSciNetzbMATHGoogle Scholar
  12. 12.
    Mansi, Chawla R (2015) A review on audio cryptography. Int J Mod Commun Technol Res 3:14–16 Google Scholar
  13. 13.
    Kalpana M, Ratnavelu K, Balasubramaniam P, Kamali MZM (2018) Synchronization of chaotic-type delayed neural networks and its application. Nonlinear Dyn 93:543–555CrossRefGoogle Scholar
  14. 14.
    Ratnavelu K, Kalpana M, Balasubramaniam P, Wong K, Raveendran P (2017) Image encryption method based on chaotic fuzzy cellular neural networks. Signal Process 140:87–96CrossRefGoogle Scholar
  15. 15.
    Kosko B (1988) Bidirectional associative memories. IEEE Trans Syst Man Cybern 18:49–60MathSciNetCrossRefGoogle Scholar
  16. 16.
    Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105CrossRefGoogle Scholar
  17. 17.
    Li H, Qin Z, Zhang X, Wang X (2011) Auditory cryptography security algorithm with audio shelters. Proc Eng 15:2695–2699CrossRefGoogle Scholar
  18. 18.
    Muthukumar P, Balasubramaniam P, Ratnavelu K (2018) Sliding mode control for generalized robust synchronization of mismatched fractional order dynamical systems and its application to secure transmission of voice messages. ISA Trans 82:51–61CrossRefGoogle Scholar
  19. 19.
    Silva-García VM, Flores-Carapia R, Rentería-Márquez C, Luna-Benoso B, Aldape-Pérez M (2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123–135MathSciNetzbMATHGoogle Scholar
  20. 20.
    Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as PRBG for voice encryption in wireless communication. Proc Comput Sci 65:314–323CrossRefGoogle Scholar
  21. 21.
    Shatheesh Sam I, Devaraj P, Bhuvaneswaran Raghuvel S (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56:315–330CrossRefGoogle Scholar
  22. 22.
    Wang W, Yuan M, Luo X, Liu L, Zhang Y (2018) Anti-synchronization control of BAM memristive neural networks with multiple proportional delays and stochastic perturbations. Mod Phys Lett B 32:1850028MathSciNetCrossRefGoogle Scholar
  23. 23.
    Wang W, Yu X, Luo X, Li L (2018) Stability analysis of memristive multidirectional associative memory neural networks and applications in information storage. Mod Phys Lett B 32:1850207MathSciNetCrossRefGoogle Scholar
  24. 24.
    Yuan M, Wang W, Luo X, Liu L, Zhao W (2018) Finite-time anti-synchronization of memristive stochastic BAM neural networks with probabilistic time-varying delays. Chaos Solitons Fractals 113:244–260MathSciNetCrossRefGoogle Scholar
  25. 25.
    Wang W, Yu X, Luo X, Kurths J (2018) Synchronization control of memristive multidirectional associative memory neural networks and applications in network security communication. IEEE Access 6:36002–36018CrossRefGoogle Scholar
  26. 26.
    Wang W, Yu X, Luo X, Kurths J (2018) Finite-time synchronization of chaotic memristive multidirectional associative memory neural networks and applications in image encryption. IEEE Access 6:35764–35779CrossRefGoogle Scholar
  27. 27.
    Yuan M, Luo X, Wang W, Li L, Peng H (2019) Pinning synchronization of coupled memristive recurrent neural networks with mixed time-varying delays and perturbations. Neural Process Lett 49:239–262CrossRefGoogle Scholar
  28. 28.
    Wang W, Yu M, Luo X, Liu L, Yuan M, Zhao W (2017) Synchronization of memristive BAM neural networks with leakage delay and additive time-varying delay components via sampled-data control. Chaos Solitons Fractals 104:84–97MathSciNetCrossRefGoogle Scholar
  29. 29.
    Yang R, Gao H, Shi P (2009) Novel robust stability criteria for stochastic Hopfield neural networks with time delays. IEEE Trans Syst Man Cybern Part B (Cybern) 39:467–474CrossRefGoogle Scholar
  30. 30.
    Kalpana M, Ratnavelu K, Balasubramaniam P (2019) An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimed Tools Appl 78:5969–5988CrossRefGoogle Scholar
  31. 31.
    Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Opt Int J Light Electron Opt 127:7431–7438CrossRefGoogle Scholar
  32. 32.
    Nadir J, Ein AA, Alqadi Z (2016) A technique to encrypt–decrypt stereo wave file. Int J Comput Inf Technol 05:465–470Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • M. Kalpana
    • 1
  • K. Ratnavelu
    • 1
    • 2
    Email author
  • P. Balasubramaniam
    • 3
  • W. A. M. Othman
    • 1
  1. 1.Institute of Mathematical Sciences, Faculty of ScienceUniversity of MalayaKuala LumpurMalaysia
  2. 2.Institute for Mathematical ResearchUniversiti Putra MalaysiaSerdangMalaysia
  3. 3.Department of MathematicsThe Gandhigram Rural Institute (Deemed to be University)GandhigramIndia

Personalised recommendations