Abstract
Security of digital audio files is the need of the hour. In this context, researchers have proposed several techniques for the secure communication of audio files. But unfortunately, these are vulnerable to differential attack. So, we propose a WORD-oriented technique for securing digital audio files based on rotation and XOR operations. The key concepts of the designed encryption algorithm are the RX (Rotation-XOR) operations, i.e., the plain audio samples are first left-rotated by the sum-of-digits of the previous audio samples, and then XOR-ed with the previous audio samples. The designed encryption algorithm encodes a digital audio file into a random (noise-like) audio file. Several encryption and decryption evaluation metrics, such as Adjacent Sample Correlation Coefficient (ASCC), Crest Factor (CF), Number of sample Change Rate (NSCR), Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), etc., are applied on several digital audio files of varying sizes, to empirically assess the performance and efficiency of the proposed technique. The results of these metrics show that the cipher audio files have a very high key sensitivity, ideal ASCC, ideal CF, 100% NSCR score, zero MSE, and infinite PSNR. Moreover, the technique strongly resists the brute-force attack, differential attack, and other statistical attacks.
Similar content being viewed by others
Data availability
Enquiries about data availability should be directed to the authors.
Notes
Available in, C:\Program Files\Polyspace\R2021a\toolbox\images\ imdata.
References
Abdallah HA, Meshoul S (2023) A multi-layered audio signal encryption approach for secure voice communication. Electronics 12(1):2. https://doi.org/10.3390/electronics12010002
Abdelfatah RI (2020) Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8:69894–69907. https://doi.org/10.1109/ACCESS.2020.2987197
Abouelkheir E, Sherbiny SE (2022) Enhancement of speech encryption/decryption process using RSA algorithm variants. Hum Cent Comput Inf Sci. https://doi.org/10.22967/HCIS.2022.12.006
Al-kateeb ZN, Mohammed SJ (2020) A novel approach for audio file encryption using hand geometry. Multimed Tools Appl 79:19615–19628. https://doi.org/10.1007/s11042-020-08869-8
Augustine N, George SN, Pattathil DP (2015) An audio encryption technique through compressive sensing and Arnold transform. Int J Trust Manag Comput Commun 3(1):74–92. https://doi.org/10.1504/IJTMCC.2015.072467
Aziz H, Gilani SMM, Hussain I, Janjua AK, Khurram S (2021) A noise-tolerant audio encryption framework designed by the application of S8 symmetric group and chaotic systems. Math Probl Eng 2021:5554707. https://doi.org/10.1155/2021/5554707
Belmeguenai A, Ahmida Z, Ouchtati S, Dejmii R (2017) A novel approach based on stream cipher for selective speech encryption. Int J Speech Technol 20:685–698. https://doi.org/10.1007/s10772-017-9439-8
Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard (DES). Springer, Berlin
Demirtas M (2023) A lossless audio encryption method based on Chebyshev map. Orclever Proc Res Dev 2(1):28–38. https://doi.org/10.56038/oprd.v2i1.234
ECRYPT II yearly report on algorithms and keysizes, Smart N (ed) (BRIS), 2011–12. https://www.ecrypt.eu.org/ecrypt2/documents/D.SPA.20.pdf. Accessed 19 Aug 2023
Faragallah OS (2018) Secure audio cryptosystem using hashed image LSB watermarking and encryption. Wirel Pers Commun 98:2009–2023. https://doi.org/10.1007/s11277-017-4960-2
Faragallah OS, El-Sayed HS (2021) Secure opto-audio cryptosystem using XOR-ing mask and Hartley transform. IEEE Access 9:25437–25449. https://doi.org/10.1109/ACCESS.2021.3055738
Farsana F, Gopakumar K (2016) A novel approach for speech encryption: Zaslavsky map as pseudo random number generator. Procedia Comput Sci 93:816–823. https://doi.org/10.1016/j.procs.2016.07.302
Farsana FJ, Devi VR, Gopakumar K (2019) An audio encryption scheme based on fast walsh hadamard transform and mixed chaotic keystreams. Comput Inform Appl. https://doi.org/10.1016/j.aci.2019.10.001
Fisher RA, Yates F (1958) Statistical methods for research workers, 13th edn. Hafner, New York
Ghasemzadeh A, Esmaeili E (2017) A novel method in audio message encryption based on a mixture of chaos function. Int J Speech Technol 20(4):829–837. https://doi.org/10.1007/s10772-017-9452-y
Habib Z, Khan JS, Ahmad J, Khan MA, and Khan FA (2017) Secure speech communication algorithm via DCT and TD-ERCS chaotic map. 4th International conference on electrical and electronic engineering (ICEEE). IEEE, pp 246–250. https://doi.org/10.1109/ICEEE2.2017.7935827
https://en.wikipedia.org/wiki/Mean_squared_error. Accessed 19 Aug 2023
https://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio. Accessed 19 Aug 2023
https://en.wikipedia.org/wiki/Single-precision_floating-point_format. Accessed 19 Aug 2023
https://in.mathworks.com/help/matlab/matlab_prog/floating-point-numbers.html. Accessed 19 Aug 2023
https://in.mathworks.com/help/matlab/ref/rms.html. Accessed 19 Aug 2023
https://in.mathworks.com/help/predmaint/ug/signal-features.html. Accessed 19 Aug 2023
https://in.mathworks.com/help/signal/ref/snr.html. Accessed 19 Aug 2023
https://in.mathworks.com/help/signal/ref/spectrogram.html. Accessed 19 Aug 2023
Khalid I, Shah T, Almarhabi KA, Shah D, Asif M, Ashraf MU (2022) The SPN network for digital audio data based on elliptic curve over a finite field. IEEE Access 10:127939–127955. https://doi.org/10.1109/ACCESS.2022.3226322
Kordov K (2019) A novel audio encryption algorithm with permutation-substitution architecture. Electronics 8:530. https://doi.org/10.3390/electronics8050530
Lima JB, Neto EFS (2016) Audio encryption based on the cosine number transform. Multimedia Tools Appl 75(14):8403–8418. https://doi.org/10.1007/s11042-015-2755-6
Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik 127(19):7431–7438. https://doi.org/10.1016/j.ijleo.2016.05.073
Naskar PK, Paul S, Nandy D, Chaudhuri A (2019) DNA encoding and channel shuffling for secured encryption of audio data. Multimedia Tools Appl 78(17):25019–25042. https://doi.org/10.1007/s11042-019-7696-z
Naskar PK, Bhattacharyya S, Chaudhuri A (2021) An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn 103:2019–2042. https://doi.org/10.1007/s11071-020-06164-7
Sasikaladevi N, Geetha K, Srinivas KNV (2018) A multi-tier security system (SAIL) for protecting audio signals from malicious exploits. Int J Speech Tech 21(2):319–332. https://doi.org/10.1007/s10772-018-9510-0
Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. J Audio Speech Music Proc. https://doi.org/10.1186/s13636-017-0118-0
Shah D, Shah T, Jamal SS (2020) Digital audio signals encryption by Mobius transformation and Henon map. Multimed Syst 26:235–245. https://doi.org/10.1007/s00530-019-00640-w
Shah D, Shah T, Ahamad I, Haider MI, Khalid I (2021a) A three-dimensional chaotic map and their applications to digital audio security. Multimed Tools Appl 80:22251–22273. https://doi.org/10.1007/s11042-021-10697-3
Shah D, Shah T, Hazzazi MM, Haider MI, Aljaedia HI (2021b) An efficient audio encryption scheme based on finite fields. IEEE Access 9:144385–144394. https://doi.org/10.1109/ACCESS.2021.3119515
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Stinson DR (2006) Cryptography: theory and practice. Chapman and Hall CRC, London
Stoyanov B, Ivanova T (2021) Novel implementation of audio encryption using pseudorandom byte generator. Appl Sci 11(21):10190. https://doi.org/10.3390/app112110190
Suryadi MT, Satria Y, Boyke M (2023) Digital audio protection with confusion and diffusion scheme using double-scroll chaotic function. J Hunan Univ Nat Sci. https://doi.org/10.55463/issn.1674-2974.50.5.6
Wang X, Su Y (2020) An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access 8:9260–9270. https://doi.org/10.1109/ACCESS.2019.2963329
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. J Sel Areas Telecommun 1:31–38
Acknowledgements
The authors are grateful to the referees and the editor for their valuable suggestions and remarks that definitely improve the paper. The author Dr. Abdul Gaffar would like to thank the Integral University, Lucknow, India, for providing the manuscript number IU/R &D/2023-MCN0002108, for the present research work.
Funding
This work was partially supported by the UGC (University Grants Commission), India, under Grant no. [415024].
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interest regarding the publication of this manuscript.
Ethical approval
This manuscript does not contain any studies with human participants and/or animals.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Joshi, A.B., Gaffar, A. A technique for securing digital audio files based on rotation and XOR operations. Soft Comput 28, 5523–5540 (2024). https://doi.org/10.1007/s00500-023-09349-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-09349-5