Skip to main content
Log in

Chaotic encryption of speech signals

  • Published:
International Journal of Speech Technology Aims and scope Submit manuscript


This paper introduces a speech encryption approach, which is based on permutation of speech segments using chaotic Baker map and substitution using masks in both time and transform domains. Two parameters are extracted from the main key used in the generation of mask. Either the Discrete Cosine Transform (DCT) or the Discrete Sine Transform (DST) can be used in the proposed cryptosystem to remove the residual intelligibility resulting from permutation and masking in time domain. Substitution with Masks is used in this cryptosystem to fill the silent periods within speech conversation and destroy format and pitch information. Permutation with chaotic Baker map is used in to maximize the benefits of the permutation process in encryption by using large-size blocks to allow more audio segments to be permutated. The proposed cryptosystem has a low complexity, small delay, and high degree of security. Simulation results prove that the proposed cryptosystem is robust to the presence of noise.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others


  • Abd El-Samie, F. E. (2009). An efficient singular value decomposition algorithm for digital audio watermarking. International Journal of Speech Technology, 12(1), 27–45.

    Article  Google Scholar 

  • Advanced Encryption System (2001). Federal Information Processing Standards Publication, 197.

  • Ahmed, N., Natarajan, T., Rao, K. R. (1974). Discrete cosine transfom. IEEE Transactions on Computers, C-23, 90–93.

    Article  MathSciNet  Google Scholar 

  • Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2006). Novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals.

  • Beker, H. J., & Piper, F. C. (1985). Secure speech communications. London: Academic Press.

    Google Scholar 

  • Cheng, L. Z. (2001). On computing the two-dimensional (2-D) type IV discrete cosine transform (2-D DCT-IV). IEEE Signal Processing Letters, 8, 239–241.

    Article  Google Scholar 

  • Daemen, J., & Rijndael, V. R. (2001). The advanced encryption standard. Doctor Dobb’s Journal, 26(3), 137–139.

    Google Scholar 

  • Fridrich, J. (1997). Secure image ciphering based on chaos (Final report).

  • Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.

    Article  MathSciNet  MATH  Google Scholar 

  • Goldburg, B., Sridharan, S., & Dawson, E. (1993). Design and cryptanalysis of transform-based analog speech scramblers. IEEE Journal on Selected Areas in Communications, 11(5), 735–744.

    Article  Google Scholar 

  • Koduru, S. C., & Chandrasekaran, V. (2008). Integrated confusion-diffusion mechanisms for chaos based image encryption. In IEEE 8th international conference on computer and information technology workshops.

  • Kuo, C. J. (1993). Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging, 2(4), 345–351.

    Article  Google Scholar 

  • Lee, L. S., Chou, G. C., & Chang, C. S. (1984). A new frequency domain speech scrambling system which does not require frame synchronization. IEEE Transactions on Communications, 32, 444–456.

    Article  Google Scholar 

  • Lin, Q. H., Yin, F. L., Mei, T. M., & Liang, H. (2006). A blind source separation based method for speech encryption. IEEE Transactions on Circuits and Systems. I, 53(6), 1320–1328.

    Article  MathSciNet  Google Scholar 

  • Ma, F., Cheng, J., & Wang, Y. (1996). Wavelet transform-based analogue speech scrambling scheme. Electronics Letters, 32(8), 719–721.

    Article  Google Scholar 

  • Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. In Proc. IEEE, Int. conf. multimedia and exp. (Vol. 1, pp. 553–556).

    Chapter  Google Scholar 

  • Mao, Y. B., Chen, G., & Lian, S. G. (2004). A novel fast image encryption scheme based on the 3D chaotic baker map. International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 14(10), 3613–3624.

    Article  MathSciNet  MATH  Google Scholar 

  • Meng-En, L., Chien-Feng, C., Tsung-Nan, L., & Chun-Nan, C. (2009). The application of discrete cosine transform (DCT) combined with the nonlinear regression routine on optical auto-focusing. In Digest of technical papers international conference on consumer electronics ICCE 2009 (pp. 1–2).

    Chapter  Google Scholar 

  • Milton, R. M. (1989). A time and frequency-domain speech scrambler. In COMSIG 1989 proceedings, Southern African conference (pp. 125–130).

    Chapter  Google Scholar 

  • Murthy, N. R., & Swamy, M. N. (1991). Efficient algorithms for the computation of running discrete cosine and sine transforms. IEEE International Symposium on Circuits and Systems, 1, 634–637.

    Google Scholar 

  • Shannon, C. E. (1949). Communication theory of secrecy system. The Bell System Technical Journal, 28, 656–715.

    MathSciNet  MATH  Google Scholar 

  • Tseng (2007). An OFDM speech scrambler without residual intelligibility. In TENCON 2007 (pp. 1–4).

    Google Scholar 

  • Wu, Y., & Ng, B. P. (2002). Speech scrambling with Hadamard transform in frequency domain. Proceedings of the 6th International Conference on Signal Processing, 2, 1560–1563.

    Google Scholar 

  • Yip, P., Rao, K. (1987). On the shift property of DCT’s and DST’s. Acoustics, Speech and Signal Processing, 35, 404–406.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Emad Mosa.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mosa, E., Messiha, N.W., Zahran, O. et al. Chaotic encryption of speech signals. Int J Speech Technol 14, 285–296 (2011).

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: