Abstract
This paper presents a robust audio encryption scheme based on three consecutive phases, accomplished as cyclic shift followed by ciphering and wound up by shuffling, to break the high correlation amongst the neighbouring region of a plain audio. To encrypt a plain audio, the entire audio is split into different blocks of 64 bytes each and distinct key blocks are used for those audio blocks in the foregoing three phases. At first, the correlation of each audio block is reduced by the cyclic shift; thereafter, these shifted blocks are ciphered with piecewise linear chaotic map (PWLCM) along with elementary cellular automata (ECA) and finally, turns up with shuffling of ciphered bytes for better diffusion. The significant feature of this scheme is to generate distinct key blocks, which are highly sensitive to the secret key, a combination of the 64-byte external key along with the plain audio-dependent value. Moreover, these key blocks are derived using PWLCM from the secret key along with the preceding key block and previous encrypted block to achieve resistance against the known plain-text attack. It uses key space as large as \(2^{576}\) to resist brute-force attacks. The robustness as well as competence of this scheme is established with statistical analyses, cryptanalysis, randomness analysis and comparisons with existing schemes.
Similar content being viewed by others
References
Mazurczyk, W., Szczypiorski, K.: Advances in digital media security and right management. Multimed. Syst. 20, 101–103 (2014)
Thorwirth, N.J., Horvatic, P., Weis, R., Zhao, J.: Security methods for MP3 music delivery. In: Thirty-Fourth Asilomar Conference on Signal, Systems and Computers, pp. 1831–1835 (2000)
Torrubia, A., Mora, F.: Perceptual cryptography on MPEG-1 Layer III bit-streams. In: International Conference on IEEE Consumer Electronics, pp. 324–325 (2002)
Peng, X., Cui, Z., Cai, L., Yu, L.: Digital audio signal encryption with a virtual optics scheme. Optik 114(2), 69–75 (2003)
Servetti, A., De Martin, J.C.D.: Perception-based partial encryption of compressed speech. IEEE Trans. Speech Audio Process. 10(8), 637–643 (2002)
Servetti, A., Testa, C., De Martin, J.C.: Frequency-selective partial encryption of compressed audio. In: IEEE International Conference on Acoustics, Speech and Signal Process. pp. 668–671 (2003)
Bhargava, B., Shi, C., Wang, S.-Y.: MPEG video encryption algorithms. Multimed. Tools Appl. 24(1), 57–79 (2004)
Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans. Multimed. 8(5), 905–917 (2006)
Xie, D., Kuo, C.-C.J.: Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream. EURASIP J. Inf. Secur. 35262, 1–18 (2007)
Yan., W.Q., Fu, W.G., Kankanhalli, M.S.: Progressive audio scrambling in compressed domain. IEEE Trans. Multimed. 10(6), 960–968 (2008)
Zhou, J., Au, O.C.: Security and efficiency analysis of progressive audio scrambling in compressed domain. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1802–1805 (2010)
Naskar, P.K., Khan, H.N., Roy, U., Chaudhuri, A., Chaudhuri, A.: Secret image sharing with embedded session key. Int. Conf. CISIM 245, 289–294 (2011)
Yakubu, M.A., Maddage, N.C., Atrey, P.K.: Audio secret management scheme using shamir’s secret sharing. Int. Conf. Multimed. Model. 8935, 396–407 (2015)
Naskar, P.K., Khan, H.N., Roy, U., Chaudhuri, A., Chaudhuri, A.: Shared cryptography with embedded session key for secret audio. Int. J. Comput. Appl. 26(8), 5–9 (2011)
Sahari, M.L., Boukemara, I.: A pseudo-random numbers generator based on a novel 3d chaotic map with an application to color image encryption. Nonlinear Dyn. 94(1), 723–744 (2018)
Liu, Y., Qin, Z., Liao, X., Wu, J.: Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled Sine map. Nonlinear Dyn. 100, 2917–2931 (2020)
Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67, 557–566 (2012)
Huang, X.: Image encryption algorithm using chaotic chebyshev generator. Nonlinear Dyn. 67(4), 2411–2417 (2012)
Ye, G.: A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn. 75(3), 417–427 (2014)
Wang, X., Wang, Q.: A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dyn. 75, 567–576 (2014)
Li, C., Luo, G., Qin, K., Li, C.: An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87(1), 127–133 (2017)
Zhu, H., Zhang, X., Yu, H., Zhao, C., Zhu, Z.: An image encryption algorithm based on compound homogeneous hyper-chaotic system. Nonlinear Dyn. 89(1), 61–79 (2017)
Ye, G., Pan, C., Huang, X., Mei, Q.: An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn. 94(1), 745–756 (2018)
Naskar, P.K., Chaudhuri, A.: A robust image encryption technique using dual chaotic map. Int. J. Electron. Secur. Digital For. 7(4), 358–380 (2015)
Naskar, P.K., Chaudhuri, A.: Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image. Imaging Sci. J. 94(8), 460–470 (2016)
Dutta, M.K., Gupta, P., Pathak, V.: A perceptible watermarking algorithm for audio signals. Multimed. Tools Appl. 73, 691–713 (2014)
Jamal, S.S., Shah, T., Hussain, I.: An efficient scheme for digital watermarking using chaotic map. Nonlinear Dyn. 73, 1469–1474 (2013)
Ali, A.H., George, L.E., Zaidan, A.A., Mokhtar, M.R.: High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed. Tools Appl. 77, 31487–31516 (2018)
Sheu, L.J.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65, 103–108 (2010)
Mosa, E., Messiha, N.W., Zahran, O., El-Samie, E.A.: Chaotic encryption of speech signals. Int. J. Speech Technol. 14, 285–296 (2011)
Madain, A., Dalhoum, A.L.A., Hiary, H., Ortega, A., Alfonseca, M.: Audio scrambling technique based on cellular automata. Multimed. Tools Appl. 71(3), 1803–1822 (2012)
George, S.N., Augustine, N., Pattathil, D.P.: Audio security through compressive sampling and cellular automata. Multimed. Tools Appl. 74(23), 10393–10417 (2014)
Datta, K., Gupta, I.S.: Partial encryption and watermarking scheme for audio files with controlled degradation of quality. Multimed. Tools Appl. 64, 649–669 (2013)
Yang, Y.-G., Tian, J., Sun, S.-J., Xu, P.: Quantum-assisted encryption for digital audio signals. Optik 126(21), 3221–3226 (2015)
Augustine, N., George, S.N., Pattathil, D.P.: An audio encryption technique through compressive sensing and Arnold transform. Int. J. Trust Manag. Comput. Commun. 3(1), 74–92 (2015)
Lima, J.B., da Silva Neto, E.F.: Audio encryption based on the cosine number transform. Multimed. Tools Appl. 75(14), 8403–8418 (2016)
Liu, H., Kadir, A., Li, Y.: Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik - Int. J. Light Electron. Opt. 127(19), 7431–7438 (2016)
Sathiyamurthi, P., Ramakrishnan, S.: Speech encryption using chaotic shift keying for secured speech communication. EURASIP J. Audio, Speech, Music Process 20, 1–11 (2017)
Belmeguenai, A., Ahmida, Z., Ouchtati, S.: A novel approach based on stream cipher for selective speech encryption. Int. J. Speech Technol. 20, 685–698 (2017)
Roy, A., Misra, A.P.: Audio signal encryption using chaotic Hènon map and lifting wavelet transforms. Eur. Phys. J. Plus 132, 1–12 (2017)
Ghasemzadeh, A., Esmaeili, E.: A novel method in audio message encryption based on a mixture of chaos function. Int. J. Speech Technol. 20(4), 829–837 (2017)
Sheela, S.J., Suresh, K.V., Tandur, D.: A novel audio cryptosystem using chaotic maps and DNA encoding. J. Comput. Netw. Commun. 2017, 1–12 (2017)
Faragallah, O.S.: Secure audio cryptosystem using hashed image LSB watermarking and encryption. Wirel. Pers. Commun. 98, 2009–2023 (2017)
Kalpana, M., Ratnavelu, K., Balasubramaniam, P.: An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimed. Tools Appl. 78, 5969–5988 (2019)
Sasikaladevi, N., Geetha, K., Srinivas, K.N.V.: A multi-tier security system (SAIL) for protecting audio signals from malicious exploits. Int. J. Speech Technol. 21(2), 319–332 (2018)
Kate, H.K., Razmara, J., Isazadeh, A.: A novel fast and secure approach for voice encryption based on DNA computing. 3D Res. 9(17), 1–11 (2018)
Farsana, F.J., Devi, V.R., Gopakumar, K.: An audio encryption scheme based on fast walsh hadamard transform and mixed chaotic keystreams. Appl. Comput. Inform. (2019). https://doi.org/10.1016/j.aci.2019.10.001
Renza, D., Mendoza, S., Ballesteros, L.D.M.: High-uncertainty audio signal encryption based on the Collatz conjecture. J. Inf. Secur. Appl. 46, 62–69 (2019)
Shah, D., Shah, T., Jamal, S.S.: Digital audio signals encryption by Mobius transformation and Hènon map. Multimed. Syst. 26, 235–245 (2019)
Kordov, K.: A novel audio encryption algorithm with permutation–substitution architecture. Electronics 8(5), 530(1–15) (2019)
Naskar, P.K., Paul, S., Nandy, D., Chaudhuri, A.: DNA encoding and channel shuffling for secured encryption of audio data. Multimed. Tools Appl. 78(17), 25019–25042 (2019)
Wang, X., Su, Y.: An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access 6, 9260–9270 (2020)
Abdelfatah, R.I.: Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access 8, 69894–69907 (2020)
Wang, X., Sun, H.: A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function. Optics and Laser Technol. 122, 105854(1–12) (2020)
Özkaynak, F.: Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn. 92, 305–313 (2018)
Luo, Y., Zhou, R., Liu, J., Cao, Y., Ding, X.: A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonliner Dyn. 93, 1165–1181 (2018)
Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)
Hasheminejad, A., Rostami, M.J.: A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik 184, 205–213 (2019)
Li, C., Lin, D., Feng, B., Lu, J., Hao, F.: Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)
Li, C., Lin, D., Lu, J., Hao, F.: Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed. 25(4), 46–56 (2018)
Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos. 15(10), 3119–3151 (2005)
Li, C., Feng, B., Li, S., Kurths, J., Chen, G.: Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE Trans. Circuits Syst.-I: Regul. Pap. 66(6), 2322–2335 (2019)
Li, C., Zhang, Y., Xie, E.Y.: When an attacker meets a cipher-image in 2018: A year in review. J. Inf. Secur. Appl. 48, 1–9 (2019)
Lin, T., Chua, L.O.: On chaos of digital filters in the real world. IEEE Trans. Circuits Syst. 38(5), 557–558 (1991)
Cernak, J.: Digital generators of chaos. Phys. Lett. A. 214(3–4), 151–160 (1996)
Li, C.-Y., Chen, Y.-H., Chang, T.-Y., Deng, L.-Y., To, K.: Period extension and randomness enhancement using high throughput reseeding mixing PRNG. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 20(2), 385–389 (2012)
Hua, H., Zhou, Y.: One-dimensional nonlinear model for producing chaos. IEEE Trans. Circuits Syst. I 65(1), 235–246 (2018)
Nagaraj, N., Shastry, M.C., Vaidya, P.G.: Increasing average period lengths by switching of robust chaos maps in finite precision. Eur. Phys. J. Spec. Top. 165(1), 73–83 (2008)
Addabbo, T., Alioto, M., Fort, A., Rocchi, S., Vignoli, V.: A feedback strategy to improve the entropy of a chaos-based random bit generator. IEEE Trans. Circuits Syst. I 53(2), 326–337 (2006)
Patro, K.A.K., Acharya, B.: An efficient colour image encryption scheme based on 1-d chaotic maps. J. Inf. Secur. Appl. 46, 23–41 (2019)
Naskar, P.K., Bhattacharyya, S., Nandy, D., Chaudhuri, A.: A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dyn. 100(3), 2877–2898 (2020)
Wolfram, S.: Statistical mechanics of cellular automata. Rev. Mod. Phys. 55(3), 601–644 (1983)
Jin, J.: An image encryption based on elementary cellular automata. Opt. Lasers Eng. 50(12), 1836–1843 (2012)
Abdo, A.A., Lian, S., Ismail, I.A., Amin, M., Diab, H.: A cryptosystem based on elemetary cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18, 136–147 (2013)
Fatès, N.: A tutorial on elementary cellular automata with fully asynchronous updating. Nat. Comput. 19, 179–197 (2020)
Chai, X.L., Gan, Z.H., Yang, K., Chen, Y.R., Liu, X.X.: An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process-Image 52, 6–19 (2017)
Flajolet, P., Poblete, P., Viola, A.: On the analysis of linear probing hashing. Algorithmica 22(4), 490–515 (1998)
Muhammad, Z.M.Z., Özkaynak, F.: An image encryption algorithm based on chaotic selection of robust cryptographic primitives. IEEE Access 8, 56581–56589 (2020)
Zeng, Y., Mao, H., Peng, D., Yi, Z.: Spectrogram based multi-task audio classification. Multimed. Tools Appl. 78, 3705–3722 (2017)
Broumandnia, A.: Designing digital image encryption using 2D and 3D reversible modular chaotic maps. J. Inf. Secur. Appl. 47, 188–198 (2019)
Acknowledgements
We are thankful to the Department of Computer Science and Engineering, Government College of Engineering and Textile Technology, Serampore, Hooghly, W.B., India, and MCKV Institute of Engineering, Howrah, W.B., India, for giving us the platform for planning and developing this work using all departmental facilities. We are deeply grateful to the editors for smooth and fast handling of the manuscript. We would also like to thank the anonymous reviewers for their valuable advices and suggestions to improve the quality of this paper.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Naskar, P.K., Bhattacharyya, S. & Chaudhuri, A. An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn 103, 2019–2042 (2021). https://doi.org/10.1007/s11071-020-06164-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-020-06164-7