Skip to main content
Log in

Double-Key Secure for N-1-N Sound Record Data (SRD) by the Drive-Response of BAM NNs

  • Published:
Neural Processing Letters Aims and scope Submit manuscript

Abstract

In this work, the problem of N sound record data (audio) encryption based on double-key secure is proposed. The first key is the math tricks to cumulate N audio files in a single file. The second key is the values of the parameters \(A,\ B,\ D,\ \tilde{A},\ \tilde{B},\ \tilde{D},\) of the constructed drive-response bidirectional associative memory neural networks to be found by suitable Lyapunov–Krasovskii functional and satisfying the linear matrix inequality to obtain the dynamical signal (irregular), which are used to encrypt an audio file. Further, the key sensitivity of \(1e-10\) of the proposed method are large adequate key space to make hacker’s attack infeasible. Numerical simulations, cryptanalysis of the proposed scheme are provided to show the best performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Yang YG, Tian J, Sun SJ, Xu P (2015) Quantum-assisted encryption for digital audio signals. Opt Int J Light Electron Opt 126:3221–3226

    Article  Google Scholar 

  2. Chang D, Li Z, Wang M, Zeng Y (2018) A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication. AEU Int J Electron Commun 88:20–29

    Article  Google Scholar 

  3. Yan F, Iliyasu AM, Guo Y, Yang H (2018) Flexible representation and manipulation of audio signals on quantum computers. Theor Comput Sci 752:71–85

    Article  MathSciNet  Google Scholar 

  4. Shahadi HI (2018) Covert communication model for speech signals based on an indirect and adaptive encryption technique. Comput Electr Eng 68:425–436

    Article  Google Scholar 

  5. Pu Z, Rao R (2018) Exponential stability criterion of high-order BAM neural networks with delays and impulse via fixed point approach. Neurocomputing 292:63–71

    Article  Google Scholar 

  6. Balasubramaniam P, Kalpana M, Rakkiyappan R (2011) Existence and global asymptotic stability of fuzzy cellular neural networks with time delay in the leakage term and unbounded distributed delays. Circuits Syst Signal Process 30:1595–1616

    Article  MathSciNet  Google Scholar 

  7. Huang C, Cao J (2018) Impact of leakage delay on bifurcation in high-order fractional BAM neural networks. Neural Netw 98:223–235

    Article  Google Scholar 

  8. Huang C, Meng Y, Cao J, Alsaedi A, Alsaadi FE (2017) New bifurcation results for fractional BAM neural network with leakage delay. Chaos Solitons Fractals 100:31–44

    Article  MathSciNet  Google Scholar 

  9. Aouiti C, Gharbia IB, Cao J, M’hamdi MS, Alsaedi A (2018) Existence and global exponential stability of pseudo almost periodic solution for neutral delay BAM neural networks with time-varying delay in leakage terms. Chaos Solitons Fractals 107:111–127

    Article  MathSciNet  Google Scholar 

  10. Chen C, Li L, Peng H, Yang Y (2018) Adaptive synchronization of memristor-based BAM neural networks with mixed delays. Appl Math Comput 322:100–110

    MathSciNet  MATH  Google Scholar 

  11. Kalpana M, Balasubramaniam P, Ratnavelu K (2015) Direct delay decomposition approach to synchronization of chaotic fuzzy cellular neural networks with discrete, unbounded distributed delays and Markovian jumping parameters. Appl Math Comput 254:291–304

    MathSciNet  MATH  Google Scholar 

  12. Mansi, Chawla R (2015) A review on audio cryptography. Int J Mod Commun Technol Res 3:14–16

  13. Kalpana M, Ratnavelu K, Balasubramaniam P, Kamali MZM (2018) Synchronization of chaotic-type delayed neural networks and its application. Nonlinear Dyn 93:543–555

    Article  Google Scholar 

  14. Ratnavelu K, Kalpana M, Balasubramaniam P, Wong K, Raveendran P (2017) Image encryption method based on chaotic fuzzy cellular neural networks. Signal Process 140:87–96

    Article  Google Scholar 

  15. Kosko B (1988) Bidirectional associative memories. IEEE Trans Syst Man Cybern 18:49–60

    Article  MathSciNet  Google Scholar 

  16. Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105

    Article  Google Scholar 

  17. Li H, Qin Z, Zhang X, Wang X (2011) Auditory cryptography security algorithm with audio shelters. Proc Eng 15:2695–2699

    Article  Google Scholar 

  18. Muthukumar P, Balasubramaniam P, Ratnavelu K (2018) Sliding mode control for generalized robust synchronization of mismatched fractional order dynamical systems and its application to secure transmission of voice messages. ISA Trans 82:51–61

    Article  Google Scholar 

  19. Silva-García VM, Flores-Carapia R, Rentería-Márquez C, Luna-Benoso B, Aldape-Pérez M (2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123–135

    MathSciNet  MATH  Google Scholar 

  20. Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as PRBG for voice encryption in wireless communication. Proc Comput Sci 65:314–323

    Article  Google Scholar 

  21. Shatheesh Sam I, Devaraj P, Bhuvaneswaran Raghuvel S (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56:315–330

    Article  Google Scholar 

  22. Wang W, Yuan M, Luo X, Liu L, Zhang Y (2018) Anti-synchronization control of BAM memristive neural networks with multiple proportional delays and stochastic perturbations. Mod Phys Lett B 32:1850028

    Article  MathSciNet  Google Scholar 

  23. Wang W, Yu X, Luo X, Li L (2018) Stability analysis of memristive multidirectional associative memory neural networks and applications in information storage. Mod Phys Lett B 32:1850207

    Article  MathSciNet  Google Scholar 

  24. Yuan M, Wang W, Luo X, Liu L, Zhao W (2018) Finite-time anti-synchronization of memristive stochastic BAM neural networks with probabilistic time-varying delays. Chaos Solitons Fractals 113:244–260

    Article  MathSciNet  Google Scholar 

  25. Wang W, Yu X, Luo X, Kurths J (2018) Synchronization control of memristive multidirectional associative memory neural networks and applications in network security communication. IEEE Access 6:36002–36018

    Article  Google Scholar 

  26. Wang W, Yu X, Luo X, Kurths J (2018) Finite-time synchronization of chaotic memristive multidirectional associative memory neural networks and applications in image encryption. IEEE Access 6:35764–35779

    Article  Google Scholar 

  27. Yuan M, Luo X, Wang W, Li L, Peng H (2019) Pinning synchronization of coupled memristive recurrent neural networks with mixed time-varying delays and perturbations. Neural Process Lett 49:239–262

    Article  Google Scholar 

  28. Wang W, Yu M, Luo X, Liu L, Yuan M, Zhao W (2017) Synchronization of memristive BAM neural networks with leakage delay and additive time-varying delay components via sampled-data control. Chaos Solitons Fractals 104:84–97

    Article  MathSciNet  Google Scholar 

  29. Yang R, Gao H, Shi P (2009) Novel robust stability criteria for stochastic Hopfield neural networks with time delays. IEEE Trans Syst Man Cybern Part B (Cybern) 39:467–474

    Article  Google Scholar 

  30. Kalpana M, Ratnavelu K, Balasubramaniam P (2019) An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimed Tools Appl 78:5969–5988

    Article  Google Scholar 

  31. Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Opt Int J Light Electron Opt 127:7431–7438

    Article  Google Scholar 

  32. Nadir J, Ein AA, Alqadi Z (2016) A technique to encrypt–decrypt stereo wave file. Int J Comput Inf Technol 05:465–470

    Google Scholar 

Download references

Acknowledgements

This effort was assisted by the University of Malaya, Frontier Research Grant 2017, Grant No. FG037-17AFR. Dr. M. Kalpana is working as a Post-Doctoral Research Fellow at University of Malaya.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Ratnavelu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kalpana, M., Ratnavelu, K., Balasubramaniam, P. et al. Double-Key Secure for N-1-N Sound Record Data (SRD) by the Drive-Response of BAM NNs. Neural Process Lett 50, 2925–2944 (2019). https://doi.org/10.1007/s11063-019-10067-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11063-019-10067-z

Keywords

Mathematics Subject Classification

Navigation