Skip to main content
Log in

Voice encryption using a unified hyper-chaotic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A Chaos-based cryptosystem is a vital method to enhance information protection in communication systems. The previous works have addressed this topic either by using highly complicated algorithms that are difficult to apply in practice or have a few encryption keys. This paper presents a new, highly secure chaos-based secure communication system that combines a conventional cryptography algorithm with two levels of chaotic masking technique. Furthermore, to enhance the security level, we employ the characteristic of a unified hyper-chaotic system to generate three different types of attractors. A Simulink of the stated system is implemented using MATLAB SIMULINK (R2013) to transmit a voice signal. Several testing methods such as power spectral density, spectrogram, histogram analysis, key sensitivity, correlation coefficient, signal to noise ratio (SNR), Percent Residual Deviation (PRD) are carried out to evaluate the quality of the proposed algorithm in several domains, time, frequency, and statistics. The simulation and comparison results demonstrate the high efficiency of the suggested cryptosystem and robustness against various cryptographic attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Al-kateeb Z N, Mohammed S J (2020) A novel approach for audio file encryption using hand geometry. Multimed Tools Applic 79(27):19615–19628

    Article  Google Scholar 

  2. Al Nassan W, Bonny T, Baba A (2020) A new chaos-based cryptoystem for voice encryption. In: 2020 3rd International conference on signal processing and information security (ICSPIS). IEEE, pp 1–4

  3. AlMutairi F, Bonny T (2019) New image encryption algorithm based on switching-type chaotic oscillator. In: 2019 International conference on electrical and computing technologies and applications (ICECTA). IEEE, pp 1–5

  4. AlMutairi F, Bonny T (2020) Image encryption based on Chua chaotic oscillator. In: 2020 3rd International conference on signal processing and information security (ICSPIS). IEEE, pp 1–4

  5. Babanli K, Kabaoğlu R O (2022) Fuzzy modeling of desired chaotic behavior in secure communication systems. Inf Sci 594:217–232

    Article  Google Scholar 

  6. Bashier EBM (2013) Speech scrambling based on chaotic maps and one-time pad, computing, electrical and electronics engineering (icceee). In: International Conference on, pp 128–133

  7. Bonny T (2020) Chaotic or hyper-chaotic oscillator? numerical solution, circuit design, matlab hdl-coder implementation, vhdl code, security analysis, and fpga realization. Circuits, Systems, and Signal Processing, 1–28

  8. Bonny T, Al Debsi R, Majzoub S, Elwakil A S (2019) Hardware optimized fpga implementations of high-speed true random bit generators based on switching-type chaotic oscillators. Circ Syst Signal Process 38(3):1342–1359

    Article  Google Scholar 

  9. Bonny T, Elwakil A S (2018) Fpga realizations of high-speed switching-type chaotic oscillators using compact vhdl codes. Nonlin Dyn 93(2):819–833

    Article  Google Scholar 

  10. Bonny T, Nasir Q (2019) Clock glitch fault injection attack on an fpga-based non-autonomous chaotic oscillator. Nonlin Dyn 96(3):2087–2101

    Article  Google Scholar 

  11. Chen G, Zhou J, Liu Z (2004) Global synchronization of coupled delayed neural networks and applications to chaotic cnn models. Int J Bifur Chaos 14(07):2229–2240

    Article  MathSciNet  MATH  Google Scholar 

  12. Cuomo K M, Oppenheim A V (1993) Circuit implementation of synchronized chaos with applications to communications. Phys Rev Lett 71(1):65

    Article  Google Scholar 

  13. Cuomo K M, Oppenheim A V, Strogatz S H (1993) Synchronization of lorenz-based chaotic circuits with applications to communications. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing 40 (10):626–633

    Article  Google Scholar 

  14. Fa-Qiang W, Chong-Xin L (2006) Hyperchaos evolved from the Liu chaotic system. Chin Phys 15(5):963

    Article  Google Scholar 

  15. Farsana FJ, Devi VR, Gopakumar K (2020) An audio encryption scheme based on fast walsh hadamard transform and mixed chaotic keystreams. Applied Computing and Informatics

  16. Farsana FJ, Gopakumar K (2020) Speech encryption algorithm based on nonorthogonal quantum state with hyperchaotic keystreams. Advances in Mathematical Physics, 2020

  17. Fawzy M, Shalaby M, Kamal Y, Elramly S H (2017) A speech cryptosystem based on chaotic modulation technique. Egypt J Lang Eng 4(1):1–10

    Article  Google Scholar 

  18. Gao T, Chen G, Chen Z, Cang S (2007) The generation and circuit implementation of a new hyper-chaos based upon lorenz system. Phys Lett A 361(1–2):78–86

    Article  MATH  Google Scholar 

  19. Goel N, Raman B, Gupta I (2014) Chaos based joint compression and encryption framework for end-to-end communication systems. Advances in Multimedia, 2014

  20. Kordov K (2019) A novel audio encryption algorithm with permutation-substitution architecture. Electronics 8(5):530

    Article  Google Scholar 

  21. Li C-h, Song Y, Wang F-y, Wang Z-q, Li Y-b (2017) A chaotic coverage path planner for the mobile robot based on the Chebyshev map for special missions. Front Inform Technol Electron Eng 18(9):1305–1319

    Article  Google Scholar 

  22. Liu X, Tong X, Wang Z, Zhang M (2022) Uniform non-degeneracy discrete chaotic system and its application in image encryption. Nonlinear Dynamics, 1–30

  23. Lorenz E N (1963) Deterministic nonperiodic flow. J Atmos Sci 20 (2):130–141

    Article  MathSciNet  MATH  Google Scholar 

  24. Muthuswamy B (2010) Implementing memristor based chaotic circuits. Int J Bifur Chaos 20(05):1335–1350

    Article  MATH  Google Scholar 

  25. Nakamura Y, Sekiguchi A (2001) The chaotic mobile robot. IEEE Trans Robot Autom 17(6):898–904

    Article  Google Scholar 

  26. Petavratzis E, Moysis L, Volos C, Stouboulos I, Nistazakis H, Valavanis K (2021) A chaotic path planning generator enhanced by a memory technique. Robot Auton Syst 143:103826

    Article  Google Scholar 

  27. Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inform Forens Secur 13(9):2137–2150

    Article  Google Scholar 

  28. Rajagopal K, Jahanshahi H, Varan M, Bayır I, Pham V-T, Jafari S, Karthikeyan A (2018) A hyperchaotic memristor oscillator with fuzzy based chaos control and lqr based chaos synchronization. AEU-Int J Electron Commun 94:55–68

    Article  Google Scholar 

  29. Razmara S, Yahyazadeh M (2022) Design of an analog time-varying audio cryptography system based on sliding mode synchronization of non-identical chaotic systems described with time-delayed fractional-order dynamics. Arab J Sci Eng, 1–14

  30. Rössler O E (1979) Continuous chaos—four prototype equations. Ann N Y Acad Sci 316(1):376–392

    Article  MathSciNet  MATH  Google Scholar 

  31. Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio Speech Music Process 2017(1):1–11

    Article  Google Scholar 

  32. Sathiyamurthi P, Ramakrishnan S (2020) Speech encryption algorithm using fft and 3d-lorenz–logistic chaotic map. Multimed Tools Applic 79(25):17817–17835

    Article  Google Scholar 

  33. Shah D, Shah T, Jamal S S (2019) Digital audio signals encryption by mobius transformation and hénon map. Multimedia Systems, 1–11

  34. Sheela SJ, Suresh KV, Tandur D (2017) Chaos based speech encryption using modified henon map. In: 2017 Second international conference on electrical, computer and communication technologies (ICECCT). IEEE, pp 1–7

  35. Taneja N, Raman B, Gupta I (2012) Chaos based cryptosystem for still visual data. Multimed Tools Applic 61(2):281–298

    Article  Google Scholar 

  36. Taneja N, Raman B, Gupta I (2012) Combinational domain encryption for still visual data. Multimed Tools Applic 59(3):775–793

    Article  Google Scholar 

  37. Teh J S, Alawida M, Sii Y C (2020) Implementation and practical problems of chaos-based cryptography revisited. J Inform Secur Applic 50:102421

    Google Scholar 

  38. Wang X-Y, Zhao G-B (2010) Hyperchaos generated from the unified chaotic system and its control. Int J Modern Phys B 24(23):4619–4637

    Article  MATH  Google Scholar 

  39. Yousif S F (2019) Speech encryption based on Zaslavsky map. J Eng Appl Sci 14(17):6392–6399

    Article  Google Scholar 

  40. Zghair H K, Mehdi S A, Sadkhan S B (2021) Speech scrambler based on discrete cosine transform and novel seven-dimension hyper chaotic system. In: Journal of physics: conference series, vol 1804. IOP Publishing, p 012048

Download references

Acknowledgments

Not applicable.

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

Bonny is the first and corresponding author. All authors built the system and performed the experiments. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Talal Bonny.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for Publication

Not applicable.

Consent for Publication

The authors declare that they have no competing interests.

Additional information

Availability of data and materials

Not applicable.

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bonny, T., Nassan, W.A. & Baba, A. Voice encryption using a unified hyper-chaotic system. Multimed Tools Appl 82, 1067–1085 (2023). https://doi.org/10.1007/s11042-022-13317-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13317-w

Keywords

Navigation